Notices

Overview

This page provides Mend notices for its customers.

To ensure that you remain updated, Mend recommends that you subscribe to the Customer Community Portal Announcements section in order to receive immediate email notifications on important announcements, and follow the biweekly release notes. 

Name Changes

Unified Agent

  • The default of php.removeDuplicateDependencies has been changed to True.

File System Agent

The Mend File System Agent (FSA) has been renamed to the Mend Unified Agent. 

Sun License

The name of the Sun license was changed to Sun Public License. (21.3.2, 4/11/21)

New and/or Modified Documentation

New API Documentation (version 21.7.1)

  • New and updated documentation has been published for the Global Org/Organization/Product/Project-Level APIs and Product and Project-Level APIs.

Mend Cure Version (version 21.7.1)

  • A new product, Mend Cure, has been released in beta status. Mend Cure automatically generates remediation suggestions and proposed fixes for vulnerabilities identified by detection tools in proprietary code. The remediation suggestions, called “reports”, are displayed on the vulnerable code itself and can be used as-is in your IDE.

New API Documentation (version 21.6.3)

  • New and updated documentation has been published for Reports APIs and Licenses and Library APIs.

New API Documentation (version 21.6.2)

  • New and updated documentation has been published for Alerts APIs and Groups and Users APIs.

New AVM Documentation (version 21.6.2)

  • New and updated AVM documentation has been published.

Unified Agent Parameter Merging (version 21.4.2)

Beginning in this version, nuget.runPreStep and nuget.restoreDependencies will be combined. This works the following way: if nuget.runPreStep = true, then dotnet restore will be performed on found .csproj files. As a result of this merge, nuget.restoreDependencies will be deprecated.

New Unified Agent Documentation (version 20.10.2)

Beginning in version 20.10.2, a modified and updated Unified Agent documentation repository has been launched, with the intent to increase usability, update existing content, fill in missing gaps, and create a linear flow.

The documentation is now spread over 4 contiguous topics (pages), in this order:

  • An overview page –  this text will replace the current text on the page in Confluence to which the Web GUI links, so there will be no issues with broken bookmarks, missing pages, SEO issues etc. This page will also provide links to the following three topics listed here.

  • A Getting Started page, with prereqs, download info, config info, etc

  • A Parameters page

  • Advanced Topics (similar to an appendix)

New Policies Documentation (version 20.10.2)

Beginning in version 20.10.2 (approximate release - November 8), a modified Policies page has been launched, with the intent to update existing content, fill in missing gaps, and create a linear flow.

This page merges the two existing policies topics - Automated Policies and Managing Policies Throughout Your SDLC. The latter has been archived and therefore no longer in use.

Notices of Deprecation

Documentation

Version 21.7.2

  • The contents of the following topics were moved. The pages of those topics will be deprecated. Note that after being moved, no changes to the information contained will be made

    • The contents of New Versions Alerts were moved to Understanding the Project Page,

    • The contents Advanced Searching were moved to Understanding and Managing Vulnerabilities.

Version 21.7.1

  • The contents of the following topics were moved. The pages of those topics will be deprecated. Note that after being moved, no changes to the information contained will be made

    • The contents of Triggering a new Scan in Bitbucket were moved to Mend for Bitbucket Server.

    • The contents of Utilizing Security Vulnerabilities Information were moved to Understanding and Managing Security Vulnerabilities.

Version 21.5.2

The following pages were deprecated:

  • In the Image Registries section:

    • UA - Amazon Elastic Container Registry (ECR) - Docker Integration

    • UA - Azure Container Registry Integration

    • UA - Docker Image Integration

    • UA - Google Container Registry Docker Integration

    • UA - JFrog Artifactory Docker Registry Integration

  • In the AVM section:

    • Migrating Fortify/ThreadFix Agent to the AVM Agent

Version 21.4.2

Beginning in this version the following pages were archived and are therefore no longer in use:

  • Requesting an Arbitrary File 

  • GitHub Related Topics

  • The License Identification page - its content was merged with Changing a Library’s License

  • The License Analysis page - its content was merged with Understanding Risk Score Attribution

  • The Policies API page has been deprecated, and a new and updated Policies API page has replaced it.

Version 21.3.2

Beginning in this version the following pages were archived and are therefore no longer in use:

  • High Severity Bugs Report

  • File System

  • Getting Started

  • Setup Projects

  • Automate the Process by Using the Unified Agent

  • Deprecated Features was deprecated and the content was moved to the Notices page

  • Setting the Home Page was deprecated and the content was moved to the Mend Home Page topic.

Version 21.2.2

Beginning in this version the following page was archived and is therefore no longer in use.

  • Mend Advise for Visual Studio Codespaces

Version 21.2.1

Beginning in this version the following page was archived and is therefore no longer in use.

  • Fortify Software Security Center Integration

Version 21.1.2

Beginning in this version the following integration pages were archived and are therefore no longer in use. The material contained therein is contained in the Unified Agent parameter documentation.

  • Selecting a Plugin for Integration

  • Providing only a Project name in a Unified Agent Scan

  • Configuration Recommendation Mode

  • Unified Agent Scan Steps and Summary

  • Unified Agent JSON Report Example

The following topics have been completely deprecated and are therefore no longer in use:

  • Documentation Tips

  • Kubernetes FAQ

  • ThreadFix Integration

  • Ruby Plugin

  • Python Plugin

  • NAnt Plugin

  • Gradle Plugin

  • Bower Plugin

  • Bamboo Plugin

  • Ant Plugin

  • Fortify Software Security Center Integration

Version 20.12.2

Beginning in version 20.12.2 the following integration pages were archived and are therefore no longer in use. The material contained therein is contained in the Unified Agent parameter documentation.

  • Gradle

  • Maven

  • Python

Version 20.12.1

Beginning in version 20.12.1 the following integration pages will be archived and therefore no longer be in use. The material contained therein is contained in the Unified Agent parameter documentation.

  • Bower

  • Cargo

  • Cocoapods

  • Haskell

  • Hex (Erlang/Elixir)

  • Ocaml

  • Paket

  • php

  • Poetry

  • Ruby

  • SBT

Additionally, the following pages will be archived:

  • Previous Versions of the Unified Agent

  • Previous GitHub Integration

Features

TeamCity Plugin End-of-Life

The TeamCity plugin will reach its End Of Life starting November 1, 2021. After this date, Mend will no longer provide standard support, including updates and fixes, for the deprecated plugin. Extended Support, which is limited to configuration and Support troubleshooting, will continue until May 1, 2022. Following this date, the TeamCity plugin will no longer be supported by Mend. Please make sure to migrate to the Unified Agent before the end of standard support on November 1, 2021 to maintain full support o

API Version 1.0 and Below

Beginning on February 15, 2020, Mend will deprecate API version 1.0 and below for new developments to make way for the more advanced and secure versions 1.1, 1.2 and 1.3. Support for 1.0 versions and below will end six months from that date (August 15, 2020).

Additionally, on February 15, 2020, Mend will begin enforcing the quota limits for API usage per customer according to the contract. Please prepare accordingly for these changes. For any questions or concerns, contact Mend support. 

IntelliJ Old Plugin End of Life

On July 12, 2020, Mend will deprecate the old plugin version of Mend Advise for IntelliJ (see here).

A new Mend Advise plugin is already available directly from the IntelliJ IDEA Marketplace (see here), which besides offering the same features as the old plugin, includes functionality improvements as well as performance-related enhancements.

Please make sure to migrate to the new plugin by deleting the old plugin and then only installing the new one. See our documentation for more information.

NuGet Plugin End of Life

With the wide functionality of the Mend Unified Agent providing support for more than 200 languages, the NuGet plugin will reach its End Of Life starting October 1, 2020.

After this date, Mend will no longer provide standard support, including updates and fixes, for the deprecated plugin. Extended Support, which is limited to configuration and Support troubleshooting, will continue until April 1, 2021. Following this date, the NuGet plugin will no longer be supported by Mend. Please make sure to migrate to the Unified Agent before the end of standard support on October 1, 2020 to maintain full support of your product.  

Jfrog Xray Integration Support

JFrog's vulnerability data integration strategy has changed: Integration with third-party providers of solutions that scan open-source libraries will no longer be available. Therefore, Mend’s Xray Integration will be deprecated.

Shared customers integrating Xray with Mend will no longer be supported or maintained by JFrog. Note that existing integrations with JFrog Artifactory (independent of JFrog Xray) are not affected.Mend invites you to continue to use its variety of supported integrations for detecting vulnerabilities in open-source software. For more information, contact support@whitesourcesoftware.com.

NPM and Maven GitHub Repositories - Visibility Change

Following the deprecation of NPM and Maven Plugins, the visibility of existing GitHub repositories was changed to 'private'.

Deprecation of the Vulnerable Methods

In some cases, vulnerabilities are fixed by the deprecation of the vulnerable classes or methods. To that extent, Mend, as other official advisories, will mark the vulnerabilities as fixed with the relevant version. In these cases, the vulnerabilities are fixed by adding "@Deprecated" to the vulnerable method.

Example:

Parameters

  • In version 21.2.2, a new parameter, fileSystemScan, replaces the deprecated ignoreSourceFiles.

Azure DevOps Services Integration

Version 21.6.2

Major improvements to the Azure DevOps integration have been introduced. The underlying scanning mechanism has been modified to allow a direct Mend scan from within the Azure DevOps pipeline. As part of this change, the following updates have been introduced:

  • The extension activation procedure has been moved to the Organization settings section by navigating to Organization settings > Extensions > Mend page.

  • The Mend tab under Project > Pipelines has been deprecated.

  • The Mend Open Source Risk Report is available at the Azure DevOps build level only, deprecating the project level aggregated report.

  • The direct Mend scan from within the Azure DevOps pipeline is now the only scanning option.

Scan Results

GO Scan Results

There are three main challenges that should be taken into consideration in order to understand Mend’s support for GO projects:

  • Commits are pushed to GO repositories at a high rate (several times per day).

  • GO repositories are relatively large in size.

  • GO provides an option to use the “latest” package, meaning the latest commit pushed to the repository.

The combination of these three factors create difficulty when scanning GO projects, and retrieving the exact commit that was used would cause Mend scans for GO projects to take an exceptionally long time.

In order to overcome the challenges described above, whenever the given SHA-1 isn’t immediately recognized by Mend, an approximate result is provided while Mend imports the exact requested commit. Whenever a library displayed in the Mend UI as an approximated result, it will be displayed as such with a disclaimer in the library details page while the exact commit is imported in the background. Once the exact commit is imported, it will automatically replace the approximate result in your inventory.

Unified Agent

Miscellaneous

Version 21.7.1

  • In the next Unified Agent release, the behavior of the includes and excludes and parameters will be fixed with respect to the use of the projectPerFolder parameter by matching their values relative to the main root path.  

  • Within the next two releases of the Unified Agent, several improvements to the default configuration will be introduced:

    • The includes parameter will have a default value (comprises of all the Mend supported extensions) that will be applied to all the Unified Agent's configuration methods (environment variables, config file, etc)  

    • The excludes parameter will have a default value of **/.*, **/node_modules, **/src/test, **/testdata, **/*sources.jar, **/*javadoc.jar

  • Within the next two releases of the Unified Agent, the Go dependencies detection will be improved by enabling the optimized resolver for Go Modules by default. In addition, the Go resolution will no longer be triggered by Go source files and will be aligned to the other resolvers to be triggered only by the package managers' manifest files.

Version 21.6.2

  • Starting August 1, Unified Agent versions will be available for a year after their release.  

  • Within the next two releases of the Unified Agent, the default value of the php.removeDuplicateDependencies parameter will be changed from false to true.

  • Within the next two releases of the Unified Agent, the gradle.additionalArguments parameter for specifying additional arguments to be added to the Gradle commands executed by the agent - will be applied to all Gradle commands (not only to the gradle dependencies command). 

  • Within the next two releases of the Unified Agent, the Maven, OCaml, Modules and the R resolvers will be aligned to the behavior of the other detectors when failErrorLevel is set to ALL by failing the scan if the relevant package manager is not installed.

Note that beginning in release 19.7.1 only the new Unified Agent .jar download link will be operational.

Contact Mend Support if further assistance is needed.

Vulnerability Notices

Spring HTTP Invokers

Note to Customers: Spring has announced that vulnerability CVE-2016-1000027, found in version 4.1, will not be fixed for future versions. For more information, please see below. 

Spring HTTP invokers are both lightweight protocols that use their own slim serialization mechanisms and use the standard Java serialization mechanism to expose services through HTTP. This has a huge advantage if your arguments and return types are complex types that cannot be serialized by using the serialization mechanisms Hessian uses (see the next section for more considerations when you choose a remoting technology).

Under the hood, Spring uses either the standard facilities provided by the JDK or Apache HttpComponents to perform HTTP calls. If you need more advanced and easier-to-use functionality, use the latter. See hc.apache.org/httpcomponents-client-ga/ for more information.

Be aware of vulnerabilities due to unsafe Java deserialization: Manipulated input streams can lead to unwanted code execution on the server during the deserialization step. As a consequence, do not expose HTTP invoker endpoints to untrusted clients. Rather, expose them only between your own services. In general, we strongly recommend using any other message format (such as JSON) instead.

If you are concerned about security vulnerabilities due to Java serialization, consider the general-purpose serialization filter mechanism at the core JVM level, originally developed for JDK 9 but backported to JDK 8, 7 and 6 in the meantime. See https://blogs.oracle.com/java-platform-group/entry/incoming_filter_serialization_data_a and https://openjdk.java.net/jeps/290

.NET Core and ASP.NET Core DLL Files

This notice regards the following CVEs:

The issues mentioned above refer to several names and versions of NuGet packages containing vulnerable DLL libraries, along with the NuGet package versions containing a fixed DLL library. However, according to their SHA-1 identifiers, some of the vulnerable DLL libraries still exist in other directories of the fixed NuGet packages. Therefore, the fixed version for each NuGet package refers to a package that isn'tunconditionally vulnerable, but ispotentially vulnerable depending on the specifications of the run-time environment.

Taking into consideration the fact that the vulnerable DLL libraries may still be loaded and that Mend retrieves the SHA-1 identifiers of the DLL libraries after the NuGet package is built, the vulnerabilities mentioned above will continue to be reported by Mend so users can ensure their environment isn't vulnerable.

Example: 

According to Microsoft, the vulnerability found in CVE-2017-0247, referring to the vulnerable DLL library with the SHA-1 identifier below, was present in versions 4.0.1 and 4.3.0, and fixed in versions 4.0.2 and 4.3.1 of the 'System.Net.Http.WinHttpHandler' NuGet package. However, you can see below that version 4.4.0 of the 'System.Net.Http.WinHttpHandler' NuGet package still contains the vulnerable DLL files. 


Version 4.3.0 of System.Net.Http.WinHttpHandler NuGet package: 

Version 4.4.0 of 'System.Net.Http.WinHttpHandler' NuGet package:

CVE and WS Vulnerability Identifiers

As many of you know, OSS vulnerabilities are published in multiple advisories.The National Vulnerability Database (NVD) is commonly acknowledged as a primary database for known security vulnerabilities but has been arguably slow in adopting data from advisories. In order to attain broader coverage of reported security vulnerabilities, Mend has not been relying solely on the NVD but has been reviewing vulnerability data from dozens of additional sources as well. Whereas the NVD publishes security vulnerabilities using a "CVE-" prefixed identifier, Mend classifies non-NVD security vulnerabilities using a "WS-" prefix.Recently, we have noticed that the NVD features support for additional sources, potentially enabling it to encompass security vulnerabilities that are already flagged by Mend using a designated "WS-" identifier.

What is being changed?

To avoid duplicate, redundant identifiers for vulnerabilities (i.e., "WS-" and "CVE-" entries that refer to the same vulnerability), Mend will replace non-NVD, "WS-" entries with the corresponding NVD, "CVE-" entries featuring associated CVE metadata, thereby enabling customers to benefit from the extended coverage of pertinent vulnerabilities directly from the NVD. The new CVEs were assigned by NVD with a “CVE-2018-” prefix.

Are my reports or alerts affected?

(npm packages only) Customers may notice that some or all of the "WS-" entries previously featured in Mend displays and reports are no longer listed in their inventory. Such "WS-" entries are now listed with corresponding "CVE-" identifiers and feature the vulnerability metadata from the NVD.For these vulnerabilities, the severity and score may change.New alerts associated with vulnerabilities that were previously marked using a "WS-" identifier will be triggered as well with "CVE-" information.

HTTP/2 Denial of Service Vulnerabilities

Overview

HTTP/2 is a major revision of the HTTP network protocol used by the World Wide Web. The HTTP/2 specification was published as RFC 7540 in May 2015. HTTP/2 makes our applications faster, simpler, and more robust by allowing us to undo many of the HTTP/1.1 workarounds previously done within our applications and address these concerns within the transport layer itself. Even better, it also opens up a number of entirely new opportunities to optimize our applications and improve performance!

The primary goals for HTTP/2 are to reduce latency by enabling full request and response multiplexing, minimize protocol overhead via efficient compression of HTTP header fields, and add support for request prioritization and server push. To implement these requirements, there is a large supporting cast of other protocol enhancements, such as new flow control, error handling, and upgrade mechanisms, but these are the most important features that every web developer should understand and leverage in their applications.

HTTP/2 does not modify the application semantics of HTTP in any way. All the core concepts, such as HTTP methods, status codes, URIs, and header fields, remain in place. Instead, HTTP/2 modifies how the data is formatted (framed) and transported between the client and server, both of which manage the entire process, and hides all the complexity from our applications within the new framing layer. As a result, all existing applications can be delivered without modification.

Denial of Service Vulnerabilities Discovery

Netflix has discovered several resource exhaustion vectors affecting a variety of third-party HTTP/2 implementations. These attack vectors can be used to launch DoS attacks against servers that support HTTP/2 communication. Netflix worked with Google and CERT/CC to coordinate disclosure to the Internet community. A number of vendors have announced patches to correct this suboptimal behavior.

Impact

There are three broad areas of information security: confidentiality (information can’t be read by unauthorized people), integrity (information can’t be changed by unauthorized people), and availability (information and systems are available when you want them). All of the changes announced today are in the “availability” category. These HTTP/2 vulnerabilities do not allow an attacker to leak or modify information.

Rather, they allow a small number of low bandwidth malicious sessions to prevent connection participants from doing additional work. These attacks are likely to exhaust resources such that other connections or processes on the same machine may also be impacted or crash.

Vulnerabilities

  • CVE-2019-9511 “Data Dribble”: The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9512 “Ping Flood”: The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9513 “Resource Loop”: The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9514 “Reset Flood”: The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9515 “Settings Flood”: The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9516 “0-Length Headers Leak”: The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9517 “Internal Data Buffering”: The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

  • CVE-2019-9518 “Empty Frames Flood”: The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service.
    CVSS 3.x Score7.5 HIGH

Vulnerable Projects

Project

Vulnerabilities

Vulnerable Versions

Mitigation

Project

Vulnerabilities

Vulnerable Versions

Mitigation

Apache Traffic Server

CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518.

6.x: 6.0 - 6.2.3
7.x: 7.0 - 7.1.6
8.x: 8.0 -  8.1.3

6.x: No fix available.
7.x: Upgrade to 7.1.7 (patch).
8.x: Upgrade to 8.1.4 (patch).

Go

CVE-2019-9512, CVE-2019-9514. Official Website Advisory

1.11.x: 1.11.0 - 1.11.12
1.12.x: 1.12.0 - 1.12.7

1.11.x: Upgrade to 1.11.13 (patch).
1.12.x: Upgrade to 1.12.8 (patch).

H2O

CVE-2019-9512, CVE-2019-9514, CVE-2019-9515. Official Website Advisory

2.2.x: 2.2.0 - 2.2.5
2.3.x: 2.3.0-beta1

2.2.x: Upgrade to 2.2.6 (patch).
2.3.x: Upgrade to 2.3.0-beta2 (patch).

Eclipse Jetty

CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518. Official Website Advisory

9.3.x - 9.4.20

Upgrade to 9.4.21 (patch).

Netty

CVE-2019-9512, CVE-2019-9514, CVE-2019-9515, CVE-2019-9518. Official Website Advisory

4.1.0-beta4 - 4.1.38

Upgrade to 4.1.39 (patch-1 [9512, 9514, 9515], patch-2 [9518]).

Nghttp2

CVE-2019-9511, CVE-2019-9513. Official Website Advisory

0.1.0 - 1.39.1

Upgrade to 1.39.2 (patch-1patch-2).

NGINX

CVE-2019-9511, CVE-2019-9513, CVE-2019-9516. Official Website Advisory

NOTE: The releases (X.Y.Z) splitted into two types: if Y is divisible by 2 - stable, otherwise - mainline.
Stable: 0.2.x - 1.16.0
Mainline:  0.1.x - 1.17.2

Stable: Upgrade to 1.16.1 (patch-1 [9511], patch-2 [9513], patch-3 [9516]).
Mainline: Upgrade to 1.17.3 (patch-1 [9511], patch-2 [9513], patch-3 [9516]).

NodeJS

CVE-2019-9511, CVE-2019-9512, CVE-2019-9513, CVE-2019-9514, CVE-2019-9515, CVE-2019-9516, CVE-2019-9517, CVE-2019-9518. Official Website Advisory

8.x: 8.0.0 - 8.16.0
10.x: 10.0.0 - 1.16.2
12.x: 12.0.0 - 12.8.0 

8.x: Upgrade to 8.16.1 (patch-1 [9511, 9517], patch-2 [9511, 9517], patch-3 [9512, 9515], patch-4 [9512, 9515], patch-5 [9513], patch-6 [9513], patch-7 [9514], patch-8 [9514], patch-9 [9516], patch-10 [9518]).
10.x: Upgrade to 10.16.3 (patch-1 [9511, 9517], patch-2 [9511, 9517], patch-3 [9512, 9515], patch-4 [9512, 9515], patch-5 [9513], patch-6 [9513], patch-7 [9514], patch-8 [9514], patch-9 [9516], patch-10 [9518]).
12.x: Upgrade to 12.8.1 (patch-1 [9511, 9517], patch-2 [9511, 9517], patch-3 [9512, 9515], patch-4 [9512, 9515], patch-5 [9513], patch-6 [9513], patch-7 [9514], patch-8 [9514], patch-9 [9516], patch-10 [9518]).

.Net Packages with no Vulnerable Code

Occasionally, NuGet packages that do not contain vulnerable elements are marked as vulnerable by multiple Microsoft advisories. This occurs for one of two reasons:

  • The package is a metapackage. A metapackage is a package that does not contain any code, but only references other packages. Due to the fact that the package does not contain any code, the package itself cannot contain any vulnerable elements and Mend will not display any vulnerable elements.

    For example, according to this Microsoft AdvisoryMicrosoft.NETCore.App is vulnerable to CVE-2020-0603. However, this is only the case because Microsoft.NETCore.App references Microsoft.AspNetCore.All and Microsoft.AspNetCore.App which are the actual vulnerable packages. Microsoft.NETCore.App itself does not include any actual vulnerable code, and therefore will not be marked as vulnerable by Mend.

  • The package is only vulnerable if you are using a specific runtime dependency.

    For example, according to this Microsoft advisoryMicrosoft.AspNetCore.Mvc is vulnerable. However, when comparing the vulnerable and fixed versions of Microsoft.AspNetCore.Mvc, you can see that they contain the same exact code implementation, meaning no vulnerable code exists in the Dlls within this package, but rather in the runtime dependencies it utilizes.

Mend contacted Microsoft officials regarding the above, and Microsoft officials verified that Mend’s analysis is correct. Microsoft treats the cases mentioned above as vulnerable in order to raise awareness. Microsoft encourages updating the metapackage to ensure all vulnerable dependencies are updated, rather than updating only specific packages. The same approach is encouraged for runtime dependencies, where Microsoft encourages updating the entire runtime crucial environment packages, rather than referring to specific packages.

References

Azure DevOps

Major improvements to the Azure DevOps integration will be introduced in July 2021. The underlying scanning mechanism will be modified to allow a direct Mend scan from within the Azure DevOps pipeline. As part of this change, the following updates will be introduced:

  • The extension activation procedure will be moved to the Organization settings section by navigating to Organization settings > Extensions > Mend page.

  • The Mend tab under Project > Pipelines will be deprecated.

  • The Mend Open Source Risk Report will be available at the Azure DevOps build level only, deprecating the project level aggregated report.

  • The direct Mend scan from within the Azure DevOps pipeline will be the only scanning option.

Copyright © 2024 Mend.io (White Source Ltd.) | All rights reserved.