diff --git a/README.md b/README.md index f9a60d1..6701ee0 100644 --- a/README.md +++ b/README.md @@ -327,7 +327,6 @@ The following tests are not yet implemented and therefore missing: - Mandatory Test 6.1.44 - Mandatory Test 6.1.45 - Mandatory Test 6.1.46 -- Mandatory Test 6.1.47 - Mandatory Test 6.1.48 - Mandatory Test 6.1.49 - Mandatory Test 6.1.50 @@ -435,6 +434,7 @@ export const mandatoryTest_6_1_38: DocumentTest export const mandatoryTest_6_1_39: DocumentTest export const mandatoryTest_6_1_40: DocumentTest export const mandatoryTest_6_1_41: DocumentTest +export const mandatoryTest_6_1_47: DocumentTest ``` [(back to top)](#bsi-csaf-validator-lib) diff --git a/csaf_2_1/mandatoryTests.js b/csaf_2_1/mandatoryTests.js index f51d680..1bf63f3 100644 --- a/csaf_2_1/mandatoryTests.js +++ b/csaf_2_1/mandatoryTests.js @@ -49,3 +49,4 @@ export { mandatoryTest_6_1_38 } from './mandatoryTests/mandatoryTests_6_1_38.js' export { mandatoryTest_6_1_39 } from './mandatoryTests/mandatoryTest_6_1_39.js' export { mandatoryTest_6_1_40 } from './mandatoryTests/mandatoryTest_6_1_40.js' export { mandatoryTest_6_1_41 } from './mandatoryTests/mandatoryTest_6_1_41.js' +export { mandatoryTest_6_1_47 } from './mandatoryTests/mandatoryTest_6_1_47.js' diff --git a/csaf_2_1/mandatoryTests/mandatoryTest_6_1_47.js b/csaf_2_1/mandatoryTests/mandatoryTest_6_1_47.js new file mode 100644 index 0000000..05569a1 --- /dev/null +++ b/csaf_2_1/mandatoryTests/mandatoryTest_6_1_47.js @@ -0,0 +1,111 @@ +import Ajv from 'ajv/dist/jtd.js' + +const ajv = new Ajv() + +/* + This is the jtd schema that needs to match the input document so that the + test is activated. If this schema doesn't match it normally means that the input + document does not validate against the csaf json schema or optional fields that + the test checks are not present. + */ +const inputSchema = /** @type {const} */ ({ + additionalProperties: true, + properties: { + document: { + additionalProperties: true, + optionalProperties: { + tracking: { + additionalProperties: true, + optionalProperties: { + id: { type: 'string' }, + }, + }, + }, + }, + vulnerabilities: { + elements: { + additionalProperties: true, + optionalProperties: { + cve: { type: 'string' }, + ids: { + elements: { + additionalProperties: true, + optionalProperties: { + text: { type: 'string' }, + }, + }, + }, + metrics: { + elements: { + additionalProperties: true, + optionalProperties: { + content: { + additionalProperties: true, + optionalProperties: { + ssvc_v1: { + additionalProperties: true, + optionalProperties: { + id: { type: 'string' }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, + }, +}) + +const validateInput = ajv.compile(inputSchema) + +/** + * This implements the mandatory test 6.1.47 of the CSAF 2.1 standard. + * + * @param {any} doc + */ +export function mandatoryTest_6_1_47(doc) { + const ctx = { + errors: + /** @type {Array<{ instancePath: string; message: string }>} */ ([]), + isValid: true, + } + + if (!validateInput(doc)) { + return ctx + } + + doc.vulnerabilities.forEach((vulnerability, vulnerabilityIndex) => { + vulnerability.metrics?.forEach((metric, metricIndex) => { + if (metric.content?.ssvc_v1) { + const ssvcId = metric.content.ssvc_v1.id + if (ssvcId === doc.document.tracking?.id) { + if (doc.vulnerabilities.length > 1) { + ctx.isValid = false + ctx.errors.push({ + instancePath: `/vulnerabilities/${vulnerabilityIndex}/metrics/${metricIndex}/content/ssvc_v1/id`, + message: + `the ssvc id equals the 'document/tracking/id' ` + + `even the csaf document has multiple vulnerabilities `, + }) + } + } else { + const idTexts = vulnerability.ids?.map((id) => id.text) + if (ssvcId !== vulnerability.cve && !idTexts?.includes(ssvcId)) { + ctx.isValid = false + ctx.errors.push({ + instancePath: `/vulnerabilities/${vulnerabilityIndex}/metrics/${metricIndex}/content/ssvc_v1/id`, + message: + `the ssvc id does neither match the 'cve' ` + + `nor it matches the 'text' of any item in the 'ids' array`, + }) + } + } + } + }) + }) + + return ctx +} diff --git a/tests/csaf_2_1/mandatoryTest_6_1_47.js b/tests/csaf_2_1/mandatoryTest_6_1_47.js new file mode 100644 index 0000000..4ff8576 --- /dev/null +++ b/tests/csaf_2_1/mandatoryTest_6_1_47.js @@ -0,0 +1,45 @@ +import assert from 'node:assert/strict' +import { mandatoryTest_6_1_47 } from '../../csaf_2_1/mandatoryTests/mandatoryTest_6_1_47.js' +import { expect } from 'chai' + +const failingInputSchemaTestWithEmptyVulnerability6_1_47 = { + document: {}, + vulnerabilities: [ + {}, // even this vulnerability is empty, the test should run + { + cve: 'CVE-1900-0001', + metrics: [ + { + content: { + ssvc_v1: { + id: 'CVE-1900-0002', + schemaVersion: '1-0-1', + selections: [ + { + name: 'Exploitation', + namespace: 'ssvc', + values: ['None'], + version: '1.1.0', + }, + ], + timestamp: '2024-01-24T10:00:00.000Z', + }, + }, + products: ['CSAFPID-9080700'], + }, + ], + }, + ], +} + +describe('mandatoryTest_6_1_47', function () { + it('only runs on relevant documents', function () { + assert.equal(mandatoryTest_6_1_47({ document: 'mydoc' }).isValid, true) + }) + it('test input schema with empty json object in vulnerabilities', async function () { + const result = mandatoryTest_6_1_47( + failingInputSchemaTestWithEmptyVulnerability6_1_47 + ) + expect(result.errors.length).to.eq(1) + }) +}) diff --git a/tests/csaf_2_1/oasis.js b/tests/csaf_2_1/oasis.js index c1c7642..f9908e3 100644 --- a/tests/csaf_2_1/oasis.js +++ b/tests/csaf_2_1/oasis.js @@ -32,7 +32,6 @@ const excluded = [ '6.1.44', '6.1.45', '6.1.46', - '6.1.47', '6.1.48', '6.1.49', '6.1.50',