Skip to content

Commit 8a04848

Browse files
feat: request cve automatically (#777)
* feat: request cve automatically * feat: prompt latest version * fix: fix h1 api validation * fix: tested with hackerone apis * feat: update vulnerabilities.json * fix: remove prompt severity * fix: simplify severity logic * fix: renamed updateVulnerabilitiesJSON * feat: moved h1cve to update security release * fix: renaming snake_case to camelCase * fix: remove created at * fix: improve handling
1 parent 59526a8 commit 8a04848

File tree

4 files changed

+245
-24
lines changed

4 files changed

+245
-24
lines changed

components/git/security.js

+20-1
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,10 @@ const securityOptions = {
3131
'notify-pre-release': {
3232
describe: 'Notify the community about the security release',
3333
type: 'boolean'
34+
},
35+
'request-cve': {
36+
describe: 'Request CVEs for a security release',
37+
type: 'boolean'
3438
}
3539
};
3640

@@ -60,6 +64,11 @@ export function builder(yargs) {
6064
).example(
6165
'git node security --notify-pre-release' +
6266
'Notifies the community about the security release'
67+
)
68+
.example(
69+
'git node security --request-cve',
70+
'Request CVEs for a security release of Node.js based on' +
71+
' the next-security-release/vulnerabilities.json'
6372
);
6473
}
6574

@@ -82,6 +91,9 @@ export function handler(argv) {
8291
if (argv['notify-pre-release']) {
8392
return notifyPreRelease(argv);
8493
}
94+
if (argv['request-cve']) {
95+
return requestCVEs(argv);
96+
}
8597
yargsInstance.showHelp();
8698
}
8799

@@ -116,7 +128,14 @@ async function createPreRelease() {
116128
return preRelease.createPreRelease();
117129
}
118130

119-
async function startSecurityRelease() {
131+
async function requestCVEs() {
132+
const logStream = process.stdout.isTTY ? process.stdout : process.stderr;
133+
const cli = new CLI(logStream);
134+
const hackerOneCve = new UpdateSecurityRelease(cli);
135+
return hackerOneCve.requestCVEs();
136+
}
137+
138+
async function startSecurityRelease(argv) {
120139
const logStream = process.stdout.isTTY ? process.stdout : process.stderr;
121140
const cli = new CLI(logStream);
122141
const release = new SecurityReleaseSteward(cli);

lib/prepare_security.js

+7-16
Original file line numberDiff line numberDiff line change
@@ -173,23 +173,15 @@ class PrepareSecurityRelease {
173173

174174
for (const report of reports.data) {
175175
const {
176-
id, attributes: { title, cve_ids, created_at },
176+
id, attributes: { title, cve_ids },
177177
relationships: { severity, weakness, reporter }
178178
} = report;
179179
const link = `https://hackerone.com/reports/${id}`;
180-
let reportSeverity = {
181-
rating: '',
182-
cvss_vector_string: '',
183-
weakness_id: ''
180+
const reportSeverity = {
181+
rating: severity?.data?.attributes?.rating || '',
182+
cvss_vector_string: severity?.data?.attributes?.cvss_vector_string || '',
183+
weakness_id: weakness?.data?.id || ''
184184
};
185-
if (severity?.data?.attributes?.cvss_vector_string) {
186-
const { cvss_vector_string, rating } = severity.data.attributes;
187-
reportSeverity = {
188-
cvss_vector_string,
189-
rating,
190-
weakness_id: weakness?.data?.id
191-
};
192-
}
193185

194186
cli.separator();
195187
cli.info(`Report: ${link} - ${title} (${reportSeverity?.rating})`);
@@ -209,13 +201,12 @@ class PrepareSecurityRelease {
209201
selectedReports.push({
210202
id,
211203
title,
212-
cve_ids,
204+
cveIds: cve_ids,
213205
severity: reportSeverity,
214206
summary: summaryContent ?? '',
215207
affectedVersions: versions.split(',').map((v) => v.replace('v', '').trim()),
216208
link,
217-
reporter: reporter.data.attributes.username,
218-
created_at // when we request CVE we need to input vulnerability_discovered_at
209+
reporter: reporter.data.attributes.username
219210
});
220211
}
221212
return selectedReports;

lib/request.js

+43
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,49 @@ export default class Request {
132132
return this.json(url, options);
133133
}
134134

135+
async getPrograms() {
136+
const url = 'https://api.hackerone.com/v1/me/programs';
137+
const options = {
138+
method: 'GET',
139+
headers: {
140+
Authorization: `Basic ${this.credentials.h1}`,
141+
'User-Agent': 'node-core-utils',
142+
Accept: 'application/json'
143+
}
144+
};
145+
return this.json(url, options);
146+
}
147+
148+
async requestCVE(programId, opts) {
149+
const url = `https://api.hackerone.com/v1/programs/${programId}/cve_requests`;
150+
const options = {
151+
method: 'POST',
152+
headers: {
153+
Authorization: `Basic ${this.credentials.h1}`,
154+
'User-Agent': 'node-core-utils',
155+
'Content-Type': 'application/json',
156+
Accept: 'application/json'
157+
},
158+
body: JSON.stringify(opts)
159+
};
160+
return this.json(url, options);
161+
}
162+
163+
async updateReportCVE(reportId, opts) {
164+
const url = `https://api.hackerone.com/v1/reports/${reportId}/cves`;
165+
const options = {
166+
method: 'PUT',
167+
headers: {
168+
Authorization: `Basic ${this.credentials.h1}`,
169+
'User-Agent': 'node-core-utils',
170+
Accept: 'application/json',
171+
'Content-Type': 'application/json'
172+
},
173+
body: JSON.stringify(opts)
174+
};
175+
return this.json(url, options);
176+
}
177+
135178
async getReport(reportId) {
136179
const url = `https://api.hackerone.com/v1/reports/${reportId}`;
137180
const options = {

lib/update_security_release.js

+175-7
Original file line numberDiff line numberDiff line change
@@ -11,6 +11,7 @@ import fs from 'node:fs';
1111
import path from 'node:path';
1212
import auth from './auth.js';
1313
import Request from './request.js';
14+
import nv from '@pkgjs/nv';
1415

1516
export default class UpdateSecurityRelease {
1617
repository = NEXT_SECURITY_RELEASE_REPOSITORY;
@@ -32,7 +33,7 @@ export default class UpdateSecurityRelease {
3233
checkoutOnSecurityReleaseBranch(cli, this.repository);
3334

3435
// update the release date in the vulnerabilities.json file
35-
const updatedVulnerabilitiesFiles = await this.updateVulnerabilitiesJSON(releaseDate, { cli });
36+
const updatedVulnerabilitiesFiles = await this.updateJSONReleaseDate(releaseDate, { cli });
3637

3738
const commitMessage = `chore: update the release date to ${releaseDate}`;
3839
commitAndPushVulnerabilitiesJSON(updatedVulnerabilitiesFiles,
@@ -56,7 +57,7 @@ export default class UpdateSecurityRelease {
5657
NEXT_SECURITY_RELEASE_FOLDER, 'vulnerabilities.json');
5758
}
5859

59-
async updateVulnerabilitiesJSON(releaseDate) {
60+
async updateJSONReleaseDate(releaseDate) {
6061
const vulnerabilitiesJSONPath = this.getVulnerabilitiesJSONPath();
6162
const content = this.readVulnerabilitiesJSON(vulnerabilitiesJSONPath);
6263
content.releaseDate = releaseDate;
@@ -80,9 +81,16 @@ export default class UpdateSecurityRelease {
8081

8182
// get h1 report
8283
const { data: report } = await req.getReport(reportId);
83-
const { id, attributes: { title, cve_ids }, relationships: { severity, reporter } } = report;
84-
// if severity is not set on h1, set it to TBD
85-
const reportLevel = severity ? severity.data.attributes.rating : 'TBD';
84+
const {
85+
id, attributes: { title, cve_ids },
86+
relationships: { severity, reporter, weakness }
87+
} = report;
88+
89+
const reportSeverity = {
90+
rating: severity?.data?.attributes?.rating || '',
91+
cvss_vector_string: severity?.data?.attributes?.cvss_vector_string || '',
92+
weakness_id: weakness?.data?.id || ''
93+
};
8694

8795
// get the affected versions
8896
const supportedVersions = await getSupportedVersions();
@@ -97,8 +105,9 @@ export default class UpdateSecurityRelease {
97105
const entry = {
98106
id,
99107
title,
100-
cve_ids,
101-
severity: reportLevel,
108+
link: `https://hackerone.com/reports/${id}`,
109+
cveIds: cve_ids,
110+
severity: reportSeverity,
102111
summary: summaryContent ?? '',
103112
affectedVersions: versions.split(',').map((v) => v.replace('v', '').trim()),
104113
reporter: reporter.data.attributes.username
@@ -135,4 +144,163 @@ export default class UpdateSecurityRelease {
135144
commitMessage, { cli, repository: this.repository });
136145
cli.ok('Done!');
137146
}
147+
148+
async requestCVEs() {
149+
const credentials = await auth({
150+
github: true,
151+
h1: true
152+
});
153+
const vulnerabilitiesJSONPath = this.getVulnerabilitiesJSONPath();
154+
const content = this.readVulnerabilitiesJSON(vulnerabilitiesJSONPath);
155+
const { reports } = content;
156+
const req = new Request(credentials);
157+
const programId = await this.getNodeProgramId(req);
158+
const cves = await this.promptCVECreation(req, reports, programId);
159+
this.assignCVEtoReport(cves, reports);
160+
this.updateVulnerabilitiesJSON(content, vulnerabilitiesJSONPath);
161+
this.updateHackonerReportCve(req, reports);
162+
}
163+
164+
assignCVEtoReport(cves, reports) {
165+
for (const cve of cves) {
166+
const report = reports.find(report => report.id === cve.reportId);
167+
report.cveIds = [cve.cve_identifier];
168+
}
169+
}
170+
171+
async updateHackonerReportCve(req, reports) {
172+
for (const report of reports) {
173+
const { id, cveIds } = report;
174+
this.cli.startSpinner(`Updating report ${id} with CVEs ${cveIds}..`);
175+
const body = {
176+
data: {
177+
type: 'report-cves',
178+
attributes: {
179+
cve_ids: cveIds
180+
}
181+
}
182+
};
183+
const response = await req.updateReportCVE(id, body);
184+
if (response.errors) {
185+
this.cli.error(`Error updating report ${id}`);
186+
this.cli.error(JSON.stringify(response.errors, null, 2));
187+
}
188+
this.cli.stopSpinner(`Done updating report ${id} with CVEs ${cveIds}..`);
189+
}
190+
}
191+
192+
updateVulnerabilitiesJSON(content, vulnerabilitiesJSONPath) {
193+
this.cli.startSpinner(`Updating vulnerabilities.json from\
194+
${vulnerabilitiesJSONPath}..`);
195+
const filePath = path.resolve(vulnerabilitiesJSONPath);
196+
fs.writeFileSync(filePath, JSON.stringify(content, null, 2));
197+
// push the changes to the repository
198+
commitAndPushVulnerabilitiesJSON(filePath,
199+
'chore: updated vulnerabilities.json with CVEs',
200+
{ cli: this.cli, repository: this.repository });
201+
this.cli.stopSpinner(`Done updating vulnerabilities.json from ${filePath}`);
202+
}
203+
204+
async promptCVECreation(req, reports, programId) {
205+
const supportedVersions = (await nv('supported'));
206+
const cves = [];
207+
for (const report of reports) {
208+
const { id, summary, title, affectedVersions, cveIds, link } = report;
209+
// skip if already has a CVE
210+
// risky because the CVE associated might be
211+
// mentioned in the report and not requested by Node
212+
if (cveIds?.length) continue;
213+
214+
let severity = report.severity;
215+
216+
if (!severity.cvss_vector_string || !severity.weakness_id) {
217+
try {
218+
const h1Report = await req.getReport(id);
219+
if (!h1Report.data.relationships.severity?.data.attributes.cvss_vector_string) {
220+
throw new Error('No severity found');
221+
}
222+
severity = {
223+
weakness_id: h1Report.data.relationships.weakness?.data.id,
224+
cvss_vector_string:
225+
h1Report.data.relationships.severity?.data.attributes.cvss_vector_string,
226+
rating: h1Report.data.relationships.severity?.data.attributes.rating
227+
};
228+
} catch (error) {
229+
this.cli.error(`Couldnt not retrieve severity from report ${id}, skipping...`);
230+
continue;
231+
}
232+
}
233+
234+
const { cvss_vector_string, weakness_id } = severity;
235+
236+
const create = await this.cli.prompt(
237+
`Request a CVE for: \n
238+
Title: ${title}\n
239+
Link: ${link}\n
240+
Affected versions: ${affectedVersions.join(', ')}\n
241+
Vector: ${cvss_vector_string}\n
242+
Summary: ${summary}\n`,
243+
{ defaultAnswer: true });
244+
245+
if (!create) continue;
246+
247+
const body = {
248+
data: {
249+
type: 'cve-request',
250+
attributes: {
251+
team_handle: 'nodejs-team',
252+
versions: await this.formatAffected(affectedVersions, supportedVersions),
253+
metrics: [
254+
{
255+
vectorString: cvss_vector_string
256+
}
257+
],
258+
weakness_id: Number(weakness_id),
259+
description: title,
260+
vulnerability_discovered_at: new Date().toISOString()
261+
}
262+
}
263+
};
264+
const { data } = await req.requestCVE(programId, body);
265+
if (data.errors) {
266+
this.cli.error(`Error requesting CVE for report ${id}`);
267+
this.cli.error(JSON.stringify(data.errors, null, 2));
268+
continue;
269+
}
270+
const { cve_identifier } = data.attributes;
271+
cves.push({ cve_identifier, reportId: id });
272+
}
273+
return cves;
274+
}
275+
276+
async getNodeProgramId(req) {
277+
const programs = await req.getPrograms();
278+
const { data } = programs;
279+
for (const program of data) {
280+
const { attributes } = program;
281+
if (attributes.handle === 'nodejs') {
282+
return program.id;
283+
}
284+
}
285+
}
286+
287+
async formatAffected(affectedVersions, supportedVersions) {
288+
const result = [];
289+
for (const affectedVersion of affectedVersions) {
290+
const major = affectedVersion.split('.')[0];
291+
const latest = supportedVersions.find((v) => v.major === Number(major)).version;
292+
const version = await this.cli.prompt(
293+
`What is the affected version (<=) for release line ${affectedVersion}?`,
294+
{ questionType: 'input', defaultAnswer: latest });
295+
result.push({
296+
vendor: 'nodejs',
297+
product: 'node',
298+
func: '<=',
299+
version,
300+
versionType: 'semver',
301+
affected: true
302+
});
303+
}
304+
return result;
305+
}
138306
}

0 commit comments

Comments
 (0)