Incomplete Vulnerability Detection for google-cloud-storage:2.23.0 #5727
Closed
sagic-orca
started this conversation in
False Detection
Replies: 1 comment
-
Hello @sagic-orca I checked ➜ unzip -d gcs-2.23.0 google-cloud-storage-2.23.0.jar
...
➜ find ./gcs-2.23.0 -name "pom.properties"
./gcs-2.23.0/META-INF/maven/com.google.cloud/google-cloud-storage/pom.properties
➜ cat ./gcs-2.23.0/META-INF/maven/com.google.cloud/google-cloud-storage/pom.properties
artifactId=google-cloud-storage
groupId=com.google.cloud
version=2.23.0
➜ find ./gcs-2.23.0 -name "*.jar" More information about scan About auto-value:
Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2023-2976, CVE-2020-8908
Description
Incomplete Vulnerability Detection for google-cloud-storage:2.23.0
Upon executing a trivy rootfs scan for both auto-value:1.10.1 and google-cloud-storage:2.23.0, which share the same vulnerable dependency (guava:31.1-jre), Trivy successfully identified the related CVEs for auto-value but failed to detect any vulnerabilities for the google cloud package.
Interestingly, running Trivy directly on the pom.xml produced the expected CVEs in the scan results.
This problem also occurred during the image scan.
Reproduction Steps
Target
Filesystem
Scanner
Vulnerability
Target OS
No response
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions