-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fortify Parser: Fortification of the the FPR parsing #10901
Conversation
DryRun Security SummaryThis pull request focuses on improving the security and robustness of the Fortify parser functionality within the Dojo application security platform, including adding validation for file extensions, refactoring and enhancing the FortifyFPRParser class to handle different file formats, extract more detailed vulnerability information, and calculate accurate severity levels, thereby strengthening the overall security and reliability of the Fortify parsing capabilities. Expand for full summarySummary: The code changes in this pull request focus on improving the security and robustness of the Fortify parser functionality within the Dojo application security platform. The changes include adding validation for file extensions in the Files Changed:
Code AnalysisWe ran Riskiness🟢 Risk threshold not exceeded. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a tiny suggestion to clarify that we don't want .xml.fpr
but .xml
or .fpr
Co-authored-by: Charles Neill <1749665+cneill@users.noreply.github.com>
The fortify parser made a lot of assumptions on the exact structure of the XML, and did not leave much room for error. This PR accommodates the absences of some data, as well as supporting some variance in formats
[sc-7434]