Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Version 9.1.0 reporting issues on itself #6651

Open
johannes-wannenburg opened this issue May 7, 2024 · 2 comments
Open

Version 9.1.0 reporting issues on itself #6651

johannes-wannenburg opened this issue May 7, 2024 · 2 comments
Labels

Comments

@johannes-wannenburg
Copy link

Hi,

We receive these messages which appear to be related to Maven packages loaded by the scanning tool. Is this expected? How should we deal with these as they are blocking our pipelines.

Screenshot 2024-05-08 at 8 19 29 AM Screenshot 2024-05-08 at 8 15 36 AM Screenshot 2024-05-08 at 8 22 41 AM
@aikebah
Copy link
Collaborator

aikebah commented May 8, 2024

First question you should ask yourself is why you're scanning a build tool for its known vulnerable dependencies in a blocking step of a software delivery pipeline.

Looks like you're not scanning the right folders. Scanning the tool would be a good practice for a build tooling vulnerability monitoring pipeline, not for an individual software project I'd say.

So the best way to handle your current blockage is by making sure that you scan only your project and its (runtime) dependencies.

Upgrade of h2 is not foreseen until v 10.x (as the h2 upgrade could/would break builds) - #6132, but the vulnerability reported on it is disputed by the authors and applicable only to running h2 as a local db server with a web console, so not applicable to OWASP DC's usage of it as an embedded database engine.

Logback is referred in #6178 as an update requiring more work. If it's the same CVE that gets flagged then the usage of OWASP DC is not affected by it.

Bouncycastle would need some deeper look, but I'm away from computer until after the weekend.

@johannes-wannenburg
Copy link
Author

Thanks for the feedback, I assumed it could be by design.

The config I used is spelling out the paths to scan, but I found the issue based on your feedback. I see that the previous person configured "-s .", causing this behaviour. I removed this and it is no longer reporting on OWASP.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants