Files
trivy/integration/testdata/pubspec.lock.json.golden
Juan Ariza Toledano 1f0d6290c3 feat(vuln): include pkg identifier on detected vulnerabilities (#5439)
Signed-off-by: juan131 <jariza@vmware.com>
Signed-off-by: knqyf263 <knqyf263@gmail.com>
Co-authored-by: DmitriyLewen <dmitriy.lewen@smartforce.io>
Co-authored-by: DmitriyLewen <91113035+DmitriyLewen@users.noreply.github.com>
Co-authored-by: Nikita Pivkin <nikita.pivkin@smartforce.io>
Co-authored-by: knqyf263 <knqyf263@gmail.com>
2023-12-27 07:54:56 +00:00

94 lines
3.0 KiB
Plaintext

{
"SchemaVersion": 2,
"CreatedAt": "2021-08-25T12:20:30.000000005Z",
"ArtifactName": "testdata/fixtures/repo/pubspec",
"ArtifactType": "repository",
"Metadata": {
"ImageConfig": {
"architecture": "",
"created": "0001-01-01T00:00:00Z",
"os": "",
"rootfs": {
"type": "",
"diff_ids": null
},
"config": {}
}
},
"Results": [
{
"Target": "pubspec.lock",
"Class": "lang-pkgs",
"Type": "pub",
"Packages": [
{
"ID": "http@0.13.2",
"Name": "http",
"Identifier": {
"PURL": "pkg:pub/http@0.13.2"
},
"Version": "0.13.2",
"Layer": {}
},
{
"ID": "shelf@1.3.1",
"Name": "shelf",
"Identifier": {
"PURL": "pkg:pub/shelf@1.3.1"
},
"Version": "1.3.1",
"Indirect": true,
"Layer": {}
}
],
"Vulnerabilities": [
{
"VulnerabilityID": "CVE-2020-35669",
"PkgID": "http@0.13.2",
"PkgName": "http",
"PkgIdentifier": {
"PURL": "pkg:pub/http@0.13.2"
},
"InstalledVersion": "0.13.2",
"FixedVersion": "0.13.3",
"Status": "fixed",
"Layer": {},
"SeveritySource": "ghsa",
"PrimaryURL": "https://avd.aquasec.com/nvd/cve-2020-35669",
"DataSource": {
"ID": "ghsa",
"Name": "GitHub Security Advisory Pub",
"URL": "https://github.com/advisories?query=type%3Areviewed+ecosystem%3Apub"
},
"Title": "http before 0.13.3 vulnerable to header injection",
"Description": "An issue was discovered in the http package before 0.13.3 for Dart. If the attacker controls the HTTP method and the app is using Request directly, it's possible to achieve CRLF injection in an HTTP request via HTTP header injection. This issue has been addressed in commit abb2bb182 by validating request methods.",
"Severity": "MEDIUM",
"CweIDs": [
"CWE-74"
],
"VendorSeverity": {
"ghsa": 2
},
"CVSS": {
"ghsa": {
"V3Vector": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"V3Score": 6.1
}
},
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2020-35669",
"https://github.com/dart-lang/http/issues/511",
"https://github.com/dart-lang/http/blob/master/CHANGELOG.md#0133",
"https://github.com/dart-lang/http/pull/512",
"https://github.com/dart-lang/http/commit/abb2bb182fbd7f03aafd1f889b902d7b3bdb8769",
"https://pub.dev/packages/http/changelog#0133",
"https://github.com/advisories/GHSA-4rgh-jx4f-qfcq"
],
"PublishedDate": "2022-05-24T17:37:16Z",
"LastModifiedDate": "2022-10-06T20:26:08Z"
}
]
}
]
}