]> source.dussan.org Git - sonarqube.git/commitdiff
Suppress false positive vulnerabilites
authorMalena Ebert <malena.ebert@sonarsource.com>
Fri, 2 Oct 2020 14:31:29 +0000 (16:31 +0200)
committersonartech <sonartech@sonarsource.com>
Fri, 23 Oct 2020 20:08:06 +0000 (20:08 +0000)
owasp-suppressions.xml

index f4e3114039a87cd86ed573fcd2fb6bedb1ef4434..fedf329fe11accb76175149c6eacbc87c3f13b7a 100644 (file)
     <packageUrl regex="true">pkg:maven/com\.jcraft/jsch\.agentproxy\..*@0.0.7</packageUrl>
     <cve>CVE-2016-5725</cve>
   </suppress>
+
+  <suppress>
+    <notes>
+      <![CDATA[
+        file name: alm-gallery-client-1.0.2.jar will be matched to a wrong cpe string
+      ]]>
+    </notes>
+    <packageUrl regex="true">^pkg:maven/com\.sonarsource\.vsts/alm\-gallery\-client@.*$</packageUrl>
+    <cpe>cpe:/a:gallery:gallery</cpe>
+  </suppress>
+  
+  <!-- False Positive: Version of kotlin lib is not vulnerable to this CVE -->
+  <suppress>
+   <notes><![CDATA[
+   file name: kotlin-stdlib-common-1.4.10.jar
+   ]]></notes>
+   <packageUrl regex="true">^pkg:maven/org\.jetbrains\.kotlin/kotlin\-stdlib(\-common)?@1.4.10$</packageUrl>
+   <cve>CVE-2020-15824</cve>
+  </suppress>
+  
+  <!-- False Positive: The CVE is for hazelcast:1.8.0 not hazelcast-client-protocol -->
+  <suppress>
+   <notes><![CDATA[
+   file name: hazelcast-3.12.9.jar (shaded: com.hazelcast:hazelcast-client-protocol:1.8.0)
+   ]]></notes>
+   <packageUrl regex="true">^pkg:maven/com\.hazelcast/hazelcast\-client\-protocol@.*$</packageUrl>
+   <cve>CVE-2016-10750</cve>
+  </suppress>
+
+  <suppress>
+   <notes><![CDATA[
+   file name: d3-zoom:1.7.3
+   ]]></notes>
+   <packageUrl regex="true">^pkg:npm/d3\-zoom@.*$</packageUrl>
+   <cpe>cpe:/a:zoom:zoom</cpe>
+  </suppress>
+
+  <suppress>
+   <notes><![CDATA[
+   file name: dompurify:1.0.11
+   ]]></notes>
+   <packageUrl regex="true">^pkg:npm/dompurify@.*$</packageUrl>
+   <cve>CVE-2019-16728</cve>
+   <vulnerabilityName>CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</vulnerabilityName>
+  </suppress>
+
+  <suppress>
+   <notes><![CDATA[
+   file name: lodash:4.17.11
+   ]]></notes>
+   <packageUrl regex="true">^pkg:npm/lodash@.*$</packageUrl>
+   <cve>CVE-2019-10744</cve>
+   <cve>CVE-2020-8203</cve>
+   <vulnerabilityName>CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')</vulnerabilityName>
+  </suppress>
 </suppressions>