Skip to content

Refactor the 'missing' command to pull CVE details from NIST data feeds.#34

Closed
lightswitch05 wants to merge 2 commits intopsecio:masterfrom
lightswitch05:feature/use-cve-feeds-from-nvd-nist-gov
Closed

Refactor the 'missing' command to pull CVE details from NIST data feeds.#34
lightswitch05 wants to merge 2 commits intopsecio:masterfrom
lightswitch05:feature/use-cve-feeds-from-nvd-nist-gov

Conversation

@lightswitch05
Copy link
Contributor

Using published JSON data feeds from NIST (instead of cvedetails.com) allows for more reliable parsing of CVE details and removes the dependency on kub-at/php-simple-html-dom-parser. Having a more reliable data source for CVE details will allow for further automation in the near future.

Since we now have a reliable way to parse CVE details, I've included a couple new attributes to the CVE check: lastModifiedDate and publishedDate. The values are not being used anywhere at the moment, but it might aid in pull-request review where CVE details have been modified. Also, the old CVE source commonly included those values in the summary.

Finally, I've changed the check.json 'threat' datatype from a string to float. I believe the float datatype is more appropriate, and the change was able to be made without having any compatibility issues with the scan logic. I believe there is a need to allow checks to be released prior to a threat value being assigned - in which case threat would be set to null.

Using published JSON data feeds from NIST (instead of cvedetails.com) allows for more reliable parsing of CVE details and removes the dependency on 'kub-at/php-simple-html-dom-parser'. Having a more reliable data source for CVE details will allow for further automation in the near future.

Since we now have a reliable way to parse CVE details, I've included a couple new attributes to the CVE check: lastModifiedDate and publishedDate. The values are not being used anywhere at the moment, but it might aid in pull-request review where CVE details have been modified. Also, the old CVE source commonly included those values in the summary.

Finally, I've changed the check.json 'threat' datatype from a string to float. I believe the float datatype is more appropriate, and the change was able to be made without having any compatibility issues with the scan logic. I believe there is a need to allow checks to be released prior to a threat value being assigned - in which case threat would be set to null.
@lightswitch05
Copy link
Contributor Author

@enygma I'm considering taking this pull request and splitting it out into a separate tool that I can manage directly, apply regular updates to, and implement some of the other requested features. I've requested more access to versionscan previously and received no feedback.

If you could take a moment to share your views and goals of versionscan with me, perhaps we could collaborate together towards a shared goal instead of needing to create a separate project.

@lightswitch05
Copy link
Contributor Author

closing in favor of PHP Version Audit

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant