-
Notifications
You must be signed in to change notification settings - Fork 366
/
suppressions.xml
64 lines (59 loc) · 2.91 KB
/
suppressions.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
<?xml version="1.0" encoding="UTF-8"?>
<!-- OWASP Dependency Check suppression file for ESAPI. -->
<suppressions xmlns="https://jeremylong.github.io/DependencyCheck/dependency-suppression.1.3.xsd">
<!-- NOTE: These 4 suppression rules are redundant. Will decide later which one to keep. -->
<suppress>
<notes><![CDATA[
CVE-2017-10355 in library xercesImpl-2.12.2.jar, which is a transitive dependency, pulled in via AntiSamy.
It is a Denial of Service vulnerability with a CVSSv3 score of 5.9.
We are suppressing this because it is believed by the ESAPI and AntiSamy teams that it is a false positive.
Dependency Check itself doesn't flag this and neither does Snyk. Dependency Check reports it because it is reported
directly by Sonatype's OSS Index. For futher details, see
https://ossindex.sonatype.org/vulnerability/sonatype-2017-0348?component-type=maven&component-name=xerces%2FxercesImpl
OSS Index seems to have the wrong CPE. They have 'cpe:2.3:a:xerces:xercesImpl:2.12.2:*:*:*:*:*:*:*', whereas the CPE IDs
associated with NVD are 'cpe:2.3:a:apache:xerces-j:2.12.2:*:*:*:*:*:*:*' and
'cpe:2.3:a:apache:xerces2_java:2.12.2:*:*:*:*:*:*:*'.
Note also that this has been reported as GitHub issue #a 4614
https://github.com/jeremylong/DependencyCheck/issues/4614
]]></notes>
<sha1>f051f988aa2c9b4d25d05f95742ab0cc3ed789e2</sha1>
<cpe>cpe:/a:apache:xerces-j</cpe>
</suppress>
<suppress>
<notes><![CDATA[
CVE-2017-10355 in xercesImpl. See above for details.
]]></notes>
<sha1>f051f988aa2c9b4d25d05f95742ab0cc3ed789e2</sha1>
<cpe>cpe:/a:apache:xerces2_java</cpe>
</suppress>
<suppress>
<notes><![CDATA[
CVE-2017-10355 in xercesImpl. See above for details.
This is the one that matches the OSS Index
]]></notes>
<packageUrl regex="true">^pkg:maven/xerces/xercesImpl@.*$</packageUrl>
<vulnerabilityName>CVE-2017-10355</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
FP per Dependency Check GitHub issue #4614
]]></notes>
<cve>CVE-2017-10355</cve>
</suppress>
<suppress>
<notes><![CDATA[
FP per Depencency Check GitHub Issue #6704
pkg:maven/commons-configuration/[email protected]
]]></notes>
<sha1>2b36e4adfb66d966c5aef2d73deb6be716389dc9</sha1>
<vulnerabilityName>CVE-2024-29131</vulnerabilityName>
</suppress>
<suppress>
<notes><![CDATA[
FP per Depencency Check GitHub Issue #6704
pkg:maven/commons-configuration/[email protected]
]]></notes>
<sha1>2b36e4adfb66d966c5aef2d73deb6be716389dc9</sha1>
<vulnerabilityName>CVE-2024-29133</vulnerabilityName>
</suppress>
</suppressions>