You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Currently GitLab format doesn't provide information about score and CVSS vector but JUNIT format does.
JUNIT:
<testcaseclassname="CVE-2022-46364"name="pkg:maven/org.apache.cxf/cxf-rt-wsdl@3.4.4">
<failuremessage="cvssV3: CRITICAL, score: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:3.9/RC:R/MAV:A)"/>
<system-out>A SSRF vulnerability in parsing the��href attribute of XOP:Include in MTOM requests in versions of Apache CXF before 3.5.5 and 3.4.10 allows an attacker to perform SSRF style attacks on webservices that take at least one parameter of any type.��</system-out>
<system-err>location: /builds/softnet/p31/eBankNet/.m2/repository/org/apache/cxf/cxf-rt-wsdl/3.4.4/cxf-rt-wsdl-3.4.4.jar, project-references: [ dbts:compile ]</system-err>
</testcase>
Currently GitLab format doesn't provide information about score and CVSS vector but JUNIT format does.
JUNIT:
GitLab has introduced CVSS_VECTOR in format:
https://gitlab.com/gitlab-org/security-products/security-report-schemas/-/commit/03a58b32e9d2c43d45934fbe750ef4580aa7a3f6
IMO we should expand
description
section about message same as in JUNIT and addCVSS_VECTOR
Ref:
The text was updated successfully, but these errors were encountered: