Replies: 8 comments 5 replies
-
A little further information. You can see from the combined screen shots that DT was picking up minor variations from the 18th Jan, but on the 31st Jan there was a big update. Looking at the Attributed on field, it appears that 184 were picked up by DT, but some of these additional ones are dated back to 2016 so it is not as if something was added overnight to the NVD. Any advice, gratefully received. |
Beta Was this translation helpful? Give feedback.
-
Hi @nscuro thanks for getting back to me. This is a very basic DT set-up. Just the curl command, minor change to change localhost to IP address and the docker-compose up. Create a user add me to Admin and that is it. I then create a Project, import a CycloneDX SBOM and leave it to its 'stuff' I am unsure how to check for the first 3 you have asked for, but happy to look. If they have defaults they will just be them. This is the only project on this instance of DT so I have nothing to compare it with. Not sure how to check if they are false positives, but happy to check that if needed. I guess we trusted DT not to show us false positives! The results on the two separate DT instances from same SBOM are identical, just that the second we do not have the history on. Our 'use case' is probably not that standard as it is used to create a snapshot in time report of vulnerabilities rather than to monitor. Just happened in this case the data was there for me to show the changes since the initial import. We create a CycloneDX SBOM based on an audit that we are doing of a product. This is then imported into DT to give us an initial idea of the problems in the code and the likely development practices they team are using to address (if at all) vulnerability issues and it is turned into a report. Just happens that two of us used the SBOM in two different 'vanilla' DT setups, I did an extract of the data in the 31st showing 488 vulnerabilities and he did one on the 1st Feb showing 672. We just had to figure it out why. |
Beta Was this translation helpful? Give feedback.
-
Thanks, really useful. We are hot on proper naming conventions for packages and I think that is what you mean by CPEs. So for all the technologies we aim to have the industry standard name. Isn't perfect, but where automatically generated it will be. Just that in the manual part of the analysis, some might be wrong. Where Purls are in the SBOM, it is a requirement that they are valid. Most of the automatically identified packages will have these. I understand that basically garbage in garbage out, but this is where the Data in DT did not change and suddenly, there are 184 additional vulnerabilities overnight. So our data did not change and so something in or between DT and the NVD must have. I will check some of the new ones as false positives, but I would be surprised. A little (lot) troubling. |
Beta Was this translation helpful? Give feedback.
-
Thanks, then yes I beileve that we have this correct as DT is picking up the 10,000 packages from the product! Just the dang 184 new ones overnight! |
Beta Was this translation helpful? Give feedback.
-
Hi, I got the logs from the system and found something interesting, some of which you will know, but summarising it for anyone reading it. DT does a series of things on a daily basis. This includes getting an update from the NVD Database as follows:
So this is the one from the 30th of Jan and on unpacking it this is just a JSON file. It also daily update on the projects. So for mine it is:
As you can see this is 6 hours after the NVD update and these repeat for each day. What is interesting is on the 31st, the NVD update is as follows:
So it appears to be doing (guesswork) a download of the full NVD results for 2022 and 2023. It then does the project update again.
I did my extraction of the data before this project refresh at 17.33 and so these additional archives are probably the cause of the additional Vulnerabilities showing on the 1st of Feb, but this raises additional questions.
Still looking for answers as at the moment it is raising a question mark on the validity of DT. :-( |
Beta Was this translation helpful? Give feedback.
-
Hi @nscuro Thank you. I might have restarted it earlier than the 18th, but it would probably not have been by much. I think I have an answer I can 'sell'. Looks like the updates on the 31st just added in a load of additional CVEs that were not their previously. You have been a real help!!!! |
Beta Was this translation helpful? Give feedback.
-
Just realised, I restarted it on the 30th Jan to change the localhost to the IP address to allow remote access. That might explain this! |
Beta Was this translation helpful? Give feedback.
-
@nigellh I have logged #2449, requesting that DT provide tracking of "Vulnerability Catalogue" metrics. If implemented, some questions become easier to answer. For instance, if you are tracking (say) 100 vulnerabilities with Sonatype IDs (eg |
Beta Was this translation helpful? Give feedback.
-
Hi.
I imported a BOM into DT a couple of weeks back and it showed 488 vulnerabilities on the 31 Jan. A colleague of mine in a different area said he ran it into his system and he found more and wanted to know why.
I checked my DT and it is now showing 672.
So between the 31 Jan and the 1 Feb, the vulnerability numbers have jumped by almost 200.
Would really appreciate an explanation as this will kick of a storm as we had reported 488.
There were no changes on my system such as DT being updated so I am guessing it is the NVD feed. Do they do batch updates or something at a month end?
Beta Was this translation helpful? Give feedback.
All reactions