Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
86 changes: 86 additions & 0 deletions .github/workflows/vulnerability-check.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,86 @@
name: Maven Dependency Vulnerability Check

on:
push:
paths:
- 'pom.xml'
pull_request:
paths:
- 'pom.xml'
schedule:
# Run weekly on Sundays at 00:00 UTC
- cron: '0 0 * * 0'
workflow_dispatch:

jobs:
vulnerability-scan:
runs-on: ubuntu-latest
name: Scan Maven Dependencies for Vulnerabilities

permissions:
contents: read
pull-requests: write

steps:
- name: Checkout code
uses: actions/checkout@v3

- name: Set up Python
uses: actions/setup-python@v4
with:
python-version: '3.x'

- name: Parse Maven dependencies
run: |
echo "Parsing dependencies from pom.xml..."
python3 parse-dependencies.py

- name: Generate vulnerability reports
run: |
echo "Generating vulnerability reports..."
./check-vulnerabilities.sh
python3 comprehensive-vuln-check.py

- name: Display summary
run: |
echo "========================================="
echo "Vulnerability Scan Summary"
echo "========================================="
cat comprehensive-vulnerability-report.md | grep -A 5 "Executive Summary"

- name: Upload vulnerability reports
uses: actions/upload-artifact@v3
with:
name: vulnerability-reports
path: |
comprehensive-vulnerability-report.md
vulnerability-check-report.md
dependency-list.md
dependencies-to-check.json
retention-days: 90

- name: Check for critical vulnerabilities
run: |
if grep -q "🔴 Critical" comprehensive-vulnerability-report.md; then
echo "::error::Critical vulnerabilities detected! Please review the vulnerability report."
exit 1
fi

- name: Comment on PR (if applicable)
if: github.event_name == 'pull_request'
uses: actions/github-script@v6
with:
script: |
const fs = require('fs');
const report = fs.readFileSync('comprehensive-vulnerability-report.md', 'utf8');

// Extract summary section
const summaryMatch = report.match(/## Executive Summary[\s\S]*?(?=##)/);
const summary = summaryMatch ? summaryMatch[0] : 'See full report in artifacts';

github.rest.issues.createComment({
issue_number: context.issue.number,
owner: context.repo.owner,
repo: context.repo.repo,
body: `## Vulnerability Scan Results\n\n${summary}\n\n📄 Full reports available in workflow artifacts.`
});
246 changes: 246 additions & 0 deletions ENDOR-LABS-CHECK-INSTRUCTIONS.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,246 @@
# Endor Labs MCP Server - Dependency Check Instructions

This document provides the specific commands to check each Maven dependency using the endor-labs MCP server's `check_dependency_for_vulnerabilities` tool.

## Summary

- **Total Dependencies:** 16
- **Ecosystem:** maven
- **Source:** pom.xml

## Critical Priority Dependencies (Check First)

### 1. log4j-core (CRITICAL - Log4Shell)

```python
check_dependency_for_vulnerabilities(
dependency_name='org.apache.logging.log4j:log4j-core',
ecosystem='maven',
version='2.3'
)
```

**Why Critical:** CVE-2021-44228 (Log4Shell) - CVSS 10.0, Remote Code Execution

---

### 2. commons-text (HIGH Priority)

```python
check_dependency_for_vulnerabilities(
dependency_name='org.apache.commons:commons-text',
ecosystem='maven',
version='1.9'
)
```

**Why High:** CVE-2022-42889 - CVSS 9.8, Variable interpolation RCE

---

### 3. mysql-connector-java (HIGH Priority)

```python
check_dependency_for_vulnerabilities(
dependency_name='mysql:mysql-connector-java',
ecosystem='maven',
version='5.1.42'
)
```

**Why High:** Multiple CVEs - CVSS 8.1

---

### 4. c3p0 (MEDIUM Priority)

```python
check_dependency_for_vulnerabilities(
dependency_name='com.mchange:c3p0',
ecosystem='maven',
version='0.9.5.2'
)
```

**Why Medium:** CVE-2019-5427 - CVSS 7.5, XXE vulnerability

---

## All Other Dependencies

### 5. javax.servlet-api

```python
check_dependency_for_vulnerabilities(
dependency_name='javax.servlet:javax.servlet-api',
ecosystem='maven',
version='3.1.0'
)
```

---

### 6. weld-core

```python
check_dependency_for_vulnerabilities(
dependency_name='org.jboss.weld:weld-core',
ecosystem='maven',
version='1.1.33.Final'
)
```

---

### 7. permit-reflect

```python
check_dependency_for_vulnerabilities(
dependency_name='com.nqzero:permit-reflect',
ecosystem='maven',
version='0.3'
)
```

---

### 8. arquillian-config-spi

```python
check_dependency_for_vulnerabilities(
dependency_name='org.jboss.arquillian.config:arquillian-config-spi',
ecosystem='maven',
version='1.7.0.Alpha12'
)
```

---

### 9. arquillian-container-impl-base

```python
check_dependency_for_vulnerabilities(
dependency_name='org.jboss.arquillian.container:arquillian-container-impl-base',
ecosystem='maven',
version='1.7.0.Alpha12'
)
```

---

### 10. shrinkwrap-descriptors-api-base

```python
check_dependency_for_vulnerabilities(
dependency_name='org.jboss.shrinkwrap.descriptors:shrinkwrap-descriptors-api-base',
ecosystem='maven',
version='2.0.0'
)
```

---

### 11. shrinkwrap-impl-base

```python
check_dependency_for_vulnerabilities(
dependency_name='org.jboss.shrinkwrap:shrinkwrap-impl-base',
ecosystem='maven',
version='1.2.6'
)
```

---

### 12. mockito-core

```python
check_dependency_for_vulnerabilities(
dependency_name='org.mockito:mockito-core',
ecosystem='maven',
version='2.28.2'
)
```

---

### 13. error_prone_annotations

```python
check_dependency_for_vulnerabilities(
dependency_name='com.google.errorprone:error_prone_annotations',
ecosystem='maven',
version='2.7.1'
)
```

---

### 14. webcomponentsjs

```python
check_dependency_for_vulnerabilities(
dependency_name='org.webjars.bowergithub.webcomponents:webcomponentsjs',
ecosystem='maven',
version='2.0.0-beta.3'
)
```

---

### 15. shadycss

```python
check_dependency_for_vulnerabilities(
dependency_name='org.webjars.bowergithub.webcomponents:shadycss',
ecosystem='maven',
version='1.9.1'
)
```

---

### 16. semver-api

```python
check_dependency_for_vulnerabilities(
dependency_name='org.semver:api',
ecosystem='maven',
version='0.9.33'
)
```

---

## Batch Processing

To check all dependencies programmatically, load from `dependencies-to-check.json`:

```python
import json

with open('dependencies-to-check.json', 'r') as f:
dependencies = json.load(f)

for dep in dependencies:
check_dependency_for_vulnerabilities(
dependency_name=dep['name'],
ecosystem=dep['ecosystem'],
version=dep['version']
)
```

## Notes

- **Ecosystem:** All dependencies use `ecosystem='maven'`
- **Naming Format:** `groupId:artifactId`
- **Version Format:** As specified in pom.xml (including qualifiers like `.Final`, `-beta.3`, etc.)
- **Priority:** Check critical dependencies first as they pose immediate security risks

## Next Steps

1. Execute checks for all critical/high priority dependencies first
2. Review findings from endor-labs MCP server
3. Compare with findings in `comprehensive-vulnerability-report.md`
4. Update vulnerable dependencies
5. Re-run checks to verify fixes
Loading