Ausnahme gefangen: SSL certificate problem: certificate is not yet valid ๐Ÿ“Œ Git-Vuln-Finder - Finding Potential Software Vulnerabilities From Git Commit Messages

๐Ÿ  Team IT Security News

TSecurity.de ist eine Online-Plattform, die sich auf die Bereitstellung von Informationen,alle 15 Minuten neuste Nachrichten, Bildungsressourcen und Dienstleistungen rund um das Thema IT-Sicherheit spezialisiert hat.
Ob es sich um aktuelle Nachrichten, Fachartikel, Blogbeitrรคge, Webinare, Tutorials, oder Tipps & Tricks handelt, TSecurity.de bietet seinen Nutzern einen umfassenden รœberblick รผber die wichtigsten Aspekte der IT-Sicherheit in einer sich stรคndig verรคndernden digitalen Welt.

16.12.2023 - TIP: Wer den Cookie Consent Banner akzeptiert, kann z.B. von Englisch nach Deutsch รผbersetzen, erst Englisch auswรคhlen dann wieder Deutsch!

Google Android Playstore Download Button fรผr Team IT Security



๐Ÿ“š Git-Vuln-Finder - Finding Potential Software Vulnerabilities From Git Commit Messages


๐Ÿ’ก Newskategorie: IT Security Nachrichten
๐Ÿ”— Quelle: feedproxy.google.com


Finding potential software vulnerabilities from git commit messages. The output format is a JSON with the associated commit which could contain a fix regarding a software vulnerability. The search is based on a set of regular expressions against the commit messages only. If CVE IDs are present, those are added automatically in the output.

Requirements
  • Python 3.6
  • GitPython
  • langdetect

Usage
usage: finder.py [-h] [-v] [-r R] [-o O] [-s S] [-p P] [-c] [-t]

Finding potential software vulnerabilities from git commit messages.

optional arguments:
-h, --help show this help message and exit
-v increase output verbosity
-r R git repository to analyse
-o O Output format: [json]
-s S State of the commit found
-p P Matching pattern to use: [vulnpatterns, cryptopatterns,
cpatterns] - the pattern 'all' is used to match all the patterns
at once.
-c output only a list of the CVE pattern found in commit messages
(disable by default)
-t Include tags matching a specific commit

More info: https://github.com/cve-search/git-vuln-finder

Patterns
git-vuln-finder comes with 3 default patterns which can be selected to find the potential vulnerabilities described in the commit messages such as:
  • vulnpatterns is a generic vulnerability pattern especially targeting web application and generic security commit message. Based on an academic paper.
  • cryptopatterns is a vulnerability pattern for cryptographic errors mentioned in commit messages.
  • cpatterns is a set of standard vulnerability patterns see for C/C++-like languages.

A sample partial output from Curl git repository
python3 finder.py -r /home/adulau/git/curl | jq .
...
"6df916d751e72fc9a1febc07bb59c4ddd886c043": {
"message": "loadlibrary: Only load system DLLs from the system directory\n\nInspiration provided by: Daniel Stenberg and Ray Satiro\n\nBug: https://curl.haxx.se/docs/adv_20160530.html\n\nRef: Windows DLL hijacking with curl, CVE-2016-4802\n",
"language": "en",
"commit-id": "6df916d751e72fc9a1febc07bb59c4ddd886c043",
"summary": "loadlibrary: Only load system DLLs from the system directory",
"stats": {
"insertions": 180,
"deletions": 8,
"lines": 188,
"files": 7
},
"author": "Steve Holme",
"author-email": "steve_holme@hotmail.com",
"authored_date": 1464555460,
"committed_date": 1464588867,
"branches": [
"master"
],
"pa ttern-selected": "(?i)(denial of service |\bXXE\b|remote code execution|\bopen redirect|OSVDB|\bvuln|\bCVE\b |\bXSS\b|\bReDoS\b|\bNVD\b|malicious|xโˆ’frameโˆ’options|attack|cross site |exploit|malicious|directory traversal |\bRCE\b|\bdos\b|\bXSRF \b|\bXSS\b|clickjack|session.fixation|hijack|\badvisory|\binsecure |security |\bcrossโˆ’origin\b|unauthori[z|s]ed |infinite loop)",
"pattern-matches": [
"hijack"
],
"origin": "git@github.com:curl/curl.git",
"origin-github-api": "https://api.github.com/repos/curl/curl/commits/6df916d751e72fc9a1febc07bb59c4ddd886c043",
"tags": [],
"cve": [
"CVE-2016-4802"
],
"state": "cve-assigned"
},
"c2b3f264cb5210f82bdc84a3b89250a611b68dd3": {
"message": "CONNECT_ONLY: don't close connection on GSS 401/407 reponses\n\nPreviously, connections were closed immediately before the user had a\nchance to extract the socket when the proxy required Ne gotiate\nauthentication.\n\nThis regression was brought in with the security fix in commit\n79b9d5f1a42578f\n\nCloses #655\n",
"language": "en",
"commit-id": "c2b3f264cb5210f82bdc84a3b89250a611b68dd3",
"summary": "CONNECT_ONLY: don't close connection on GSS 401/407 reponses",
"stats": {
"insertions": 4,
"deletions": 2,
"lines": 6,
"files": 1
},
"author": "Marcel Raad",
"author-email": "raad@teamviewer.com",
"authored_date": 1455523116,
"committed_date": 1461704516,
"branches": [
"master"
],
"pattern-selected": "(?i)(denial of service |\bXXE\b|remote code execution|\bopen redirect|OSVDB|\bvuln|\bCVE\b |\bXSS\b|\bReDoS\b|\bNVD\b|malicious|xโˆ’frameโˆ’options|attack|cross site |exploit|malicious|directory traversal |\bRCE\b|\bdos\b|\bXSRF \b|\bXSS\b|clickjack|session.fixation|hijack|\badvisory|\binsecure |security |\bcrossโˆ’origi n\b|unauthori[z|s]ed |infinite loop)",
"pattern-matches": [
"security "
],
"origin": "git@github.com:curl/curl.git",
"origin-github-api": "https://api.github.com/repos/curl/curl/commits/c2b3f264cb5210f82bdc84a3b89250a611b68dd3",
"tags": [],
"state": "under-review"
},
...
  • Extracting CVE id(s) from git messages
  "98d132cf6a879faf0147aa83ea0c07ff326260ed": {
"message": "Add a macro for testing assertion in both debug and production builds\n\nIf we have an assert then in a debug build we want an abort() to occur.\nIn a production build we wan
t the function to return an error.\n\nThis introduces a new macro to assist with that. The idea is to replace\nexisting use of OPENSSL_assert() with this new macro. The problem with\nOPENSSL
_assert() is that it aborts() on an assertion failure in both debug\nand production builds. It should never be a library's decision to abort a\nprocess (we don't get to decide when to kill t
he life support machine or\nthe nuclear reactor control system). Additionally if an attacker can\ncause a reachable assert to be hit then this can be a source of DoS attacks\ne.g. see CVE-20
17-3733, CVE-2015-0293, CVE-2011-4577 and CVE-2002-1568.\n\nReviewed-by: Tim Hudson <tjh@openssl.org>\n(Merged from https://github.com/openssl/o penssl/pull/3496)",
"commit-id": "98d132cf6a879faf0147aa83ea0c07ff326260ed",
"summary": "Add a macro for testing assertion in both debug and production builds",
"stats": {
"insertions": 18,
"deletions": 0,
"lines": 18,
"files": 1
},
"author": "Matt Caswell",
"author-email": "matt@openssl.org",
"authored_date": 1495182637,
"committed_date": 1495457671,
"branches": [
"master"
],
"pattern-selected": "(?i)(denial of service |\bXXE\b|remote code execution|\bopen redirect|OSVDB|\bvuln|\bCVE\b |\bXSS\b|\bReDoS\b|\bNVD\b|malicious|xโˆ’frameโˆ’options|attack|cross site |ex
ploit|malicious|directory traversal |\bRCE\b|\bdos\b|\bXSRF \b|\bXSS\b|clickjack|session.fixation|hijack|\badvisory|\binsecure |security |\bcrossโˆ’origin\b|unauthori[z|s]ed |infinite loop)",
"pattern-matches": [
"attack"
],
"cve": [
"CVE-2017-3733",
"CVE-2015-0293",
"CVE-2011-4577",
"CVE-2002-1568"
],
"state": "cve-assigned"
}

Acknowledgment
  • Thanks to Jean-Louis Huynen for the discussions about the crypto vulnerability pattern
  • Thanks to Sebastien Tricaud for the discussions regarding native language and commit messages

References


...



๐Ÿ“Œ High CVE-2018-3785: Git-dummy-commit project Git-dummy-commit


๐Ÿ“ˆ 47.3 Punkte

๐Ÿ“Œ Pre-commit checks to format your files and commitย messages


๐Ÿ“ˆ 41.56 Punkte

๐Ÿ“Œ Automatically Prefix JIRA Issue ID to Git Commit Messages using Git Hooks


๐Ÿ“ˆ 41.01 Punkte

๐Ÿ“Œ How To Enforce Conventional Commit Messages Using GIT Hooks


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ Closing a Knowledge Gap: Best Practices for Writing Git Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ ChatGPT Git Hook Writes Your Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ Git Good: Best Practices for Branch Naming and Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ So schreibt ihr richtig gute Git-Commit-Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ How to write better Git commit messages ?


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ Visual Studio 2022 Version 17.9: GitHub Copilot erstellt Git Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ Visual Studio 2022 Version 17.9: GitHub Copilot erstellt Git Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ Visual Studio 2022 Version 17.9: GitHub Copilot erstellt Git Commit Messages


๐Ÿ“ˆ 33.31 Punkte

๐Ÿ“Œ GitHub Commits Color Scheme: Lets commit to commit.


๐Ÿ“ˆ 31.9 Punkte

๐Ÿ“Œ Git Commit: Snapshots erstellen in Git


๐Ÿ“ˆ 31.35 Punkte

๐Ÿ“Œ Linux turned 30 this year: search through 1 Million+ Linux kernel commit messages


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Mastering the Art of Writing Effective GitHub Commit Messages


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ How to Search in Commit Messages Using Command Line?


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Use "cz-vinyl" package to commit more readable messages with one command


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ How to Write Commit Messages that Project Maintainers Will Appreciate


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ How to Write Good Commit Messages


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Write good commit messages to accelerate your dev career


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Why Good Commit Messages Matter, Even For Solo Developers


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Write good commit messages to accelerate your dev career


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Mastering Standard Commits: Quick Guide to Structured Commit Messages


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Best Practices for Branch Naming Conventions and Effective Commit Messages


๐Ÿ“ˆ 25.61 Punkte

๐Ÿ“Œ Updates to the Git Commit Graph Feature


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ What's happens when you `git commit`


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ Adding a git commit hash and Azure DevOps Build Number and Build ID to an ASP.NET website


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ git-dummy-commit 1.3.0 Parameter command injection


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ Mail.ru: Sensitive information exposure via git commit


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ Commit message editor (Git/Mercurial)


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ Git-Commit-Nachrichten kreativ nutzen - Dev-Insider


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ Git Merge Without Auto Commit


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ How to Tag an Older Commit in Git?


๐Ÿ“ˆ 23.65 Punkte

๐Ÿ“Œ How to Add a File to the Last Commit in Git?


๐Ÿ“ˆ 23.65 Punkte











matomo