-
Notifications
You must be signed in to change notification settings - Fork 622
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
grype db search GHSA-mrrh-fwg8-r2c3 doesn't return results #2530
Comments
Can confirm |
I think this issue is a good example how important is to cover github actions since it becomes a popular supply chain vector attack. I think the main issue is how can we map between vulnerable commits \ versions since the advisory doesn't always specifies it. I suggest raising it in the next community OSS discussion since this is a major issue which grypes can't cover right now :) @kzantow |
We had a discussion about this, I just wanted to note a complication here: Grype normally does version matching based on version ranges, but a common/best practice in GitHub actions is to use SHA to pin the action to a commit, rather than a version. For these cases we wouldn't have a great way to identify a vulnerable version without some supplemental data: either something in the grype db or somehow looked up against the GH API either in Syft or Grype. |
A little investigation: we may be able to parse the version from a comment, investigation needed: https://github.com/anchore/syft/blob/main/syft/pkg/cataloger/githubactions/parse_workflow.go#L56 |
What happened:
yesterday i saw this vulnerability was published - GHSA-mrrh-fwg8-r2c3
i've tried to run grype db search GHSA-mrrh-fwg8-r2c3 with no results.
I have few questions:
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
grype db search GHSA-mrrh-fwg8-r2c3
Anything else we need to know?:
Environment:
grype version
: 0.89.1cat /etc/os-release
or similar): macThe text was updated successfully, but these errors were encountered: