Title: Reimporting SCB Findings from OWASP DefectDojo after persisting them by J12934 · Pull Request #330 · secureCodeBox/secureCodeBox · GitHub
Open Graph Title: Reimporting SCB Findings from OWASP DefectDojo after persisting them by J12934 · Pull Request #330 · secureCodeBox/secureCodeBox
X Title: Reimporting SCB Findings from OWASP DefectDojo after persisting them by J12934 · Pull Request #330 · secureCodeBox/secureCodeBox
Description: This PR changes the DefectDojo Hook from a ReadOnly Hook to a ReadAndWrite Hook. After uploading the raw result findings of different SCB scanner to OWASP DefectDojo this extension is responsible for importing the uploaded findings back to the secureCodeBox. This lets us import the false positive / duplicate status from DefectDojo attributes to the scans findings in further hooks, e.g. slack notification or later on elasticSearch persistence. ┌─SCB OWASP ZAP──┐ ┌───────────────┐ ┌─────────────────────┐ ┌ ─ ─ ─ ┐ │ │ │ ReadWriteHook:│ │ ReadHook: │ │┌──────────────┐│ │ DefectDojo- ├──────▶│ Teams Notification ├──────▶ │ Teams │ ││ ZAP Scanner ││ │ Persistence │ │ Hook │ │└──────────────┘│ │ │ └─────────────────────┘ └ ─ ─ ─ ┘ │ │───────▶│ │ │┌──────────────┐│ │ │ ┌─────────────────────┐ ┌ ─ ─ ─ ┐ ││ ZAP Parser ││ │ │ │ ReadHook: │ │└──────────────┘│ │ ├──────▶│ Elasticsearch- ├──────▶ │ ECK │ │ │ │ │ │ Persistence Hook │ └────────────────┘ └────┬──────────┘ └─────────────────────┘ └ ─ ─ ─ ┘ │ ▲ │ │ │ │◀═══════════════ Added by PR 330 ▼ │ ┌ ─ ─ ─ ─ ─ ─ ─ ┐ │ DefectDojo │ Instance │ │ ─ ─ ─ ─ ─ ─ ─ ─ The imported findings from DefectDojo are mapped back to the secureCodeBox finding format and overwrite the original secureCodeBox findings from the parser. Here's a example mapped finding: { "id": "fdc841ef-ef22-45e8-8ecd-c6f246312eb0", "name": "Content Security Policy (CSP) Header Not Set", "location": "http://juice-shop:3000", "description": "Content Security Policy (CSP) is an added layer of security that helps to detect and mitigate certain types of attacks, including Cross Site Scripting (XSS) and data injection attacks. These attacks are used for everything from data theft to site defacement or distribution of malware. CSP provides a set of standard HTTP headers that allow website owners to declare approved sources of content that browsers should be allowed to load on that page — covered types are JavaScript, CSS, HTML frames, fonts, images and embeddable objects such as Java applets, ActiveX, audio and video files.\n\nReference: https://developer.mozilla.org/en-US/docs/Web/Security/CSP/Introducing_Content_Security_Policyhttps://cheatsheetseries.owasp.org/cheatsheets/Content_Security_Policy_Cheat_Sheet.htmlhttp://www.w3.org/TR/CSP/http://w3c.github.io/webappsec/specs/content-security-policy/csp-specification.dev.htmlhttp://www.html5rocks.com/en/tutorials/security/content-security-policy/http://caniuse.com/#feat=contentsecuritypolicyhttp://content-security-policy.com/\n\nURL: http://juice-shop:3000/ftp/\nMethod: GET\n\nURL: http://juice-shop:3000/ftp\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/coupons_2013.md.bak\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/suspicious_errors.yml\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/encrypt.pyc\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/eastere.gg\nMethod: GET\n\nURL: http://juice-shop:3000/\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/package.json.bak\nMethod: GET\n\nURL: http://juice-shop:3000/ftp/quarantine\nMethod: GET\n\nURL: http://juice-shop:3000\nMethod: GET\n\nURL: http://juice-shop:3000/sitemap.xml\nMethod: GET\n", "category": "DefectDojo Imported Finding", "severity": "Medium", "attributes": { "defectdojo.org/finding-id": 10414, "defectdojo.org/finding-url": "https://defectdojo.example.com/finding/10414", "defectdojo.org/test-id": 588, "falsePositive": false, "defectdojo.org/test-url": "https://defectdojo.example.com/test/588", "duplicate": true }, "osi_layer": null } I updated the Kubernetes Client version and regenerated the autogenerated Classes for the CRD's which causes probably 98% of this PR diff, you can skip passed them (everything under io.securecodebox.models in commit a9e519b).
Open Graph Description: This PR changes the DefectDojo Hook from a ReadOnly Hook to a ReadAndWrite Hook. After uploading the raw result findings of different SCB scanner to OWASP DefectDojo this extension is responsible f...
X Description: This PR changes the DefectDojo Hook from a ReadOnly Hook to a ReadAndWrite Hook. After uploading the raw result findings of different SCB scanner to OWASP DefectDojo this extension is responsible f...
Opengraph URL: https://github.com/secureCodeBox/secureCodeBox/pull/330
X: @github
Domain: github.com
| route-pattern | /:user_id/:repository/pull/:id/checks(.:format) |
| route-controller | pull_requests |
| route-action | checks |
| fetch-nonce | v2:938d39a9-c565-32fc-6382-c9f7c729b9b9 |
| current-catalog-service-hash | 87dc3bc62d9b466312751bfd5f889726f4f1337bdff4e8be7da7c93d6c00a25a |
| request-id | A928:3FFE70:3667C03:4B51974:6977CE89 |
| html-safe-nonce | 056a5e803dd59159ec45445db47abacdb7603b92f6d4c583ff929e97c4c5757a |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiJBOTI4OjNGRkU3MDozNjY3QzAzOjRCNTE5NzQ6Njk3N0NFODkiLCJ2aXNpdG9yX2lkIjoiMzExNjg0OTQ0OTEyNTAwNjk4NiIsInJlZ2lvbl9lZGdlIjoiaWFkIiwicmVnaW9uX3JlbmRlciI6ImlhZCJ9 |
| visitor-hmac | 4996ba1d1b20323704c0c60870e288d5980a0c9d873a6c9ba35d5395ce4a0728 |
| hovercard-subject-tag | pull_request:596384839 |
| github-keyboard-shortcuts | repository,pull-request-list,pull-request-conversation,pull-request-files-changed,checks,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/secureCodeBox/secureCodeBox/pull/330/checks |
| twitter:image | https://avatars.githubusercontent.com/u/13718901?s=400&v=4 |
| twitter:card | summary_large_image |
| og:image | https://avatars.githubusercontent.com/u/13718901?s=400&v=4 |
| og:image:alt | This PR changes the DefectDojo Hook from a ReadOnly Hook to a ReadAndWrite Hook. After uploading the raw result findings of different SCB scanner to OWASP DefectDojo this extension is responsible f... |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | 173f8c2eae2e017de550dd28a9ea88ad5c1e52c70df7ea05bcd820330b3b2fec |
| turbo-cache-control | no-preview |
| go-import | github.com/secureCodeBox/secureCodeBox git https://github.com/secureCodeBox/secureCodeBox.git |
| octolytics-dimension-user_id | 34573705 |
| octolytics-dimension-user_login | secureCodeBox |
| octolytics-dimension-repository_id | 80711933 |
| octolytics-dimension-repository_nwo | secureCodeBox/secureCodeBox |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 80711933 |
| octolytics-dimension-repository_network_root_nwo | secureCodeBox/secureCodeBox |
| turbo-body-classes | logged-out env-production page-responsive full-width full-width-p-0 |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 7b19554cad55a536fac18eeedb416dd87c37b1f5 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width