mirror of https://github.com/renovatebot/renovate
627 lines
19 KiB
TypeScript
627 lines
19 KiB
TypeScript
// TODO #22198
|
|
import type { Ecosystem, Osv } from '@renovatebot/osv-offline';
|
|
import { OsvOffline } from '@renovatebot/osv-offline';
|
|
import is from '@sindresorhus/is';
|
|
import type { CvssScore } from 'vuln-vects';
|
|
import { parseCvssVector } from 'vuln-vects';
|
|
import { getManagerConfig, mergeChildConfig } from '../../../config';
|
|
import type { PackageRule, RenovateConfig } from '../../../config/types';
|
|
import { logger } from '../../../logger';
|
|
import { getDefaultVersioning } from '../../../modules/datasource/common';
|
|
import type {
|
|
PackageDependency,
|
|
PackageFile,
|
|
} from '../../../modules/manager/types';
|
|
import type { VersioningApi } from '../../../modules/versioning';
|
|
import { get as getVersioning } from '../../../modules/versioning';
|
|
import { findGithubToken } from '../../../util/check-token';
|
|
import { find } from '../../../util/host-rules';
|
|
import { sanitizeMarkdown } from '../../../util/markdown';
|
|
import * as p from '../../../util/promises';
|
|
import { regEx } from '../../../util/regex';
|
|
import { titleCase } from '../../../util/string';
|
|
import type {
|
|
DependencyVulnerabilities,
|
|
SeverityDetails,
|
|
Vulnerability,
|
|
} from './types';
|
|
|
|
export class Vulnerabilities {
|
|
private osvOffline: OsvOffline | undefined;
|
|
|
|
private static readonly datasourceEcosystemMap: Record<
|
|
string,
|
|
Ecosystem | undefined
|
|
> = {
|
|
crate: 'crates.io',
|
|
go: 'Go',
|
|
hex: 'Hex',
|
|
maven: 'Maven',
|
|
npm: 'npm',
|
|
nuget: 'NuGet',
|
|
packagist: 'Packagist',
|
|
pypi: 'PyPI',
|
|
rubygems: 'RubyGems',
|
|
};
|
|
|
|
private constructor() {}
|
|
|
|
private async initialize(): Promise<void> {
|
|
// hard-coded logic to use authentication for github.com based on the githubToken for api.github.com
|
|
const token = findGithubToken(
|
|
find({
|
|
hostType: 'github',
|
|
url: 'https://api.github.com/',
|
|
}),
|
|
);
|
|
|
|
this.osvOffline = await OsvOffline.create(token);
|
|
}
|
|
|
|
static async create(): Promise<Vulnerabilities> {
|
|
const instance = new Vulnerabilities();
|
|
await instance.initialize();
|
|
return instance;
|
|
}
|
|
|
|
async appendVulnerabilityPackageRules(
|
|
config: RenovateConfig,
|
|
packageFiles: Record<string, PackageFile[]>,
|
|
): Promise<void> {
|
|
const dependencyVulnerabilities = await this.fetchDependencyVulnerabilities(
|
|
config,
|
|
packageFiles,
|
|
);
|
|
|
|
config.packageRules ??= [];
|
|
for (const {
|
|
vulnerabilities,
|
|
versioningApi,
|
|
} of dependencyVulnerabilities) {
|
|
const groupPackageRules: PackageRule[] = [];
|
|
for (const vulnerability of vulnerabilities) {
|
|
const rule = this.vulnerabilityToPackageRules(vulnerability);
|
|
if (is.nullOrUndefined(rule)) {
|
|
continue;
|
|
}
|
|
groupPackageRules.push(rule);
|
|
}
|
|
this.sortByFixedVersion(groupPackageRules, versioningApi);
|
|
|
|
config.packageRules.push(...groupPackageRules);
|
|
}
|
|
}
|
|
|
|
async fetchVulnerabilities(
|
|
config: RenovateConfig,
|
|
packageFiles: Record<string, PackageFile[]>,
|
|
): Promise<Vulnerability[]> {
|
|
const groups = await this.fetchDependencyVulnerabilities(
|
|
config,
|
|
packageFiles,
|
|
);
|
|
return groups.flatMap((group) => group.vulnerabilities);
|
|
}
|
|
|
|
private async fetchDependencyVulnerabilities(
|
|
config: RenovateConfig,
|
|
packageFiles: Record<string, PackageFile[]>,
|
|
): Promise<DependencyVulnerabilities[]> {
|
|
const managers = Object.keys(packageFiles);
|
|
const allManagerJobs = managers.map((manager) =>
|
|
this.fetchManagerVulnerabilities(config, packageFiles, manager),
|
|
);
|
|
return (await Promise.all(allManagerJobs)).flat();
|
|
}
|
|
|
|
private async fetchManagerVulnerabilities(
|
|
config: RenovateConfig,
|
|
packageFiles: Record<string, PackageFile[]>,
|
|
manager: string,
|
|
): Promise<DependencyVulnerabilities[]> {
|
|
const managerConfig = getManagerConfig(config, manager);
|
|
const queue = packageFiles[manager].map(
|
|
(pFile) => (): Promise<DependencyVulnerabilities[]> =>
|
|
this.fetchManagerPackageFileVulnerabilities(managerConfig, pFile),
|
|
);
|
|
logger.trace(
|
|
{ manager, queueLength: queue.length },
|
|
'fetchManagerVulnerabilities starting',
|
|
);
|
|
const result = (await p.all(queue)).flat();
|
|
logger.trace({ manager }, 'fetchManagerVulnerabilities finished');
|
|
return result;
|
|
}
|
|
|
|
private async fetchManagerPackageFileVulnerabilities(
|
|
managerConfig: RenovateConfig,
|
|
pFile: PackageFile,
|
|
): Promise<DependencyVulnerabilities[]> {
|
|
const { packageFile } = pFile;
|
|
const packageFileConfig = mergeChildConfig(managerConfig, pFile);
|
|
const { manager } = packageFileConfig;
|
|
const queue = pFile.deps.map(
|
|
(dep) => (): Promise<DependencyVulnerabilities | null> =>
|
|
this.fetchDependencyVulnerability(packageFileConfig, dep),
|
|
);
|
|
logger.trace(
|
|
{ manager, packageFile, queueLength: queue.length },
|
|
'fetchManagerPackageFileVulnerabilities starting with concurrency',
|
|
);
|
|
|
|
const result = await p.all(queue);
|
|
logger.trace(
|
|
{ packageFile },
|
|
'fetchManagerPackageFileVulnerabilities finished',
|
|
);
|
|
|
|
return result.filter(is.truthy);
|
|
}
|
|
|
|
private async fetchDependencyVulnerability(
|
|
packageFileConfig: RenovateConfig & PackageFile,
|
|
dep: PackageDependency,
|
|
): Promise<DependencyVulnerabilities | null> {
|
|
const ecosystem = Vulnerabilities.datasourceEcosystemMap[dep.datasource!];
|
|
if (!ecosystem) {
|
|
logger.trace(`Cannot map datasource ${dep.datasource!} to OSV ecosystem`);
|
|
return null;
|
|
}
|
|
|
|
let packageName = dep.packageName ?? dep.depName!;
|
|
if (ecosystem === 'PyPI') {
|
|
// https://peps.python.org/pep-0503/#normalized-names
|
|
packageName = packageName.toLowerCase().replace(regEx(/[_.-]+/g), '-');
|
|
}
|
|
|
|
try {
|
|
const osvVulnerabilities = await this.osvOffline?.getVulnerabilities(
|
|
ecosystem,
|
|
packageName,
|
|
);
|
|
if (
|
|
is.nullOrUndefined(osvVulnerabilities) ||
|
|
is.emptyArray(osvVulnerabilities)
|
|
) {
|
|
logger.trace(
|
|
`No vulnerabilities found in OSV database for ${packageName}`,
|
|
);
|
|
return null;
|
|
}
|
|
|
|
const depVersion =
|
|
dep.lockedVersion ?? dep.currentVersion ?? dep.currentValue!;
|
|
|
|
const versioning = dep.versioning ?? getDefaultVersioning(dep.datasource);
|
|
const versioningApi = getVersioning(versioning);
|
|
|
|
if (!versioningApi.isVersion(depVersion)) {
|
|
logger.debug(
|
|
`Skipping vulnerability lookup for package ${packageName} due to unsupported version ${depVersion}`,
|
|
);
|
|
return null;
|
|
}
|
|
|
|
const vulnerabilities: Vulnerability[] = [];
|
|
for (const osvVulnerability of osvVulnerabilities) {
|
|
if (osvVulnerability.withdrawn) {
|
|
logger.trace(
|
|
`Skipping withdrawn vulnerability ${osvVulnerability.id}`,
|
|
);
|
|
continue;
|
|
}
|
|
|
|
for (const affected of osvVulnerability.affected ?? []) {
|
|
const isVulnerable = this.isPackageVulnerable(
|
|
ecosystem,
|
|
packageName,
|
|
depVersion,
|
|
affected,
|
|
versioningApi,
|
|
);
|
|
if (!isVulnerable) {
|
|
continue;
|
|
}
|
|
|
|
logger.debug(
|
|
`Vulnerability ${osvVulnerability.id} affects ${packageName} ${depVersion}`,
|
|
);
|
|
const fixedVersion = this.getFixedVersion(
|
|
ecosystem,
|
|
depVersion,
|
|
affected,
|
|
versioningApi,
|
|
);
|
|
|
|
vulnerabilities.push({
|
|
packageName,
|
|
vulnerability: osvVulnerability,
|
|
affected,
|
|
depVersion,
|
|
fixedVersion,
|
|
datasource: dep.datasource!,
|
|
packageFileConfig,
|
|
});
|
|
}
|
|
}
|
|
|
|
return { vulnerabilities, versioningApi };
|
|
} catch (err) {
|
|
logger.warn(
|
|
{ err },
|
|
`Error fetching vulnerability information for ${packageName}`,
|
|
);
|
|
return null;
|
|
}
|
|
}
|
|
|
|
private sortByFixedVersion(
|
|
packageRules: PackageRule[],
|
|
versioningApi: VersioningApi,
|
|
): void {
|
|
const versionsCleaned: Record<string, string> = {};
|
|
for (const rule of packageRules) {
|
|
const version = rule.allowedVersions as string;
|
|
versionsCleaned[version] = version.replace(regEx(/[(),=> ]+/g), '');
|
|
}
|
|
packageRules.sort((a, b) =>
|
|
versioningApi.sortVersions(
|
|
versionsCleaned[a.allowedVersions as string],
|
|
versionsCleaned[b.allowedVersions as string],
|
|
),
|
|
);
|
|
}
|
|
|
|
// https://ossf.github.io/osv-schema/#affectedrangesevents-fields
|
|
private sortEvents(
|
|
events: Osv.Event[],
|
|
versioningApi: VersioningApi,
|
|
): Osv.Event[] {
|
|
const sortedCopy: Osv.Event[] = [];
|
|
let zeroEvent: Osv.Event | null = null;
|
|
|
|
for (const event of events) {
|
|
if (event.introduced === '0') {
|
|
zeroEvent = event;
|
|
} else if (versioningApi.isVersion(Object.values(event)[0])) {
|
|
sortedCopy.push(event);
|
|
} else {
|
|
logger.debug({ event }, 'Skipping OSV event with invalid version');
|
|
}
|
|
}
|
|
|
|
sortedCopy.sort((a, b) =>
|
|
// no pre-processing, as there are only very few values to sort
|
|
versioningApi.sortVersions(Object.values(a)[0], Object.values(b)[0]),
|
|
);
|
|
|
|
if (zeroEvent) {
|
|
sortedCopy.unshift(zeroEvent);
|
|
}
|
|
|
|
return sortedCopy;
|
|
}
|
|
|
|
private isPackageAffected(
|
|
ecosystem: Ecosystem,
|
|
packageName: string,
|
|
affected: Osv.Affected,
|
|
): boolean {
|
|
return (
|
|
affected.package?.name === packageName &&
|
|
affected.package?.ecosystem === ecosystem
|
|
);
|
|
}
|
|
|
|
private includedInVersions(
|
|
depVersion: string,
|
|
affected: Osv.Affected,
|
|
): boolean {
|
|
return !!affected.versions?.includes(depVersion);
|
|
}
|
|
|
|
private includedInRanges(
|
|
depVersion: string,
|
|
affected: Osv.Affected,
|
|
versioningApi: VersioningApi,
|
|
): boolean {
|
|
for (const range of affected.ranges ?? []) {
|
|
if (range.type === 'GIT') {
|
|
continue;
|
|
}
|
|
|
|
let vulnerable = false;
|
|
for (const event of this.sortEvents(range.events, versioningApi)) {
|
|
if (
|
|
is.nonEmptyString(event.introduced) &&
|
|
(event.introduced === '0' ||
|
|
this.isVersionGtOrEq(depVersion, event.introduced, versioningApi))
|
|
) {
|
|
vulnerable = true;
|
|
} else if (
|
|
is.nonEmptyString(event.fixed) &&
|
|
this.isVersionGtOrEq(depVersion, event.fixed, versioningApi)
|
|
) {
|
|
vulnerable = false;
|
|
} else if (
|
|
is.nonEmptyString(event.last_affected) &&
|
|
this.isVersionGt(depVersion, event.last_affected, versioningApi)
|
|
) {
|
|
vulnerable = false;
|
|
}
|
|
}
|
|
|
|
if (vulnerable) {
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// https://ossf.github.io/osv-schema/#evaluation
|
|
private isPackageVulnerable(
|
|
ecosystem: Ecosystem,
|
|
packageName: string,
|
|
depVersion: string,
|
|
affected: Osv.Affected,
|
|
versioningApi: VersioningApi,
|
|
): boolean {
|
|
return (
|
|
this.isPackageAffected(ecosystem, packageName, affected) &&
|
|
(this.includedInVersions(depVersion, affected) ||
|
|
this.includedInRanges(depVersion, affected, versioningApi))
|
|
);
|
|
}
|
|
|
|
private getFixedVersion(
|
|
ecosystem: Ecosystem,
|
|
depVersion: string,
|
|
affected: Osv.Affected,
|
|
versioningApi: VersioningApi,
|
|
): string | null {
|
|
const fixedVersions: string[] = [];
|
|
const lastAffectedVersions: string[] = [];
|
|
|
|
for (const range of affected.ranges ?? []) {
|
|
if (range.type === 'GIT') {
|
|
continue;
|
|
}
|
|
|
|
for (const event of range.events) {
|
|
if (
|
|
is.nonEmptyString(event.fixed) &&
|
|
versioningApi.isVersion(event.fixed)
|
|
) {
|
|
fixedVersions.push(event.fixed);
|
|
} else if (
|
|
is.nonEmptyString(event.last_affected) &&
|
|
versioningApi.isVersion(event.last_affected)
|
|
) {
|
|
lastAffectedVersions.push(event.last_affected);
|
|
}
|
|
}
|
|
}
|
|
|
|
fixedVersions.sort((a, b) => versioningApi.sortVersions(a, b));
|
|
const fixedVersion = fixedVersions.find((version) =>
|
|
this.isVersionGt(version, depVersion, versioningApi),
|
|
);
|
|
if (fixedVersion) {
|
|
return this.getFixedVersionByEcosystem(fixedVersion, ecosystem);
|
|
}
|
|
|
|
lastAffectedVersions.sort((a, b) => versioningApi.sortVersions(a, b));
|
|
const lastAffected = lastAffectedVersions.find((version) =>
|
|
this.isVersionGtOrEq(version, depVersion, versioningApi),
|
|
);
|
|
if (lastAffected) {
|
|
return this.getLastAffectedByEcosystem(lastAffected, ecosystem);
|
|
}
|
|
|
|
return null;
|
|
}
|
|
|
|
private getFixedVersionByEcosystem(
|
|
fixedVersion: string,
|
|
ecosystem: Ecosystem,
|
|
): string {
|
|
if (ecosystem === 'Maven' || ecosystem === 'NuGet') {
|
|
return `[${fixedVersion},)`;
|
|
}
|
|
|
|
// crates.io, Go, Hex, npm, RubyGems, PyPI
|
|
return `>= ${fixedVersion}`;
|
|
}
|
|
|
|
private getLastAffectedByEcosystem(
|
|
lastAffected: string,
|
|
ecosystem: Ecosystem,
|
|
): string {
|
|
if (ecosystem === 'Maven') {
|
|
return `(${lastAffected},)`;
|
|
}
|
|
|
|
// crates.io, Go, Hex, npm, RubyGems, PyPI
|
|
return `> ${lastAffected}`;
|
|
}
|
|
|
|
private isVersionGt(
|
|
version: string,
|
|
other: string,
|
|
versioningApi: VersioningApi,
|
|
): boolean {
|
|
return (
|
|
versioningApi.isVersion(version) &&
|
|
versioningApi.isVersion(other) &&
|
|
versioningApi.isGreaterThan(version, other)
|
|
);
|
|
}
|
|
|
|
private isVersionGtOrEq(
|
|
version: string,
|
|
other: string,
|
|
versioningApi: VersioningApi,
|
|
): boolean {
|
|
return (
|
|
versioningApi.isVersion(version) &&
|
|
versioningApi.isVersion(other) &&
|
|
(versioningApi.equals(version, other) ||
|
|
versioningApi.isGreaterThan(version, other))
|
|
);
|
|
}
|
|
|
|
private vulnerabilityToPackageRules(vul: Vulnerability): PackageRule | null {
|
|
const {
|
|
vulnerability,
|
|
affected,
|
|
packageName,
|
|
depVersion,
|
|
fixedVersion,
|
|
datasource,
|
|
packageFileConfig,
|
|
} = vul;
|
|
if (is.nullOrUndefined(fixedVersion)) {
|
|
logger.info(
|
|
`No fixed version available for vulnerability ${vulnerability.id} in ${packageName} ${depVersion}`,
|
|
);
|
|
return null;
|
|
}
|
|
|
|
logger.debug(
|
|
`Setting allowed version ${fixedVersion} to fix vulnerability ${vulnerability.id} in ${packageName} ${depVersion}`,
|
|
);
|
|
|
|
const severityDetails = this.extractSeverityDetails(
|
|
vulnerability,
|
|
affected,
|
|
);
|
|
|
|
return {
|
|
matchDatasources: [datasource],
|
|
matchPackageNames: [packageName],
|
|
matchCurrentVersion: depVersion,
|
|
allowedVersions: fixedVersion,
|
|
isVulnerabilityAlert: true,
|
|
vulnerabilitySeverity: severityDetails.severityLevel,
|
|
prBodyNotes: this.generatePrBodyNotes(vulnerability, affected),
|
|
force: {
|
|
...packageFileConfig.vulnerabilityAlerts,
|
|
},
|
|
};
|
|
}
|
|
|
|
private evaluateCvssVector(vector: string): [string, string] {
|
|
try {
|
|
const parsedCvss: CvssScore = parseCvssVector(vector);
|
|
const severityLevel = parsedCvss.cvss3OverallSeverityText;
|
|
|
|
return [parsedCvss.baseScore.toFixed(1), severityLevel];
|
|
} catch {
|
|
logger.debug(`Error processing CVSS vector ${vector}`);
|
|
}
|
|
|
|
return ['', ''];
|
|
}
|
|
|
|
private generatePrBodyNotes(
|
|
vulnerability: Osv.Vulnerability,
|
|
affected: Osv.Affected,
|
|
): string[] {
|
|
let aliases = [vulnerability.id].concat(vulnerability.aliases ?? []).sort();
|
|
aliases = aliases.map((id) => {
|
|
if (id.startsWith('CVE-')) {
|
|
return `[${id}](https://nvd.nist.gov/vuln/detail/${id})`;
|
|
} else if (id.startsWith('GHSA-')) {
|
|
return `[${id}](https://github.com/advisories/${id})`;
|
|
} else if (id.startsWith('GO-')) {
|
|
return `[${id}](https://pkg.go.dev/vuln/${id})`;
|
|
} else if (id.startsWith('RUSTSEC-')) {
|
|
return `[${id}](https://rustsec.org/advisories/${id}.html)`;
|
|
}
|
|
|
|
return id;
|
|
});
|
|
|
|
let content = '\n\n---\n\n### ';
|
|
content += vulnerability.summary ? `${vulnerability.summary}\n` : '';
|
|
content += `${aliases.join(' / ')}\n`;
|
|
content += `\n<details>\n<summary>More information</summary>\n`;
|
|
|
|
const details = vulnerability.details?.replace(
|
|
regEx(/^#{1,4} /gm),
|
|
'##### ',
|
|
);
|
|
content += `#### Details\n${details ?? 'No details.'}\n`;
|
|
|
|
content += '#### Severity\n';
|
|
const severityDetails = this.extractSeverityDetails(
|
|
vulnerability,
|
|
affected,
|
|
);
|
|
|
|
if (severityDetails.cvssVector) {
|
|
content += `- CVSS Score: ${severityDetails.score}\n`;
|
|
content += `- Vector String: \`${severityDetails.cvssVector}\`\n`;
|
|
} else {
|
|
content += `${titleCase(severityDetails.severityLevel)}\n`;
|
|
}
|
|
|
|
content += `\n#### References\n${
|
|
vulnerability.references
|
|
?.map((ref) => {
|
|
return `- [${ref.url}](${ref.url})`;
|
|
})
|
|
.join('\n') ?? 'No references.'
|
|
}`;
|
|
|
|
let attribution = '';
|
|
if (vulnerability.id.startsWith('GHSA-')) {
|
|
attribution = ` and the [GitHub Advisory Database](https://github.com/github/advisory-database) ([CC-BY 4.0](https://github.com/github/advisory-database/blob/main/LICENSE.md))`;
|
|
} else if (vulnerability.id.startsWith('GO-')) {
|
|
attribution = ` and the [Go Vulnerability Database](https://github.com/golang/vulndb) ([CC-BY 4.0](https://github.com/golang/vulndb#license))`;
|
|
} else if (vulnerability.id.startsWith('PYSEC-')) {
|
|
attribution = ` and the [PyPI Advisory Database](https://github.com/pypa/advisory-database) ([CC-BY 4.0](https://github.com/pypa/advisory-database/blob/main/LICENSE))`;
|
|
} else if (vulnerability.id.startsWith('RUSTSEC-')) {
|
|
attribution = ` and the [Rust Advisory Database](https://github.com/RustSec/advisory-db) ([CC0 1.0](https://github.com/rustsec/advisory-db/blob/main/LICENSE.txt))`;
|
|
}
|
|
content += `\n\nThis data is provided by [OSV](https://osv.dev/vulnerability/${vulnerability.id})${attribution}.\n`;
|
|
content += `</details>`;
|
|
|
|
return [sanitizeMarkdown(content)];
|
|
}
|
|
|
|
private extractSeverityDetails(
|
|
vulnerability: Osv.Vulnerability,
|
|
affected: Osv.Affected,
|
|
): SeverityDetails {
|
|
let severityLevel = 'UNKNOWN';
|
|
let score = 'Unknown';
|
|
|
|
const cvssVector =
|
|
vulnerability.severity?.find((e) => e.type === 'CVSS_V3')?.score ??
|
|
vulnerability.severity?.[0]?.score ??
|
|
(affected.database_specific?.cvss as string); // RUSTSEC
|
|
|
|
if (cvssVector) {
|
|
const [baseScore, severity] = this.evaluateCvssVector(cvssVector);
|
|
severityLevel = severity.toUpperCase();
|
|
score = baseScore
|
|
? `${baseScore} / 10 (${titleCase(severityLevel)})`
|
|
: 'Unknown';
|
|
} else if (
|
|
vulnerability.id.startsWith('GHSA-') &&
|
|
vulnerability.database_specific?.severity
|
|
) {
|
|
const severity = vulnerability.database_specific.severity as string;
|
|
severityLevel = severity.toUpperCase();
|
|
}
|
|
|
|
return {
|
|
cvssVector,
|
|
score,
|
|
severityLevel,
|
|
};
|
|
}
|
|
}
|