A .net client for OSSIndex (https://ossindex.sonatype.org/).
See Milestones for release notes.
https://nuget.org/packages/OssIndexClient/
using var ossIndexClient = new OssIndex();
var report = await ossIndexClient.GetReport(
new(
ecoSystem: EcoSystem.nuget,
name: "System.Net.Http",
version: "4.3.1"));
foreach (var vulnerability in report.Vulnerabilities)
{
Debug.WriteLine(vulnerability.Title);
}
using var ossIndexClient = new OssIndex();
var reports = await ossIndexClient.GetReports(
new(
ecoSystem: EcoSystem.nuget,
name: "System.Net.Http",
version: "4.3.1"),
new(
ecoSystem: EcoSystem.npm,
name: "jquery",
version: "1.11.3"));
foreach (var report in reports)
{
foreach (var vulnerability in report.Vulnerabilities)
{
Debug.WriteLine(vulnerability.Title);
}
}
{
EcoSystem: nuget,
Name: System.Net.Http,
Version: 4.3.1,
Description: This package provides a programming interface for modern HTTP applications. This package includes HttpClient for sending requests over HTTP, as well as HttpRequestMessage and HttpResponseMessage for processing HTTP messages.,
Reference: https://ossindex.sonatype.org/component/pkg:nuget/System.Net.Http@4.3.1?utm_source=ossindexclient&utm_medium=integration,
Vulnerabilities: [
{
Id: CVE-2017-0248,
Title: [CVE-2017-0248] CWE-295: Improper Certificate Validation,
Description: Microsoft .NET Framework 2.0, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 4.7 allow an attacker to bypass Enhanced Security Usage taggings when they present a certificate that is invalid for a specific use, aka ".NET Security Feature Bypass Vulnerability.",
CvssScore: 7.5,
CvssVector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N,
Cve: CVE-2017-0248,
Cwe: CWE-295,
Reference: https://ossindex.sonatype.org/vulnerability/CVE-2017-0248?component-type=nuget&component-name=System.Net.Http&utm_source=ossindexclient&utm_medium=integration,
ExternalReferences: [
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0248,
https://github.com/dotnet/corefx/issues/19535,
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2017-0248
]
},
{
Id: CVE-2017-0249,
Title: [CVE-2017-0249] CWE-20: Improper Input Validation,
Description: An elevation of privilege vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.,
CvssScore: 7.3,
CvssVector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L,
Cve: CVE-2017-0249,
Cwe: CWE-20,
Reference: https://ossindex.sonatype.org/vulnerability/CVE-2017-0249?component-type=nuget&component-name=System.Net.Http&utm_source=ossindexclient&utm_medium=integration,
ExternalReferences: [
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0249,
https://github.com/aspnet/Announcements/issues/239
]
},
{
Id: CVE-2017-0256,
Title: [CVE-2017-0256] CWE-20: Improper Input Validation,
Description: A spoofing vulnerability exists when the ASP.NET Core fails to properly sanitize web requests.,
CvssScore: 5.3,
CvssVector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N,
Cve: CVE-2017-0256,
Cwe: CWE-20,
Reference: https://ossindex.sonatype.org/vulnerability/CVE-2017-0256?component-type=nuget&component-name=System.Net.Http&utm_source=ossindexclient&utm_medium=integration,
ExternalReferences: [
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-0256,
https://github.com/aspnet/Announcements/issues/239
]
},
{
Id: CVE-2018-8292,
Title: [CVE-2018-8292] CWE-200: Information Exposure,
Description: An information disclosure vulnerability exists in .NET Core when authentication information is inadvertently exposed in a redirect, aka ".NET Core Information Disclosure Vulnerability." This affects .NET Core 2.1, .NET Core 1.0, .NET Core 1.1, PowerShell Core 6.0.,
CvssScore: 7.5,
CvssVector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N,
Cve: CVE-2018-8292,
Cwe: CWE-200,
Reference: https://ossindex.sonatype.org/vulnerability/CVE-2018-8292?component-type=nuget&component-name=System.Net.Http&utm_source=ossindexclient&utm_medium=integration,
ExternalReferences: [
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-8292,
https://github.com/dotnet/announcements/issues/88,
https://github.com/dotnet/corefx/issues/32730
]
}
]
}
The supported OSSIndex Package Ecosystems are represented by an enum.
public enum EcoSystem
{
/// <summary>https://alpinelinux.org</summary>
alpine,
/// <summary>https://bower.io</summary>
bower,
/// <summary>https://crates.io</summary>
cargo,
/// <summary>https://chocolatey.org</summary>
chocolatey,
/// <summary>https://clojars.org</summary>
clojars,
/// <summary>https://getcomposer.org</summary>
composer,
/// <summary>https://conan.io</summary>
conan,
/// <summary>https://conda.io</summary>
conda,
/// <summary>https://cran.r-project.org</summary>
cran,
/// <summary>https://www.debian.org</summary>
deb,
/// <summary>https://www.drupal.org</summary>
drupal,
/// <summary>https://golang.org/pkg</summary>
golang,
/// <summary>https://maven.apache.org</summary>
maven,
/// <summary>https://www.npmjs.com</summary>
npm,
/// <summary>https://www.nuget.org</summary>
nuget,
/// <summary>https://pypi.org</summary>
pypi,
/// <summary>https://rpm.org</summary>
rpm,
/// <summary>https://rubygems.org</summary>
gem,
}
Security designed by Made from The Noun Project.