patch for issue #180

Former-commit-id: 95760c8ee82b1e382dc3785525ac6027c0be8069
This commit is contained in:
Jeremy Long
2015-01-25 11:15:43 -05:00
parent 88924ea520
commit 018e4bc382
2 changed files with 156 additions and 66 deletions

View File

@@ -25,7 +25,9 @@ import java.sql.ResultSet;
import java.sql.SQLException; import java.sql.SQLException;
import java.sql.Statement; import java.sql.Statement;
import java.util.ArrayList; import java.util.ArrayList;
import java.util.HashMap;
import java.util.HashSet; import java.util.HashSet;
import java.util.Iterator;
import java.util.List; import java.util.List;
import java.util.Map.Entry; import java.util.Map.Entry;
import java.util.Properties; import java.util.Properties;
@@ -59,10 +61,11 @@ public class CveDB {
private Connection conn; private Connection conn;
/** /**
* Creates a new CveDB object and opens the database connection. Note, the connection must be closed by the caller * Creates a new CveDB object and opens the database connection. Note, the
* by calling the close method. * connection must be closed by the caller by calling the close method.
* *
* @throws DatabaseException thrown if there is an exception opening the database. * @throws DatabaseException thrown if there is an exception opening the
* database.
*/ */
public CveDB() throws DatabaseException { public CveDB() throws DatabaseException {
super(); super();
@@ -84,9 +87,11 @@ public class CveDB {
} }
/** /**
* Opens the database connection. If the database does not exist, it will create a new one. * Opens the database connection. If the database does not exist, it will
* create a new one.
* *
* @throws DatabaseException thrown if there is an error opening the database connection * @throws DatabaseException thrown if there is an error opening the
* database connection
*/ */
public final void open() throws DatabaseException { public final void open() throws DatabaseException {
if (!isOpen()) { if (!isOpen()) {
@@ -95,7 +100,8 @@ public class CveDB {
} }
/** /**
* Closes the DB4O database. Close should be called on this object when it is done being used. * Closes the DB4O database. Close should be called on this object when it
* is done being used.
*/ */
public void close() { public void close() {
if (conn != null) { if (conn != null) {
@@ -148,7 +154,8 @@ public class CveDB {
super.finalize(); super.finalize();
} }
/** /**
* Database properties object containing the 'properties' from the database table. * Database properties object containing the 'properties' from the database
* table.
*/ */
private DatabaseProperties databaseProperties; private DatabaseProperties databaseProperties;
@@ -174,8 +181,9 @@ public class CveDB {
*/ */
private static final String DELETE_VULNERABILITY = "DELETE FROM vulnerability WHERE id = ?"; private static final String DELETE_VULNERABILITY = "DELETE FROM vulnerability WHERE id = ?";
/** /**
* SQL Statement to cleanup orphan entries. Yes, the db schema could be a little tighter, but what we have works * SQL Statement to cleanup orphan entries. Yes, the db schema could be a
* well to keep the data file size down a bit. * little tighter, but what we have works well to keep the data file size
* down a bit.
*/ */
private static final String CLEANUP_ORPHANS = "DELETE FROM CpeEntry WHERE id not in (SELECT CPEEntryId FROM Software); "; private static final String CLEANUP_ORPHANS = "DELETE FROM CpeEntry WHERE id not in (SELECT CPEEntryId FROM Software); ";
/** /**
@@ -212,7 +220,8 @@ public class CveDB {
private static final String SELECT_CVE_FROM_SOFTWARE = "SELECT cve, cpe, previousVersion " private static final String SELECT_CVE_FROM_SOFTWARE = "SELECT cve, cpe, previousVersion "
+ "FROM software INNER JOIN vulnerability ON vulnerability.id = software.cveId " + "FROM software INNER JOIN vulnerability ON vulnerability.id = software.cveId "
+ "INNER JOIN cpeEntry ON cpeEntry.id = software.cpeEntryId " + "INNER JOIN cpeEntry ON cpeEntry.id = software.cpeEntryId "
+ "WHERE vendor = ? AND product = ?"; + "WHERE vendor = ? AND product = ? "
+ "ORDER BY cve, cpe, previousVersion";
//unfortunately, the version info is too complicated to do in a select. Need to filter this afterwards //unfortunately, the version info is too complicated to do in a select. Need to filter this afterwards
// + " AND (version = '-' OR previousVersion IS NOT NULL OR version=?)"; // + " AND (version = '-' OR previousVersion IS NOT NULL OR version=?)";
// //
@@ -270,11 +279,13 @@ public class CveDB {
//</editor-fold> //</editor-fold>
/** /**
* Searches the CPE entries in the database and retrieves all entries for a given vendor and product combination. * Searches the CPE entries in the database and retrieves all entries for a
* The returned list will include all versions of the product that are registered in the NVD CVE data. * given vendor and product combination. The returned list will include all
* versions of the product that are registered in the NVD CVE data.
* *
* @param vendor the identified vendor name of the dependency being analyzed * @param vendor the identified vendor name of the dependency being analyzed
* @param product the identified name of the product of the dependency being analyzed * @param product the identified name of the product of the dependency being
* analyzed
* @return a set of vulnerable software * @return a set of vulnerable software
*/ */
public Set<VulnerableSoftware> getCPEs(String vendor, String product) { public Set<VulnerableSoftware> getCPEs(String vendor, String product) {
@@ -307,7 +318,8 @@ public class CveDB {
* Returns the entire list of vendor/product combinations. * Returns the entire list of vendor/product combinations.
* *
* @return the entire list of vendor/product combinations * @return the entire list of vendor/product combinations
* @throws DatabaseException thrown when there is an error retrieving the data from the DB * @throws DatabaseException thrown when there is an error retrieving the
* data from the DB
*/ */
public Set<Pair<String, String>> getVendorProductList() throws DatabaseException { public Set<Pair<String, String>> getVendorProductList() throws DatabaseException {
final Set<Pair<String, String>> data = new HashSet<Pair<String, String>>(); final Set<Pair<String, String>> data = new HashSet<Pair<String, String>>();
@@ -462,24 +474,37 @@ public class CveDB {
ps.setString(1, cpe.getVendor()); ps.setString(1, cpe.getVendor());
ps.setString(2, cpe.getProduct()); ps.setString(2, cpe.getProduct());
rs = ps.executeQuery(); rs = ps.executeQuery();
String currentCVE = "";
final HashMap<String, Boolean> vulnSoftware = new HashMap<String, Boolean>();
while (rs.next()) { while (rs.next()) {
final String cveId = rs.getString(1); final String cveId = rs.getString(1);
if (!currentCVE.equals(cveId)) { //check for match and add
final Entry<String, Boolean> matchedCPE = getMatchingSoftware(vulnSoftware, detectedVersion);
if (matchedCPE != null) {
cveEntries.add(cveId);
final Vulnerability v = getVulnerability(cveId);
v.setMatchedCPE(matchedCPE.getKey(), matchedCPE.getValue() ? "Y" : null);
vulnerabilities.add(v);
}
vulnSoftware.clear();
currentCVE = cveId;
}
final String cpeId = rs.getString(2); final String cpeId = rs.getString(2);
final String previous = rs.getString(3); final String previous = rs.getString(3);
if (!cveEntries.contains(cveId) && isAffected(cpe.getVendor(), cpe.getProduct(), detectedVersion, cpeId, previous)) { final Boolean p = previous != null && !previous.isEmpty();
cveEntries.add(cveId); vulnSoftware.put(cpeId, p);
final Vulnerability v = getVulnerability(cveId); }
v.setMatchedCPE(cpeId, previous); //remember to process the last set of CVE/CPE entries
vulnerabilities.add(v); final Entry<String, Boolean> matchedCPE = getMatchingSoftware(vulnSoftware, detectedVersion);
} if (matchedCPE != null) {
cveEntries.add(currentCVE);
final Vulnerability v = getVulnerability(currentCVE);
v.setMatchedCPE(matchedCPE.getKey(), matchedCPE.getValue() ? "Y" : null);
vulnerabilities.add(v);
} }
DBUtils.closeResultSet(rs); DBUtils.closeResultSet(rs);
DBUtils.closeStatement(ps); DBUtils.closeStatement(ps);
// for (String cve : cveEntries) {
// final Vulnerability v = getVulnerability(cve);
// vulnerabilities.add(v);
// }
} catch (SQLException ex) { } catch (SQLException ex) {
throw new DatabaseException("Exception retrieving vulnerability for " + cpeStr, ex); throw new DatabaseException("Exception retrieving vulnerability for " + cpeStr, ex);
} finally { } finally {
@@ -561,7 +586,8 @@ public class CveDB {
} }
/** /**
* Updates the vulnerability within the database. If the vulnerability does not exist it will be added. * Updates the vulnerability within the database. If the vulnerability does
* not exist it will be added.
* *
* @param vuln the vulnerability to add to the database * @param vuln the vulnerability to add to the database
* @throws DatabaseException is thrown if the database * @throws DatabaseException is thrown if the database
@@ -742,8 +768,9 @@ public class CveDB {
} }
/** /**
* It is possible that orphaned rows may be generated during database updates. This should be called after all * It is possible that orphaned rows may be generated during database
* updates have been completed to ensure orphan entries are removed. * updates. This should be called after all updates have been completed to
* ensure orphan entries are removed.
*/ */
public void cleanupDatabase() { public void cleanupDatabase() {
PreparedStatement ps = null; PreparedStatement ps = null;
@@ -762,46 +789,60 @@ public class CveDB {
} }
/** /**
* Determines if the given identifiedVersion is affected by the given cpeId and previous version flag. A non-null, * Determines if the given identifiedVersion is affected by the given cpeId
* non-empty string passed to the previous version argument indicates that all previous versions are affected. * and previous version flag. A non-null, non-empty string passed to the
* previous version argument indicates that all previous versions are
* affected.
* *
* @param vendor the vendor of the dependency being analyzed * @param vulnerableSoftware a map of the vulnerable software with a boolean
* @param product the product name of the dependency being analyzed * indicating if all previous versions are affected
* @param identifiedVersion the identified version of the dependency being analyzed * @param identifiedVersion the identified version of the dependency being
* @param cpeId the cpe identifier of software that has a known vulnerability * analyzed
* @param previous a flag indicating if previous versions of the product are vulnerable
* @return true if the identified version is affected, otherwise false * @return true if the identified version is affected, otherwise false
*/ */
protected boolean isAffected(String vendor, String product, DependencyVersion identifiedVersion, String cpeId, String previous) { protected Entry<String, Boolean> getMatchingSoftware(HashMap<String, Boolean> vulnerableSoftware, DependencyVersion identifiedVersion) {
boolean affected = false; HashSet<String> majorVersionsAffectingAllPrevious = new HashSet<String>();
final boolean isStruts = "apache".equals(vendor) && "struts".equals(product); boolean matchesAnyPrevious = identifiedVersion == null || "-".equals(identifiedVersion.toString());
final DependencyVersion v = parseDependencyVersion(cpeId); String majorVersionMatch = null;
final boolean prevAffected = previous != null && !previous.isEmpty(); for (Entry<String, Boolean> entry : vulnerableSoftware.entrySet()) {
if (v == null || "-".equals(v.toString())) { //all versions final DependencyVersion v = parseDependencyVersion(entry.getKey());
affected = true; if (v == null || "-".equals(v.toString())) { //all versions
} else if (identifiedVersion == null || "-".equals(identifiedVersion.toString())) { return entry;
if (prevAffected) {
affected = true;
} }
} else if (identifiedVersion.equals(v) || (prevAffected && identifiedVersion.compareTo(v) < 0)) { if (entry.getValue()) {
if (isStruts) { //struts 2 vulns don't affect struts 1 if (matchesAnyPrevious) {
if (identifiedVersion.getVersionParts().get(0).equals(v.getVersionParts().get(0))) { return entry;
affected = true;
} }
} else { if (identifiedVersion != null && identifiedVersion.getVersionParts().get(0).equals(v.getVersionParts().get(0))) {
affected = true; majorVersionMatch = v.getVersionParts().get(0);
}
majorVersionsAffectingAllPrevious.add(v.getVersionParts().get(0));
} }
} }
/* if (matchesAnyPrevious) {
* TODO consider utilizing the matchThreeVersion method to get additional results. However, this return null;
* might also introduce false positives. }
*/
return affected; boolean canSkipVersions = majorVersionMatch != null && majorVersionsAffectingAllPrevious.size() > 1;
for (Iterator<Entry<String, Boolean>> it = vulnerableSoftware.entrySet().iterator(); it.hasNext();) {
Entry<String, Boolean> entry = it.next();
final DependencyVersion v = parseDependencyVersion(entry.getKey());
//this can't dereference a null 'majorVersionMatch' as canSkipVersions accounts for this.
if (canSkipVersions && !majorVersionMatch.equals(v.getVersionParts().get(0))) {
continue;
}
//this can't dereference a null 'identifiedVersion' because if it was null we would have exited
//in the above loop or just after loop (if matchesAnyPrevious return null).
if (identifiedVersion.equals(v) || (entry.getValue() && identifiedVersion.compareTo(v) < 0)) {
return entry;
}
}
return null;
} }
/** /**
* Parses the version (including revision) from a CPE identifier. If no version is identified then a '-' is * Parses the version (including revision) from a CPE identifier. If no
* returned. * version is identified then a '-' is returned.
* *
* @param cpeStr a cpe identifier * @param cpeStr a cpe identifier
* @return a dependency version * @return a dependency version
@@ -818,7 +859,8 @@ public class CveDB {
} }
/** /**
* Takes a CPE and parses out the version number. If no version is identified then a '-' is returned. * Takes a CPE and parses out the version number. If no version is
* identified then a '-' is returned.
* *
* @param cpe a cpe object * @param cpe a cpe object
* @return a dependency version * @return a dependency version

View File

@@ -17,8 +17,12 @@
*/ */
package org.owasp.dependencycheck.data.nvdcve; package org.owasp.dependencycheck.data.nvdcve;
import java.util.HashMap;
import java.util.HashSet;
import java.util.List; import java.util.List;
import java.util.Map.Entry;
import java.util.Set; import java.util.Set;
import org.junit.Assert;
import static org.junit.Assert.assertFalse; import static org.junit.Assert.assertFalse;
import static org.junit.Assert.assertTrue; import static org.junit.Assert.assertTrue;
import org.junit.Test; import org.junit.Test;
@@ -70,24 +74,68 @@ public class CveDBIntegrationTest extends BaseDBTestCase {
instance.open(); instance.open();
List result = instance.getVulnerabilities(cpeStr); List result = instance.getVulnerabilities(cpeStr);
assertTrue(result.size() > 5); assertTrue(result.size() > 5);
cpeStr = "cpe:/a:jruby:jruby:1.6.3";
result = instance.getVulnerabilities(cpeStr);
assertTrue(result.size() > 1);
} finally { } finally {
instance.close(); instance.close();
} }
} }
/** /**
* Test of isAffected method, of class CveDB. * Test of getMatchingSoftware method, of class CveDB.
*/ */
@Test @Test
public void testIsAffected() throws Exception { public void testGetMatchingSoftware() throws Exception {
String vendor = "openssl"; HashMap<String, Boolean> versions = new HashMap<String, Boolean>();
String product = "openssl";
DependencyVersion identifiedVersion = new DependencyVersion("1.0.1o"); DependencyVersion identifiedVersion = new DependencyVersion("1.0.1o");
String cpeId = "cpe:/a:openssl:openssl:1.0.1e"; versions.put("cpe:/a:openssl:openssl:1.0.1e", Boolean.FALSE);
String previous = "y";
CveDB instance = new CveDB(); CveDB instance = new CveDB();
assertFalse(instance.isAffected(vendor, product, identifiedVersion, cpeId, previous)); Entry<String, Boolean> results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNull(results);
versions.put("cpe:/a:openssl:openssl:1.0.1p", Boolean.FALSE);
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNull(results);
versions.put("cpe:/a:openssl:openssl:1.0.1q", Boolean.TRUE);
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNotNull(results);
Assert.assertEquals("cpe:/a:openssl:openssl:1.0.1q", results.getKey());
versions.clear();
versions.put("cpe:/a:springsource:spring_framework:3.2.5", Boolean.FALSE);
versions.put("cpe:/a:springsource:spring_framework:3.2.6", Boolean.FALSE);
versions.put("cpe:/a:springsource:spring_framework:3.2.7", Boolean.TRUE);
versions.put("cpe:/a:springsource:spring_framework:4.0.1", Boolean.TRUE);
versions.put("cpe:/a:springsource:spring_framework:4.0.0:m1", Boolean.FALSE);
versions.put("cpe:/a:springsource:spring_framework:4.0.0:m2", Boolean.FALSE);
versions.put("cpe:/a:springsource:spring_framework:4.0.0:rc1", Boolean.FALSE);
identifiedVersion = new DependencyVersion("3.2.2");
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertEquals("cpe:/a:springsource:spring_framework:3.2.7", results.getKey());
Assert.assertTrue(results.getValue());
identifiedVersion = new DependencyVersion("3.2.12");
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNull(results);
identifiedVersion = new DependencyVersion("4.0.0");
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertEquals("cpe:/a:springsource:spring_framework:4.0.1", results.getKey());
Assert.assertTrue(results.getValue());
identifiedVersion = new DependencyVersion("4.1.0");
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNull(results);
versions.clear();
versions.put("cpe:/a:jruby:jruby:-", Boolean.FALSE);
identifiedVersion = new DependencyVersion("1.6.3");
results = instance.getMatchingSoftware(versions, identifiedVersion);
Assert.assertNotNull(results);
} }