-
Notifications
You must be signed in to change notification settings - Fork 1
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #13 from cs278/ignore-cve
Ignore advisory by CVE
- Loading branch information
Showing
6 changed files
with
284 additions
and
4 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,57 @@ | ||
--TEST-- | ||
Test invalid ignore rules are handled. | ||
--CONDITION-- | ||
true | ||
--COMPOSER-- | ||
{ | ||
"require-dev": { | ||
"symfony/http-foundation": "=2.0.4" | ||
}, | ||
"extra": { | ||
"composer-audit": { | ||
"ignore": [ | ||
{"type": "package", "value": "foo/bar"}, | ||
{"type": "cve", "value": ""}, | ||
{"type": "", "value": "test"} | ||
] | ||
} | ||
} | ||
} | ||
--ARGS-- | ||
-vv | ||
--EXPECT-EXIT-- | ||
1 | ||
--EXPECT-OUTPUT-- | ||
Ignoring invalid ignore rule: `{"type":"package","value":"foo\/bar"}` | ||
Ignoring invalid ignore rule: `{"type":"cve","value":""}` | ||
Ignoring invalid ignore rule: `{"type":"","value":"test"}` | ||
Found 9 advisories affecting 1 package(s). | ||
|
||
composer://symfony/http-foundation (2.0.4) | ||
* Request::getClientIp() when the trust proxy mode is enabled | ||
- <https://symfony.com/blog/security-release-symfony-2-0-19-and-2-1-4> | ||
* CVE-2012-6431 Routes behind a firewall are accessible even when not logged in | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6431> | ||
- <https://symfony.com/blog/security-release-symfony-2-0-20-and-2-1-5-released> | ||
* CVE-2013-4752 Request::getHost() poisoning | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4752> | ||
- <https://symfony.com/blog/security-releases-symfony-2-0-24-2-1-12-2-2-5-and-2-3-3-released> | ||
* CVE-2014-5244 Denial of service with a malicious HTTP Host header | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5244> | ||
- <https://symfony.com/cve-2014-5244> | ||
* CVE-2014-6061 Security issue when parsing the Authorization header | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6061> | ||
- <https://symfony.com/cve-2014-6061> | ||
* CVE-2015-2309 Unsafe methods in the Request class | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2309> | ||
- <https://symfony.com/cve-2015-2309> | ||
* CVE-2018-11386 Denial of service when using PDOSessionHandler | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386> | ||
- <https://symfony.com/cve-2018-11386> | ||
* CVE-2018-14773 Remove support for legacy and risky HTTP headers | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14773> | ||
- <https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers> | ||
* CVE-2019-18888 Prevent argument injection in a MimeTypeGuesser | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888> | ||
- <https://symfony.com/cve-2019-18888> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,53 @@ | ||
--TEST-- | ||
Test invalid ignore rules are handled. | ||
--CONDITION-- | ||
true | ||
--COMPOSER-- | ||
{ | ||
"require-dev": { | ||
"symfony/http-foundation": "=2.0.4" | ||
}, | ||
"extra": { | ||
"composer-audit": { | ||
"ignore": [ | ||
{"type": "package", "value": "foo/bar"}, | ||
{"type": "cve", "value": ""}, | ||
{"type": "", "value": "test"} | ||
] | ||
} | ||
} | ||
} | ||
--ARGS-- | ||
--EXPECT-EXIT-- | ||
1 | ||
--EXPECT-OUTPUT-- | ||
Found 9 advisories affecting 1 package(s). | ||
|
||
composer://symfony/http-foundation (2.0.4) | ||
* Request::getClientIp() when the trust proxy mode is enabled | ||
- <https://symfony.com/blog/security-release-symfony-2-0-19-and-2-1-4> | ||
* CVE-2012-6431 Routes behind a firewall are accessible even when not logged in | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6431> | ||
- <https://symfony.com/blog/security-release-symfony-2-0-20-and-2-1-5-released> | ||
* CVE-2013-4752 Request::getHost() poisoning | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4752> | ||
- <https://symfony.com/blog/security-releases-symfony-2-0-24-2-1-12-2-2-5-and-2-3-3-released> | ||
* CVE-2014-5244 Denial of service with a malicious HTTP Host header | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-5244> | ||
- <https://symfony.com/cve-2014-5244> | ||
* CVE-2014-6061 Security issue when parsing the Authorization header | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6061> | ||
- <https://symfony.com/cve-2014-6061> | ||
* CVE-2015-2309 Unsafe methods in the Request class | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2309> | ||
- <https://symfony.com/cve-2015-2309> | ||
* CVE-2018-11386 Denial of service when using PDOSessionHandler | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386> | ||
- <https://symfony.com/cve-2018-11386> | ||
* CVE-2018-14773 Remove support for legacy and risky HTTP headers | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14773> | ||
- <https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers> | ||
* CVE-2019-18888 Prevent argument injection in a MimeTypeGuesser | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888> | ||
- <https://symfony.com/cve-2019-18888> | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,23 @@ | ||
--TEST-- | ||
Test that an ignored CVE does not result in an error. | ||
--CONDITION-- | ||
true | ||
--COMPOSER-- | ||
{ | ||
"require-dev": { | ||
"symfony/security-core": "=5.2.7" | ||
}, | ||
"extra": { | ||
"composer-audit": { | ||
"ignore": [ | ||
{"type": "cve", "value": "CVE-2021-21424"} | ||
] | ||
} | ||
} | ||
} | ||
--ARGS-- | ||
--EXPECT-EXIT-- | ||
0 | ||
--EXPECT-OUTPUT-- | ||
Found 1 advisories affecting 1 package(s). | ||
1 advisories were ignored. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,45 @@ | ||
--TEST-- | ||
Test that an ignored CVE does not result in an error. | ||
--CONDITION-- | ||
true | ||
--COMPOSER-- | ||
{ | ||
"require-dev": { | ||
"symfony/http-foundation": "=2.0.4" | ||
}, | ||
"extra": { | ||
"composer-audit": { | ||
"ignore": [ | ||
{"type": "cve", "value": "CVE-2012-6431"}, | ||
{"type": "cve", "value": "CVE-2013-4752"}, | ||
{"type": "cve", "value": "CVE-2014-5244"} | ||
] | ||
} | ||
} | ||
} | ||
--ARGS-- | ||
--EXPECT-EXIT-- | ||
2 | ||
--EXPECT-OUTPUT-- | ||
Found 9 advisories affecting 1 package(s). | ||
|
||
composer://symfony/http-foundation (2.0.4) | ||
* Request::getClientIp() when the trust proxy mode is enabled | ||
- <https://symfony.com/blog/security-release-symfony-2-0-19-and-2-1-4> | ||
* CVE-2014-6061 Security issue when parsing the Authorization header | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6061> | ||
- <https://symfony.com/cve-2014-6061> | ||
* CVE-2015-2309 Unsafe methods in the Request class | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-2309> | ||
- <https://symfony.com/cve-2015-2309> | ||
* CVE-2018-11386 Denial of service when using PDOSessionHandler | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-11386> | ||
- <https://symfony.com/cve-2018-11386> | ||
* CVE-2018-14773 Remove support for legacy and risky HTTP headers | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-14773> | ||
- <https://symfony.com/blog/cve-2018-14773-remove-support-for-legacy-and-risky-http-headers> | ||
* CVE-2019-18888 Prevent argument injection in a MimeTypeGuesser | ||
- <https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18888> | ||
- <https://symfony.com/cve-2019-18888> | ||
|
||
3 advisories were ignored. |