Skip to content

Commit 014c4d1

Browse files
committed
feat: cdx vex
1 parent 4766383 commit 014c4d1

File tree

7 files changed

+695
-18
lines changed

7 files changed

+695
-18
lines changed
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Generated by Django 5.2.4 on 2025-07-30 12:57
2+
3+
from django.db import migrations, models
4+
5+
6+
class Migration(migrations.Migration):
7+
8+
dependencies = [
9+
("vex", "0007_alter_csaf_tracking_current_release_date_and_more"),
10+
]
11+
12+
operations = [
13+
migrations.AlterField(
14+
model_name="vex_document",
15+
name="type",
16+
field=models.CharField(
17+
choices=[("CSAF", "CSAF"), ("OpenVEX", "OpenVEX"), ("CycloneDX", "CycloneDX")], max_length=16
18+
),
19+
),
20+
]
Lines changed: 346 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,346 @@
1+
from dataclasses import dataclass
2+
from typing import Optional
3+
4+
from rest_framework.exceptions import ValidationError
5+
6+
from application.core.api.serializers_helpers import validate_purl
7+
from application.vex.models import VEX_Document, VEX_Statement
8+
from application.vex.services.vex_engine import apply_vex_statements_after_import
9+
from application.vex.types import (
10+
CycloneDX_Analysis_State,
11+
VEX_Document_Type,
12+
VEX_Justification,
13+
VEX_Status,
14+
)
15+
16+
17+
@dataclass
18+
class CycloneDX_Analysis:
19+
state: str = ""
20+
justification: str = ""
21+
response: Optional[list[str]] = None
22+
detail: str = ""
23+
first_issued: str = ""
24+
last_updated: str = ""
25+
26+
def __post_init__(self) -> None:
27+
if self.response is None:
28+
self.response = []
29+
30+
31+
@dataclass
32+
class VexStatementData:
33+
vulnerability_id: str
34+
description: str
35+
status: str
36+
justification: str
37+
impact: str
38+
remediation: str
39+
product_purl: str
40+
component_purl: str = ""
41+
42+
43+
def parse_cyclonedx_data(data: dict) -> None:
44+
cyclonedx_document = _create_cyclonedx_document(data)
45+
46+
product_purls, vex_statements = _process_vex_statements(data, cyclonedx_document)
47+
48+
apply_vex_statements_after_import(product_purls, vex_statements)
49+
50+
51+
def _create_cyclonedx_document(data: dict) -> VEX_Document:
52+
document_id = data.get("serialNumber")
53+
if not document_id:
54+
raise ValidationError("serialNumber is missing")
55+
56+
version_value = data.get("version")
57+
if version_value is None:
58+
raise ValidationError("version is missing")
59+
version = str(version_value)
60+
61+
metadata = data.get("metadata", {})
62+
63+
timestamp = metadata.get("timestamp")
64+
if not timestamp:
65+
raise ValidationError("metadata/timestamp is missing")
66+
67+
author = None
68+
# Prefer authors list if available
69+
authors = metadata.get("authors")
70+
if authors and isinstance(authors, list) and len(authors) > 0:
71+
# Find the first author with a name set
72+
author = next(
73+
(item.get("name") for item in authors if isinstance(item, dict) and item.get("name")),
74+
None,
75+
)
76+
77+
# Fall back to manufacturer or supplier if no authors
78+
if not author:
79+
author = metadata.get("manufacturer", {}).get("name") or metadata.get("supplier", {}).get("name")
80+
81+
if not author:
82+
raise ValidationError("author is missing")
83+
84+
try:
85+
cyclonedx_document = VEX_Document.objects.get(document_id=document_id, author=author)
86+
cyclonedx_document.delete()
87+
except VEX_Document.DoesNotExist:
88+
pass
89+
90+
cyclonedx_document = VEX_Document.objects.create(
91+
type=VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX,
92+
document_id=document_id,
93+
version=version,
94+
initial_release_date=timestamp,
95+
current_release_date=timestamp,
96+
author=author,
97+
role="",
98+
)
99+
100+
return cyclonedx_document
101+
102+
103+
def _process_vex_statements(data: dict, cyclonedx_document: VEX_Document) -> tuple[set[str], set[VEX_Statement]]:
104+
vulnerabilities = data.get("vulnerabilities", [])
105+
if not vulnerabilities:
106+
raise ValidationError("CycloneDX document doesn't contain any vulnerabilities")
107+
if not isinstance(vulnerabilities, list):
108+
raise ValidationError("vulnerabilities is not a list")
109+
110+
components_map = _build_components_map(data)
111+
112+
product_purl = data.get("metadata", {}).get("component", {}).get("purl", "")
113+
if not product_purl:
114+
raise ValidationError("metadata/component/purl is missing")
115+
validate_purl(product_purl)
116+
117+
product_purls: set[str] = set()
118+
vex_statements: set[VEX_Statement] = set()
119+
120+
vulnerability_counter = 0
121+
for vulnerability in vulnerabilities:
122+
if not isinstance(vulnerability, dict):
123+
raise ValidationError(f"vulnerability[{vulnerability_counter}] is not a dictionary")
124+
125+
vulnerability_id = vulnerability.get("id")
126+
if not vulnerability_id:
127+
raise ValidationError(f"vulnerability[{vulnerability_counter}]/id is missing")
128+
129+
analysis = vulnerability.get("analysis", {})
130+
if not analysis:
131+
# Skip vulnerabilities without analysis
132+
vulnerability_counter += 1
133+
continue
134+
135+
cyclonedx_analysis = _parse_analysis(analysis, vulnerability_counter)
136+
137+
vex_status = _map_cyclonedx_state_to_vex_status(cyclonedx_analysis.state)
138+
if not vex_status:
139+
raise ValidationError(
140+
f"vulnerability[{vulnerability_counter}]/analysis/state is not valid: {cyclonedx_analysis.state}"
141+
)
142+
143+
description = vulnerability.get("description", "")
144+
detail = vulnerability.get("detail", "")
145+
if detail:
146+
description += f"\n\n{detail}"
147+
148+
remediation = _build_remediation_text(cyclonedx_analysis.response, vulnerability.get("recommendation", ""))
149+
150+
affects = vulnerability.get("affects", [])
151+
if not affects:
152+
# General statement for the product
153+
_create_vex_statement(
154+
cyclonedx_document,
155+
product_purls,
156+
vex_statements,
157+
data=VexStatementData(
158+
vulnerability_id=vulnerability_id,
159+
description=description,
160+
status=vex_status,
161+
justification=cyclonedx_analysis.justification,
162+
impact=cyclonedx_analysis.detail,
163+
remediation=remediation,
164+
product_purl=product_purl,
165+
component_purl="",
166+
),
167+
)
168+
elif not isinstance(affects, list):
169+
raise ValidationError(f"affects[{vulnerability_counter}] is not a list")
170+
else:
171+
_process_affected_components(
172+
document=cyclonedx_document,
173+
product_purls=product_purls,
174+
vex_statements=vex_statements,
175+
vulnerability_counter=vulnerability_counter,
176+
vex_data=VexStatementData(
177+
vulnerability_id=vulnerability_id,
178+
description=description,
179+
status=vex_status,
180+
justification=cyclonedx_analysis.justification,
181+
impact=cyclonedx_analysis.detail,
182+
remediation=remediation,
183+
product_purl=product_purl,
184+
),
185+
affects=affects,
186+
components_map=components_map,
187+
)
188+
189+
vulnerability_counter += 1
190+
191+
return product_purls, vex_statements
192+
193+
194+
def _build_components_map(data: dict) -> dict[str, dict]:
195+
components_map = {}
196+
197+
# Add root component from metadata
198+
metadata_component = data.get("metadata", {}).get("component")
199+
if metadata_component and metadata_component.get("bom-ref"):
200+
components_map[metadata_component["bom-ref"]] = metadata_component
201+
202+
# Add all components
203+
for component in data.get("components", []):
204+
if component.get("bom-ref"):
205+
components_map[component["bom-ref"]] = component
206+
207+
return components_map
208+
209+
210+
def _parse_analysis(analysis: dict, vulnerability_counter: int) -> CycloneDX_Analysis:
211+
state = analysis.get("state", "")
212+
if not state:
213+
raise ValidationError(f"vulnerability[{vulnerability_counter}]/analysis/state is missing")
214+
215+
justification = analysis.get("justification", "")
216+
if justification:
217+
justification = _map_cyclonedx_justification_to_vex_justification(justification) or ""
218+
response = analysis.get("response", [])
219+
if not isinstance(response, list):
220+
response = []
221+
222+
detail = analysis.get("detail", "")
223+
first_issued = analysis.get("firstIssued", "")
224+
last_updated = analysis.get("lastUpdated", "")
225+
226+
return CycloneDX_Analysis(
227+
state=state,
228+
justification=justification,
229+
response=response,
230+
detail=detail,
231+
first_issued=first_issued,
232+
last_updated=last_updated,
233+
)
234+
235+
236+
def _map_cyclonedx_state_to_vex_status(state: str) -> Optional[str]:
237+
mapping = {
238+
CycloneDX_Analysis_State.CYCLONEDX_STATE_RESOLVED: VEX_Status.VEX_STATUS_FIXED,
239+
CycloneDX_Analysis_State.CYCLONEDX_STATE_RESOLVED_WITH_PEDIGREE: VEX_Status.VEX_STATUS_FIXED,
240+
CycloneDX_Analysis_State.CYCLONEDX_STATE_EXPLOITABLE: VEX_Status.VEX_STATUS_AFFECTED,
241+
CycloneDX_Analysis_State.CYCLONEDX_STATE_IN_TRIAGE: VEX_Status.VEX_STATUS_UNDER_INVESTIGATION,
242+
CycloneDX_Analysis_State.CYCLONEDX_STATE_FALSE_POSITIVE: VEX_Status.VEX_STATUS_NOT_AFFECTED,
243+
CycloneDX_Analysis_State.CYCLONEDX_STATE_NOT_AFFECTED: VEX_Status.VEX_STATUS_NOT_AFFECTED,
244+
}
245+
return mapping.get(state)
246+
247+
248+
def _build_remediation_text(response: Optional[list[str]], recommendation: str) -> str:
249+
remediation_parts = []
250+
251+
if response:
252+
response_text = ", ".join(response)
253+
remediation_parts.append(f"Response: {response_text}")
254+
255+
if recommendation:
256+
remediation_parts.append(recommendation)
257+
258+
return "; ".join(remediation_parts)
259+
260+
261+
def _map_cyclonedx_justification_to_vex_justification(justification: str) -> Optional[str]:
262+
mapping = {
263+
"code_not_present": VEX_Justification.STATUS_VULNERABLE_CODE_NOT_PRESENT,
264+
"code_not_reachable": VEX_Justification.STATUS_VULNERABLE_CODE_NOT_IN_EXECUTE_PATH,
265+
"requires_configuration": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
266+
"requires_dependency": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
267+
"requires_environment": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
268+
"protected_by_compiler": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
269+
"protected_at_runtime": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
270+
"protected_at_perimeter": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
271+
"protected_by_mitigating_control": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
272+
}
273+
return mapping.get(justification)
274+
275+
276+
def _process_affected_components(
277+
*,
278+
document: VEX_Document,
279+
product_purls: set[str],
280+
vex_statements: set[VEX_Statement],
281+
vulnerability_counter: int,
282+
vex_data: VexStatementData,
283+
affects: list,
284+
components_map: dict,
285+
) -> None:
286+
affected_counter = 0
287+
for affected in affects:
288+
if not isinstance(affected, dict):
289+
raise ValidationError(f"affects[{vulnerability_counter}][{affected_counter}] is not a dictionary")
290+
291+
ref = affected.get("ref")
292+
if not ref:
293+
raise ValidationError(f"affects[{vulnerability_counter}][{affected_counter}]/ref is missing")
294+
295+
component = components_map.get(ref)
296+
if not component:
297+
raise ValidationError(
298+
f"affects[{vulnerability_counter}][{affected_counter}]/ref '{ref}' not found in components"
299+
)
300+
301+
component_purl = component.get("purl", "")
302+
if not component_purl:
303+
raise ValidationError(
304+
f"affects[{vulnerability_counter}][{affected_counter}]/ref '{ref}' component is missing purl"
305+
)
306+
validate_purl(component_purl)
307+
308+
_create_vex_statement(
309+
document,
310+
product_purls,
311+
vex_statements,
312+
data=VexStatementData(
313+
vulnerability_id=vex_data.vulnerability_id,
314+
description=vex_data.description,
315+
status=vex_data.status,
316+
justification=vex_data.justification,
317+
impact=vex_data.impact,
318+
remediation=vex_data.remediation,
319+
product_purl=vex_data.product_purl,
320+
component_purl=component_purl,
321+
),
322+
)
323+
324+
affected_counter += 1
325+
326+
327+
def _create_vex_statement(
328+
document: VEX_Document,
329+
product_purls: set[str],
330+
vex_statements: set[VEX_Statement],
331+
data: VexStatementData,
332+
) -> None:
333+
vex_statement = VEX_Statement(
334+
document=document,
335+
vulnerability_id=data.vulnerability_id,
336+
description=data.description,
337+
status=data.status,
338+
justification=data.justification,
339+
impact=data.impact,
340+
remediation=data.remediation,
341+
product_purl=data.product_purl,
342+
component_purl=data.component_purl,
343+
)
344+
vex_statement.save()
345+
vex_statements.add(vex_statement)
346+
product_purls.add(data.product_purl)

backend/application/vex/services/vex_import.py

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
from rest_framework.exceptions import ValidationError
66

77
from application.vex.services.csaf_parser import parse_csaf_data
8+
from application.vex.services.cyclonedx_parser import parse_cyclonedx_data
89
from application.vex.services.openvex_parser import parse_openvex_data
910
from application.vex.types import VEX_Document_Type
1011

@@ -22,6 +23,8 @@ def import_vex(vex_file: File) -> None:
2223
parse_openvex_data(data)
2324
elif vex_type == VEX_Document_Type.VEX_DOCUMENT_TYPE_CSAF:
2425
parse_csaf_data(data)
26+
elif vex_type == VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX:
27+
parse_cyclonedx_data(data)
2528

2629

2730
def _get_json_data(vex_file: File) -> Optional[dict]:
@@ -40,4 +43,7 @@ def _get_vex_type(data: dict) -> Optional[str]:
4043
if data.get("document", {}).get("category") == "csaf_vex" and data.get("document", {}).get("csaf_version") == "2.0":
4144
return VEX_Document_Type.VEX_DOCUMENT_TYPE_CSAF
4245

46+
if data.get("bomFormat") == "CycloneDX":
47+
return VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX
48+
4349
return None

0 commit comments

Comments
 (0)