@@ -36,6 +36,8 @@ def test_parse_file_with_single_vulnerability_has_single_finding(self):
3636 with self .subTest (i = i ):
3737 self .assertEqual (items [i ].title , "org.owasp:library:6.7.8 | CVE-0000-0001" )
3838 self .assertEqual (items [i ].severity , "Medium" )
39+ self .assertEqual (items [i ].cvssv3 , None )
40+ self .assertEqual (items [i ].cvssv3_score , None )
3941 self .assertEqual (items [i ].component_name , "org.owasp:library" )
4042 self .assertEqual (items [i ].component_version , "6.7.8" )
4143 self .assertEqual (
@@ -73,6 +75,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
7375 items [0 ].description ,
7476 )
7577 self .assertEqual (items [0 ].severity , "High" )
78+ self .assertEqual (items [0 ].cvssv3 , None )
79+ self .assertEqual (items [0 ].cvssv3_score , None )
7680 self .assertEqual (items [0 ].file_path , "adapter-ear1.ear: dom4j-2.1.1.jar" )
7781 self .assertEqual (
7882 items [0 ].mitigation ,
@@ -97,6 +101,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
97101 items [1 ].description ,
98102 )
99103 self .assertEqual (items [1 ].severity , "High" )
104+ self .assertEqual (items [1 ].cvssv3 , None )
105+ self .assertEqual (items [1 ].cvssv3_score , None )
100106 self .assertEqual (items [1 ].file_path , "adapter-ear8.ear: dom4j-2.1.1.jar" )
101107 self .assertEqual (
102108 items [1 ].mitigation ,
@@ -119,6 +125,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
119125 items [2 ].description ,
120126 )
121127 self .assertEqual (items [2 ].severity , "High" )
128+ self .assertEqual (items [2 ].cvssv3 , None )
129+ self .assertEqual (items [2 ].cvssv3_score , None )
122130 self .assertEqual (items [2 ].file_path , "adapter-ear1.ear: dom4j-extensions-2.1.1.jar" )
123131 self .assertEqual (
124132 items [2 ].mitigation ,
@@ -137,6 +145,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
137145 # assert fails due to special characters, not too important
138146 # self.assertEqual(items[1].description, "Affected versions of `yargs-parser` are vulnerable to prototype pollution. Arguments are not properly sanitized, allowing an attacker to modify the prototype of `Object`, causing the addition or modification of an existing property that will exist on all objects.Parsing the argument `--foo.__proto__.bar baz'` adds a `bar` property with value `baz` to all objects. This is only exploitable if attackers have control over the arguments being passed to `yargs-parser`.")
139147 self .assertEqual (items [3 ].severity , "Low" )
148+ self .assertEqual (items [3 ].cvssv3 , None )
149+ self .assertEqual (items [3 ].cvssv3_score , None )
140150 self .assertEqual (items [3 ].file_path , "yargs-parser:5.0.0" )
141151 self .assertEqual (
142152 items [3 ].mitigation , "Update yargs-parser:5.0.0 to at least the version recommended in the description" ,
@@ -163,6 +173,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
163173 items [4 ].description ,
164174 )
165175 self .assertEqual (items [4 ].severity , "High" )
176+ self .assertEqual (items [4 ].cvssv3 , "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N" )
177+ self .assertEqual (items [4 ].cvssv3_score , 7.5 )
166178 self .assertEqual (items [4 ].file_path , "yargs-parser:5.0.0" )
167179 self .assertEqual (
168180 items [4 ].mitigation , "Update yargs-parser:5.0.0 to at least the version recommended in the description" ,
@@ -187,6 +199,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
187199 items [5 ].description ,
188200 )
189201 self .assertEqual (items [5 ].severity , "High" )
202+ self .assertEqual (items [5 ].cvssv3 , "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" )
203+ self .assertEqual (items [5 ].cvssv3_score , 7.5 )
190204 self .assertEqual (items [5 ].file_path , "yargs-parser:5.0.0" )
191205 self .assertEqual (
192206 items [5 ].mitigation , "Update yargs-parser:5.0.0 to at least the version recommended in the description" ,
@@ -199,6 +213,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
199213 self .assertEqual (items [6 ].component_name , "org.dom4j:dom4j" )
200214 self .assertEqual (items [6 ].component_version , "2.1.1.redhat-00001" )
201215 self .assertEqual (items [6 ].severity , "High" )
216+ self .assertEqual (items [6 ].cvssv3 , None )
217+ self .assertEqual (items [6 ].cvssv3_score , None )
202218 self .assertEqual (items [6 ].file_path , "adapter-ear2.ear: dom4j-2.1.1.jar" )
203219 self .assertEqual (
204220 items [6 ].mitigation ,
@@ -213,6 +229,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
213229 self .assertEqual (items [7 ].component_name , "dom4j" )
214230 self .assertEqual (items [7 ].component_version , "2.1.1" )
215231 self .assertEqual (items [7 ].severity , "High" )
232+ self .assertEqual (items [7 ].cvssv3 , None )
233+ self .assertEqual (items [7 ].cvssv3_score , None )
216234 self .assertEqual (
217235 items [7 ].mitigation , "Update dom4j:2.1.1 to at least the version recommended in the description" ,
218236 )
@@ -226,6 +244,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
226244 self .assertEqual (items [8 ].component_name , "jquery" )
227245 self .assertEqual (items [8 ].component_version , "3.1.1" )
228246 self .assertEqual (items [8 ].severity , "High" )
247+ self .assertEqual (items [8 ].cvssv3 , None )
248+ self .assertEqual (items [8 ].cvssv3_score , None )
229249 self .assertEqual (
230250 items [8 ].mitigation , "Update jquery:3.1.1 to at least the version recommended in the description" ,
231251 )
@@ -239,8 +259,10 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
239259 "**This vulnerability is mitigated and/or suppressed:** Document on why we are suppressing this vulnerability is missing!\n Update jquery:3.1.1 to at least the version recommended in the description" ,
240260 )
241261 self .assertEqual (items [9 ].tags , ["suppressed" , "no_suppression_document" ])
242- self .assertEqual (items [10 ].severity , "Critical" )
243- self .assertEqual (items [10 ].is_mitigated , True )
262+ self .assertEqual (items [9 ].severity , "Critical" )
263+ self .assertEqual (items [9 ].cvssv3 , "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" )
264+ self .assertEqual (items [9 ].cvssv3_score , 9.8 )
265+ self .assertEqual (items [9 ].is_mitigated , True )
244266
245267 with self .subTest (i = 10 ):
246268 self .assertEqual (items [10 ].active , False )
@@ -250,6 +272,8 @@ def test_parse_file_with_multiple_vulnerabilities_has_multiple_findings(self):
250272 )
251273 self .assertEqual (items [10 ].tags , "suppressed" )
252274 self .assertEqual (items [10 ].severity , "Critical" )
275+ self .assertEqual (items [10 ].cvssv3 , "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" )
276+ self .assertEqual (items [10 ].cvssv3_score , 9.8 )
253277 self .assertEqual (items [10 ].is_mitigated , True )
254278
255279 def test_parse_java_6_5_3 (self ):
@@ -269,6 +293,8 @@ def test_parse_java_6_5_3(self):
269293 items [i ].description ,
270294 )
271295 self .assertEqual (items [i ].severity , "Low" )
296+ self .assertEqual (items [i ].cvssv3 , "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N" )
297+ self .assertEqual (items [i ].cvssv3_score , 3.7 )
272298 self .assertEqual (items [i ].file_path , "log4j-api-2.12.4.jar" )
273299 self .assertEqual (items [i ].date , datetime (2022 , 1 , 15 , 14 , 31 , 13 , 42600 , tzinfo = UTC ))
274300
@@ -295,6 +321,8 @@ def test_parse_file_pr6439(self):
295321 items [0 ].description ,
296322 )
297323 self .assertEqual (items [0 ].severity , "Critical" )
324+ self .assertEqual (items [0 ].cvssv3 , "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" )
325+ self .assertEqual (items [0 ].cvssv3_score , 9.8 )
298326 self .assertEqual (items [0 ].file_path , "activemq-broker-5.16.5.jar" )
299327 self .assertIn (
300328 "**This vulnerability is mitigated and/or suppressed:** Ist eine Dependency vom CXF. Der im Finding erwähnte Bug ist seit Version 1.0" ,
0 commit comments