Skip to content

Commit 25e532e

Browse files
🎉 Add fix_available information to jfrog xray unified parser #12633 (#13105)
1 parent 7d3b999 commit 25e532e

File tree

2 files changed

+4
-0
lines changed

2 files changed

+4
-0
lines changed

dojo/tools/jfrog_xray_unified/parser.py

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,12 +80,14 @@ def get_item(vulnerability, test):
8080
if "cvss_v2_vector" in worstCve:
8181
cvss_v2 = worstCve["cvss_v2_vector"]
8282

83+
fix_available = False
8384
if (
8485
"fixed_versions" in vulnerability
8586
and len(vulnerability["fixed_versions"]) > 0
8687
):
8788
mitigation = "Versions containing a fix:\n"
8889
mitigation += "\n".join(vulnerability["fixed_versions"])
90+
fix_available = True
8991

9092
if (
9193
"external_advisory_source" in vulnerability
@@ -138,6 +140,7 @@ def get_item(vulnerability, test):
138140
date=scan_time,
139141
unique_id_from_tool=vulnerability["issue_id"],
140142
tags=tags,
143+
fix_available=fix_available,
141144
)
142145

143146
cvss_data = parse_cvss_data(cvssv3)

unittests/tools/test_jfrog_xray_unified_parser.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ def test_parse_file_with_one_vuln(self):
2727
self.assertEqual(1, len(item.unsaved_vulnerability_ids))
2828
self.assertEqual("CVE-2020-28493", item.unsaved_vulnerability_ids[0])
2929
self.assertEqual("Medium", item.severity)
30+
self.assertEqual(True, item.fix_available)
3031
self.assertEqual("This affects the package", item.description[:24])
3132
self.assertEqual(" memory.", item.description[-8:])
3233
self.assertIsNotNone(item.mitigation)

0 commit comments

Comments
 (0)