CAST HIGHLIGHT - Results - SCA - CVE's fewer than expected

It is found that only fewer violations from what is expected are detected.

Details

  •  
    • Make sure you are using the latest version of the analyzer. Re-scan with the latest version of the Code reader https://doc.casthighlight.com/codereader/ or CLI command line. Please note that analyzers are regularly updated with improvements.
    • Check if all the files that should be scanned are scanned.
    • Check if the components are detected correctly by SCA.
      •  
        • Check MANAGE PORTFOLIO > Manage Component Catalog to see if the component and / or its version is present. Please refer CAST HIGHLIGHT - SCA - How to verify if any file is open source and has SCA results?
          •  
            • Request for a component update if an update of the component version is required.

              Click on the component, then click the button shown below

              1.png

            • Check if the version number detected is wrong. Please refer CAST HIGHLIGHT - SCA - Version Number - Wrong component version number detected
            • If the component version is not detected the component will be listed in 'Additional Components with partial information'. And no CVEs will be reported as Highlight needs the version to trigger CVE detection.
        • Highlight doesn't crawl static websites. Highlight supports NuGet, Github, etc. If the file used in the application does not come from NuGet, Github, etc,  then the solution will be to replace this file in the application by the one published on Github or Nuget with the same version.
        • Highlight browses only public repositories. If the component provider uses  a "private" solution  or a private cdn for deployment the component may not get scanned.  
        • In some exceptional and rare cases CVE's might not be detected when a component is embedded/published as a different organization's repository . The CVE detection algorithm looks at the groupId and the artifactId  and version no. If the  group ID is not the same then there will be a mismatch between NIST and SCA database, it finds no CVE. An example :  Some company may publish the Apache Batik-util binaries (JARs) under their own repository, in the version of their own product. But the correct batik-util 1.7 is there in the repository:  https://search.maven.org/artifact/org.apache.xmlgraphics/batik-util/1.7/jar which is referenced in Highlight SCA database.  This can be verified using Highlights Component Catalog search feature  CAST HIGHLIGHT - SCA - How to verify if any file is open-source and has SCA results It can be seen that Highlight knows and is able to detect this CVEs when Apache Batik-Util is referenced the right way. 
        • For binaries (e.g., .dll, .jar) and dependencies (e.g., pom.xml, package-lock.json, etc.), Highlight displays only one occurrence of the paths from where the fingerprint has been detected. Because of this though the .jar files are available in many file paths, the detected component may show file count as one from one of the file paths. 
        • Maven Central is the forge Highlight crawls for Maven components, not MavenRepository or any other. If the component is not listed in Maven Central it might not be listed.
        • Highlight looks for vulnerabilities for components in https://nvd.nist.gov/vuln/ not Maven Central repository. So a vulnerability reported in Maven Central if it is not there in the nvd website may not be counted and vice versa. 
        • There have been some functional enhancements to the analyzer in regards to SCA processing especially for applications using Maven/pom.xml technologies through version 5.7.24. So using a version at or above that version can allow for better SCA identification.  See the documentation for the CLI for more details, especially on how to use the following flags which can impact the SCA results
          • --mavenRepository
          • --includeAllDependencies
  • There can be CPE name discrepancy (NIST doesn't not necessarily name products by the technical name). The  component might even show up in the BOM section for incomplete information. Please refer CAST HIGHLIGHT - SCA - What are Vulnerabilities (CVE), Weaknesses (CWE) Advisories and Common Platform Enumeration (CPE) ?
  • When a new CVE is identified in the National Vulnerability Database (NVD) from NIST, it will not be reflected in the existing Highlight OSS calculations automatically. Please also refer CAST HIGHLIGHT - SCA - When a new CVE is identified in the NVD database, will it get reflected automatically in Highlight's OSS calculations?

 

Related Articles

Software Composition in Highlight: How Open Source component detection works

CAST HIGHLIGHT - SCA - How to verify if any file is open-source and has SCA results

CAST HIGHLIGHT - Results - SCA - False positives in Software Composition Analysis

CAST HIGHLIGHT - Results - SCA - Ruby - How to avoid false positives with ruby dependencies

CAST HIGHLIGHT - Results - SCA - Python - Dependencies are not getting detected

CAST HIGHLIGHT - SCA - CVE values different in the component project time line and at the application component level page

 

Additional Resources

Getting Started Guide

CAST Highlight Troubleshooting Guides

CAST Highlight Product Documentation

 

Zendesk Ticket Number 

21555, 27958, 40446, 41224, 47906, 47899, 49271, 50941, 52042, 53751, 55235

Have more questions? Submit a request

Comments

Powered by Zendesk