Open
Description
Request: Evidence for Vulnerabilities
Similar to existing support for evidence for components, and other requests for evidence elsewhere, the request is to support evidence in the Vulnerability
object. Specifically, what evidence can be provided to substantiate the presence or status of the vulnerability. Evidence can also be used in the "negative" context - to establish that a vulnerability is NOT AFFECTED, for example.
- Evidence (Type: [object])
- Presence (similar concept to
identity
on component evidence) “Evidence that substantiates the presence or absence of the vulnerability.”- Confidence (Type: number) (Required) “The overall confidence of the evidence from 0-1, where 1 is 100% confidence”
- Methods (Type: [object])
- Technique (Type: enum) (Required) “The technique used in this method of analysis”
- SAST
- Binary SAST
- DAST
- IAST
- WAF
- Pen Testing
- WaaP
- RASP
- Emulation
- AST Fingerprint
- File Hash Comparison
- Function Hash Comparison
- Signature
- AST Dataflow / Taint Analysis
- Software Identifier (e.g. CPE, PURL that matches a software component in the BOM)
- CI / CD Security
- IaC Security
- Mobile AST (MAST)
- Other
- Technique (Type: enum) (Required) “The technique used in this method of analysis”
- Value (Type: string) “The value or contents of the evidence.”
- Description (Type: string) "A description of the evidence that may contain additional information about the investigation, for example"
- Tools (Type: [string]) "Tools used to conduct the scan and/or generate the evidence"
- Ref / Bom-Link
- Occurrences (Type: [Object])
- Location (Type: Object)
- Line number (Type: integer) “Line number in the affected file where the vulnerability occurs”
- Binary offset (Type: integer) “Decimal offset in bytes in the affected file where the vulnerability occurs”
- File name (Type: string) “File name of the file where the vulnerability occurs”
- Bom-ref (Type: string) “Optional identifier that can be used to reference the occurrence exists in the referenced BOM element.”
- Callstack (Type: object) (Optional)
- Frames (Type: object) (Optional)
- Function (Type: string)
- Parameters (Type: [string])
- Line (Type: integer)
- Column (Type: integer)
- Full filename (Type: string)
- Frames (Type: object) (Optional)
- Location (Type: Object)
- Presence (similar concept to
Example
"metadata": {
"timestamp": "2023-10-23T16:52:01.762473+00:00",
"tools": [
{
"services": [
{
"bom-ref": "bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb",
"provider": { ... },
"name": "...",
"version": "xxxx"
...
}
],
"components": [
{
"bom-ref": "dddddddd-dddd-dddd-dddddddddddd",
"provider": { ... },
"name": "...",
"version": "xxxx"
}
]
},
],
},
...
"vulnerabilities": [
{
"bom-ref": "aaaaaaaaa-aaaa-aaaa-aaaa-aaaaaaaaaaaa",
"id": "CVE-2023-38408",
"source": {
"name": "xxx",
"url": "https://website.com"
},
"description": "CVE Description",
"detail": "CVE Details",
"affects": [
{
"ref": "xxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
}
],
"evidence": [
{
"presence": {
"confidence": 1.0,
"methods": {
"technique": "software-identifier"
},
"value": "cpe:2.3:a:openbsd:openssh:7.2:*:*:*:*:*:*:*"
},
"tools": {
"ref": "bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
},
"occurences": {
"location": {
"bom-ref": "cccccccc-cccc-cccc-cccccccccccc"
}
}
},
{
"presence": {
"confidence": 1.0,
"methods": {
"technique": "signature"
},
"value": "<some binary signature that indicates that PKCS#11 Feature is enabled>"
},
"tools": {
"ref": "bbbbbbbb-bbbb-bbbb-bbbb-bbbbbbbbbbbb"
},
"occurences": {
"location": {
"file-name": "/usr/sbin/sshd",
"binary-offset": 3478,
"bom-ref": "cccccccc-cccc-cccc-cccccccccccc"
}
}
},
{
"presence": {
"confidence": 1.0,
"methods": {
"technique": "pen-testing"
},
"description": "[2023-11-06-15-21-51] - Pen testing team executed POC script from https://github.com/kali-mx/CVE-2023-38408/blob/main/CVE-2023-38408.sh and found that the binary was vulnerable. Here could be a longer description of the evidence provided by that team."
},
"tools": {
"ref": "dddddddd-dddd-dddd-dddddddddddd"
}
}
]
}
]