|
40 | 40 | - [Input Arguments](#input-arguments)
|
41 | 41 | - [directory (positional argument)](#directory-positional-argument)
|
42 | 42 | - [-i INPUT\_FILE, --input-file INPUT\_FILE](#-i-input_file---input-file-input_file)
|
43 |
| - - [--triage-input-file INPUT\_FILE](#--triage-input-file-input_file) |
44 | 43 | - [--sbom-file SBOM\_FILE](#--sbom-file-sbom_file)
|
45 | 44 | - [--vex-file VEX\_FILE](#--vex-file-vex_file)
|
46 | 45 | - [-L PACKAGE\_LIST, --package-list PACKAGE\_LIST](#-l-package_list---package-list-package_list)
|
@@ -703,140 +702,6 @@ Note that `--input-file`, unlike `cve-bin-tool directory` scan, will work on _an
|
703 | 702 |
|
704 | 703 | > Note: For backward compatibility, we still support `csv2cve` command for producing CVEs from csv but we recommend using new `--input-file` command instead.
|
705 | 704 |
|
706 |
| -### --triage-input-file INPUT_FILE |
707 |
| - |
708 |
| -This option allows you to provide triage data and incorporate that into the output so that people could spend less time re-triaging. The supported format |
709 |
| -is the [CycloneDX](https://cyclonedx.org/capabilities/vex/) VEX format which can be generated using the `--vex` option. |
710 |
| -For the triage process, the **state** value in the analysis section of each CVE should have one of the following values: |
711 |
| - |
712 |
| -``` |
713 |
| -"under_review" - this is the default state and should be used to indicate the vulnerability is to be reviewed |
714 |
| -"in_triage" - this should be used to indicate that the vulnerability is being reviewed |
715 |
| -"exploitable" - this should be used to indicate that the vulnerability is known to be exploitable |
716 |
| -"not_affected" - this should be used to indicate that the vulnerability has been mitigated |
717 |
| -``` |
718 |
| - |
719 |
| -The **detail** value in the analysis section can be used to provide comments related to the state |
720 |
| - |
721 |
| -For example, if `input_file.csv` contains the following data: |
722 |
| - |
723 |
| -``` |
724 |
| -| vendor | product | version | |
725 |
| -| --------------- | --------- | --------- | |
726 |
| -| plot | plotly | h5.10.0 | |
727 |
| -| pocoo | jinja2 | 3.1.2 | |
728 |
| -| aiohttp_project | aiohttp | 3.8.1 | |
729 |
| -| pyyaml | pyyaml | 6.0 | |
730 |
| -| python | requests | 2.28.1 | |
731 |
| -| python | urllib3 | 1.26.12 | |
732 |
| -| skontar | cvss | 2.5 | |
733 |
| -| getbootstrap | bootstrap | 5.2.0 | |
734 |
| -| plotly | plotly.js | 2.13.2 | |
735 |
| -``` |
736 |
| - |
737 |
| -Where `aiohttp_project` and `plotly` are affected by `CVE-2022-33124` and `GMS-2016-69`, respectively, |
738 |
| -you could provide the following triage file: |
739 |
| - |
740 |
| -``` |
741 |
| -{ |
742 |
| - "bomFormat": "CycloneDX", |
743 |
| - "specVersion": "1.4", |
744 |
| - "version": 1, |
745 |
| - "vulnerabilities": [ |
746 |
| - { |
747 |
| - "id": "GMS-2016-69", |
748 |
| - "source": { |
749 |
| - "name": "NVD", |
750 |
| - "url": "https://nvd.nist.gov/vuln/detail/GMS-2016-69" |
751 |
| - }, |
752 |
| - "ratings": [ |
753 |
| - { |
754 |
| - "source": { |
755 |
| - "name": "NVD", |
756 |
| - "url": "https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?name=GMS-2016-69&vector=unknown&version=2.0" |
757 |
| - }, |
758 |
| - "score": "unknown", |
759 |
| - "severity": "unknown", |
760 |
| - "method": "CVSSvunknown", |
761 |
| - "vector": "unknown" |
762 |
| - } |
763 |
| - ], |
764 |
| - "cwes": [], |
765 |
| - "description": "If an attacker can trick an unsuspecting user into viewing a specially crafted plot on a site that uses plotly.js, then the attacker could potentially retrieve authentication tokens and perform actions on behalf of the user.", |
766 |
| - "recommendation": "", |
767 |
| - "advisories": [], |
768 |
| - "created": "NOT_KNOWN", |
769 |
| - "published": "NOT_KNOWN", |
770 |
| - "updated": "NOT_KNOWN", |
771 |
| - "analysis": { |
772 |
| - "state": "not_affected", |
773 |
| - "response": [ "code_not_reachable" ], |
774 |
| - "justification": "", |
775 |
| - "detail": "" |
776 |
| - }, |
777 |
| - "affects": [ |
778 |
| - { |
779 |
| - "ref": "urn:cdx:NOTKNOWN/1#plotly.js:2.13.2" |
780 |
| - } |
781 |
| - ] |
782 |
| - } |
783 |
| - ] |
784 |
| -} |
785 |
| -``` |
786 |
| - |
787 |
| -Then when you invoke `cve-bin-tool` like this: |
788 |
| - |
789 |
| -```console |
790 |
| -cve-bin-tool -i="input_file.csv" --triage-input-file triage.vex |
791 |
| -``` |
792 |
| - |
793 |
| -The output will look like following: |
794 |
| - |
795 |
| -``` |
796 |
| -╔══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╗ |
797 |
| -║ CVE BINARY TOOL version: 3.1.1 ║ |
798 |
| -╚══════════════════════════════════════════════════════════════════════════════════════════════════════════════════════╝ |
799 |
| -
|
800 |
| - • Report Generated: 2022-11-09 13:52:20 |
801 |
| - • Time of last update of CVE Data: 2022-11-09 13:39:31 |
802 |
| -╭─────────────╮ |
803 |
| -│ CVE SUMMARY │ |
804 |
| -╰─────────────╯ |
805 |
| -┏━━━━━━━━━━┳━━━━━━━┓ |
806 |
| -┃ Severity ┃ Count ┃ |
807 |
| -┡━━━━━━━━━━╇━━━━━━━┩ |
808 |
| -│ CRITICAL │ 0 │ |
809 |
| -│ HIGH │ 0 │ |
810 |
| -│ MEDIUM │ 1 │ |
811 |
| -│ LOW │ 0 │ |
812 |
| -└──────────┴───────┘ |
813 |
| -╭───────────────────╮ |
814 |
| -│ Unexplored CVEs │ |
815 |
| -╰───────────────────╯ |
816 |
| -┏━━━━━━━━━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━━━━━━━━┳━━━━━━━━┳━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━┓ |
817 |
| -┃ Vendor ┃ Product ┃ Version ┃ CVE Number ┃ Source ┃ Severity ┃ Score (CVSS Version) ┃ |
818 |
| -┡━━━━━━━━━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━━━━━━━━╇━━━━━━━━╇━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━┩ |
819 |
| -│ aiohttp_project │ aiohttp │ 3.8.1 │ CVE-2022-33124 │ NVD │ MEDIUM │ 5.5 (v3) │ |
820 |
| -└─────────────────┴─────────┴─────────┴────────────────┴────────┴──────────┴──────────────────────┘ |
821 |
| -┏━━━━━━━━━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━┳━━━━━━┳━━━━━━━━━━┓ |
822 |
| -┃ Vendor ┃ Product ┃ Version ┃ Root ┃ Filename ┃ |
823 |
| -┡━━━━━━━━━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━╇━━━━━━╇━━━━━━━━━━┩ |
824 |
| -│ aiohttp_project │ aiohttp │ 3.8.1 │ │ │ |
825 |
| -└─────────────────┴─────────┴─────────┴──────┴──────────┘ |
826 |
| -╭──────────────────╮ |
827 |
| -│ Mitigated CVEs │ |
828 |
| -╰──────────────────╯ |
829 |
| -┏━━━━━━━━┳━━━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━━━━━┳━━━━━━━━┳━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━┓ |
830 |
| -┃ Vendor ┃ Product ┃ Version ┃ CVE Number ┃ Source ┃ Severity ┃ Score (CVSS Version) ┃ |
831 |
| -┡━━━━━━━━╇━━━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━━━━━╇━━━━━━━━╇━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━┩ |
832 |
| -│ plotly │ plotly.js │ 2.13.2 │ GMS-2016-69 │ GAD │ unknown │ unknown │ |
833 |
| -└────────┴───────────┴─────────┴─────────────┴────────┴──────────┴──────────────────────┘ |
834 |
| -┏━━━━━━━━┳━━━━━━━━━━━┳━━━━━━━━━┳━━━━━━┳━━━━━━━━━━┓ |
835 |
| -┃ Vendor ┃ Product ┃ Version ┃ Root ┃ Filename ┃ |
836 |
| -┡━━━━━━━━╇━━━━━━━━━━━╇━━━━━━━━━╇━━━━━━╇━━━━━━━━━━┩ |
837 |
| -│ plotly │ plotly.js │ 2.13.2 │ │ │ |
838 |
| -└────────┴───────────┴─────────┴──────┴──────────┘ |
839 |
| -``` |
840 | 705 |
|
841 | 706 | ### --sbom-file SBOM_FILE
|
842 | 707 |
|
@@ -931,7 +796,7 @@ input:
|
931 | 796 | directory: test/assets
|
932 | 797 | # To supplement triage data of previous scan or run standalone as csv2cve
|
933 | 798 | # Currently we only support vex file.
|
934 |
| - triage_input_file: triage.vex |
| 799 | + vex_file: triage.json |
935 | 800 |
|
936 | 801 | checker:
|
937 | 802 | # list of checkers you want to skip
|
|
0 commit comments