Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support PURL as identifier #173

Closed
fortresslabs opened this issue May 20, 2022 · 10 comments
Closed

Support PURL as identifier #173

fortresslabs opened this issue May 20, 2022 · 10 comments

Comments

@fortresslabs
Copy link

Please add PURL as a unique identifier to the schema as there is currently no way to identify software component vulnerabilities without a PURL lookup. https://github.com/package-url/purl-spec

@chandanbn chandanbn added this to the CVE Record JSON Format v5.1 milestone Jun 16, 2022
@kurtseifried
Copy link
Contributor

Seconded. Had I known that Purl would take off I would have added it to the original CVE JSON specification I wrote.

@redlinejoes
Copy link

Thirded. Thanks, Steve, for your excellent writeup at OWASP New Recommendations to Improve The NVD.
I'm excited about the feature to query the NVD directly using the native package coordinates or purl of the software and receive accurate vulnerability information.

@pombredanne
Copy link

As the original purl author I support this of course! and I am available to help as needed.

@chandanbn
Copy link
Collaborator

chandanbn commented Oct 1, 2022

The schema currently does indeed support PURLs. The work pending in 5.1 is to allow versionType field for non-range versions (so one can say versionType="PURL"

What may be useful:

  • Code to auto generate PURLs based on individual fields in the affected structure
  • regex to validate PURLs.

You can currently (CVE JSON v5.0) supply them in the list of versions eg.,

  "affected": [
    {
      "collectionURL": "https://rubygems.org",
      "packageName": "ruby-advisory-db-check",
      "versions": [
        {
          "status": "affected",
          "version": "pkg:gem/ruby-advisory-db-check@0.12.4"
        },
        {
          "status": "affected",
          "version": "0.12.4"
        }
      ],
      "defaultStatus": "unaffected"
    }
  ],

@juliancoccia
Copy link

For the record, we have just released our entire CPE <-> PURL dataset here:

https://github.com/scanoss/purl2cpe

@Pizza-Ria
Copy link

@chandanbn It sounds like your suggestion to address purls is simply to add an extra version to the "affected" list pending the release of the CVE JSON 5.1. Is there any work in process on your other ideas of

  • Code to auto generate PURLs based on individual fields in the affected structure
  • Regex to validate PURLs

Also, any idea when CVE JSON 5.1 will be released?

@hibbardc
Copy link

impatiently awaiting CVE 5.1 for this. This will go a long way to solve the industry package Naming Problem.

@chandanbn
Copy link
Collaborator

will be addressed via #201

@mehradn7
Copy link

mehradn7 commented Jan 5, 2024

Hello, is there a way to track the progress of NVD adopting CVE JSON 5.1 and supporting queries with pURL ?
Thanks!

@Pizza-Ria
Copy link

Any update on this?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

9 participants