Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Data Quality Issue / Spec Uncertainty: Multiple "fixed" Events for a single "introduced" event in CVE-2024-21534 #2820

Open
krysklyk opened this issue Nov 4, 2024 · 2 comments
Labels
data quality Issues with data quality

Comments

@krysklyk
Copy link

krysklyk commented Nov 4, 2024

I've been tracking why none of the security scanners detect my honeypot npm project with a dependency on [email protected]. I think I tracked it down to the source data but I'm not sure if the source is wrong, because the specification isn't quite clear to me on this case:

We can see that the source has a single introduced event, followed by a fixed which was release with 10.0.0 but later found to be incomplete, and then another fixed event for the fix in 10.0.7. The description is correctly stating that the fix in 6b2f1b (10.0.0) was incomplete and the first version without known exploit is b70aa7 / 10.0.7 However, OSV interprets this as "versions before 10.0.0 are affactected", resulting in false negatives on 10.0.0..10.0.6.

{
  "id": "CVE-2024-21534",
  "details": "Versions of the package jsonpath-plus before 10.0.7 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of vm in Node.\r\r**Note:**\r\rThere was an attempt to fix it in version [10.0.0](https://github.com/JSONPath-Plus/JSONPath/commit/6b2f1b4c234292c75912b790bf7e2d7339d4ccd3) but it could still be exploited using [different payloads](https://github.com/JSONPath-Plus/JSONPath/issues/226).",
  "affected": [
    {
      "ranges": [
        {
          "type": "GIT",
          "repo": "https://github.com/jsonpath-plus/jsonpath",
          "events": [
            {
              "introduced": "0"
            },
            {
              "fixed": "6b2f1b4c234292c75912b790bf7e2d7339d4ccd3"
            },
            {
              "fixed": "b70aa713553caf838a63bac923195a5bc541fd72"
            }
          ]
        }
      ]
    }
  ],
...
}
@andrewpollock andrewpollock added the data quality Issues with data quality label Nov 7, 2024
Copy link

github-actions bot commented Nov 7, 2024

✨ Thank you for your interest in OSV.dev's data quality! ✨

Please review our FAQ entry on how to most efficiently have this addressed.

@andrewpollock
Copy link
Contributor

Thanks for bringing this to our attention.

This is one of the challenges with programmatically converting records from the NVD...

I note that for https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2024-21534 at time of writing:

  • the NVD is yet to perform analysis on it, so it has no machine-readable applicability information
  • our conversion process is resorting to treating the two (and this is where the problem lies) commit references as fixed commits

I'm not immediately seeing a good path forward for scenarios like this one, unfortunately, other than opting not to convert CVEs at all in this particular scenario (we tend to bias against false positives but false negatives are also not great either...). /cc @oliverchang

We are giving thought to also attempting to convert the CVEs from the CVE List directly, and looking at https://cveawg.mitre.org/api/cve/CVE-2024-21534 I can see that there's the possibility of a more accurate conversion from there.

In the short term, once the NVD analyses this record, its conversion story should improve.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
data quality Issues with data quality
Projects
None yet
Development

No branches or pull requests

2 participants