# Run the spdx-to-osv tool, taking the information from the SPDX SBOM and mapping it to OSV vulnerabilities $ java -jar ./target/spdx-to-osv-0.0.4-SNAPSHOT-jar-with-dependencies.jar -I k8s-1.21.3-source.spdx -O out-k8s.1.21.3.json
# Show the output OSV vulnerabilities of the spdx-to-osv tool $ cat out-k8s.1.21.3.json … { "id": "GHSA-w73w-5m7g-f7qc", "published": "2021-05-18T21:08:21Z", "modified": "2021-06-28T21:32:34Z", "aliases": [ "CVE-2020-26160" ], "summary": "Authorization bypass in github.com/dgrijalva/jwt-go", "details": "jwt-go allows attackers to bypass intended access restrictions in situations with []string{} for m[\"aud\"] (which is allowed by the specification). Because the type assertion fails, \"\" is the value of aud. This is a security problem if the JWT token is presented to a service that lacks its own audience check. There is no patch available and users of jwt-go are advised to migrate to [golang-jwt](https://github.com/golang-jwt/jwt) at version 3.2.1", "affected": [ { "package": { "name": "github.com/dgrijalva/jwt-go", "ecosystem": "Go", "purl": "pkg:golang/github.com/dgrijalva/jwt-go" }, …
|
沒有留言 :
張貼留言