Skip to content

Commit be7a79f

Browse files
committed
feat: cdx vex
1 parent ca00903 commit be7a79f

File tree

8 files changed

+573
-35
lines changed

8 files changed

+573
-35
lines changed
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
# Generated by Django 5.2.4 on 2025-07-30 12:57
2+
3+
from django.db import migrations, models
4+
5+
6+
class Migration(migrations.Migration):
7+
8+
dependencies = [
9+
("vex", "0007_alter_csaf_tracking_current_release_date_and_more"),
10+
]
11+
12+
operations = [
13+
migrations.AlterField(
14+
model_name="vex_document",
15+
name="type",
16+
field=models.CharField(
17+
choices=[("CSAF", "CSAF"), ("OpenVEX", "OpenVEX"), ("CycloneDX", "CycloneDX")], max_length=16
18+
),
19+
),
20+
]
Lines changed: 351 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,351 @@
1+
from dataclasses import dataclass
2+
from typing import Optional
3+
4+
from rest_framework.exceptions import ValidationError
5+
6+
from application.core.api.serializers_helpers import validate_purl
7+
from application.vex.models import VEX_Document, VEX_Statement
8+
from application.vex.services.vex_engine import apply_vex_statements_after_import
9+
from application.vex.types import (
10+
CycloneDX_Analysis_State,
11+
VEX_Document_Type,
12+
VEX_Justification,
13+
VEX_Status,
14+
)
15+
16+
17+
@dataclass
18+
class CycloneDX_Analysis:
19+
state: str = ""
20+
justification: str = ""
21+
response: Optional[list[str]] = None
22+
detail: str = ""
23+
first_issued: str = ""
24+
last_updated: str = ""
25+
26+
def __post_init__(self) -> None:
27+
if self.response is None:
28+
self.response = []
29+
30+
31+
def parse_cyclonedx_data(data: dict) -> None:
32+
cyclonedx_document = _create_cyclonedx_document(data)
33+
34+
product_purls, vex_statements = _process_vex_statements(data, cyclonedx_document)
35+
36+
apply_vex_statements_after_import(product_purls, vex_statements)
37+
38+
39+
def _create_cyclonedx_document(data: dict) -> VEX_Document:
40+
document_id = data.get("serialNumber")
41+
if not document_id:
42+
raise ValidationError("serialNumber is missing")
43+
44+
version_value = data.get("version")
45+
if version_value is None:
46+
raise ValidationError("version is missing")
47+
version = str(version_value)
48+
49+
metadata = data.get("metadata", {})
50+
51+
timestamp = metadata.get("timestamp")
52+
if not timestamp:
53+
raise ValidationError("metadata/timestamp is missing")
54+
55+
author = None
56+
# Prefer authors list if available
57+
authors = metadata.get("authors")
58+
if authors and isinstance(authors, list) and len(authors) > 0:
59+
# Find the first author with a name set
60+
author = next(
61+
(item.get("name") for item in authors if isinstance(item, dict) and item.get("name")),
62+
None,
63+
)
64+
65+
# Fall back to manufacturer or supplier if no authors
66+
if not author:
67+
author = metadata.get("manufacturer", {}).get("name") or metadata.get("supplier", {}).get("name")
68+
69+
# Fall back to tools name if available
70+
if not author:
71+
tools = metadata.get("tools")
72+
if isinstance(tools, list) and len(tools) > 0:
73+
first_tool = tools[0]
74+
if isinstance(first_tool, dict):
75+
author = first_tool.get("name") or author
76+
elif isinstance(tools, dict):
77+
author = tools.get("name") or author
78+
79+
if not author:
80+
raise ValidationError("author is missing")
81+
82+
try:
83+
cyclonedx_document = VEX_Document.objects.get(document_id=document_id, author=author)
84+
cyclonedx_document.delete()
85+
except VEX_Document.DoesNotExist:
86+
pass
87+
88+
cyclonedx_document = VEX_Document.objects.create(
89+
type=VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX,
90+
document_id=document_id,
91+
version=version,
92+
initial_release_date=timestamp,
93+
current_release_date=timestamp,
94+
author=author,
95+
role="",
96+
)
97+
98+
return cyclonedx_document
99+
100+
101+
def _process_vex_statements(data: dict, cyclonedx_document: VEX_Document) -> tuple[set[str], set[VEX_Statement]]:
102+
vulnerabilities = data.get("vulnerabilities", [])
103+
if not vulnerabilities:
104+
raise ValidationError("CycloneDX document doesn't contain any vulnerabilities")
105+
if not isinstance(vulnerabilities, list):
106+
raise ValidationError("vulnerabilities is not a list")
107+
108+
components_map = _build_components_map(data)
109+
110+
product_purl = data.get("metadata", {}).get("component", {}).get("purl", "")
111+
if not product_purl:
112+
raise ValidationError("metadata/component/purl is missing")
113+
validate_purl(product_purl)
114+
115+
product_purls: set[str] = set()
116+
vex_statements: set[VEX_Statement] = set()
117+
118+
vulnerability_counter = 0
119+
for vulnerability in vulnerabilities:
120+
if not isinstance(vulnerability, dict):
121+
raise ValidationError(f"vulnerability[{vulnerability_counter}] is not a dictionary")
122+
123+
vulnerability_id = vulnerability.get("id")
124+
if not vulnerability_id:
125+
raise ValidationError(f"vulnerability[{vulnerability_counter}]/id is missing")
126+
127+
analysis = vulnerability.get("analysis", {})
128+
if not analysis:
129+
# Skip vulnerabilities without analysis
130+
vulnerability_counter += 1
131+
continue
132+
133+
cyclonedx_analysis = _parse_analysis(analysis, vulnerability_counter)
134+
135+
vex_status = _map_cyclonedx_state_to_vex_status(cyclonedx_analysis.state)
136+
if not vex_status:
137+
raise ValidationError(
138+
f"vulnerability[{vulnerability_counter}]/analysis/state is not valid: {cyclonedx_analysis.state}"
139+
)
140+
141+
description = vulnerability.get("description", "")
142+
detail = vulnerability.get("detail", "")
143+
if detail:
144+
description += f"\n\n{detail}"
145+
146+
remediation = _build_remediation_text(cyclonedx_analysis.response, vulnerability.get("recommendation", ""))
147+
148+
affects = vulnerability.get("affects", [])
149+
if not affects:
150+
# General statement for the product
151+
_create_vex_statement(
152+
cyclonedx_document,
153+
vulnerability_id,
154+
description,
155+
vex_status,
156+
cyclonedx_analysis.justification,
157+
cyclonedx_analysis.detail,
158+
remediation,
159+
product_purl,
160+
"",
161+
product_purls,
162+
vex_statements,
163+
)
164+
elif not isinstance(affects, list):
165+
raise ValidationError(f"affects[{vulnerability_counter}] is not a list")
166+
else:
167+
_process_affected_components(
168+
cyclonedx_document=cyclonedx_document,
169+
product_purls=product_purls,
170+
vex_statements=vex_statements,
171+
vulnerability_counter=vulnerability_counter,
172+
vulnerability_id=vulnerability_id,
173+
description=description,
174+
vex_status=vex_status,
175+
justification=cyclonedx_analysis.justification,
176+
impact=cyclonedx_analysis.detail,
177+
remediation=remediation,
178+
affects=affects,
179+
components_map=components_map,
180+
product_purl=product_purl,
181+
)
182+
183+
vulnerability_counter += 1
184+
185+
return product_purls, vex_statements
186+
187+
188+
def _build_components_map(data: dict) -> dict[str, dict]:
189+
components_map = {}
190+
191+
# Add root component from metadata
192+
metadata_component = data.get("metadata", {}).get("component")
193+
if metadata_component and metadata_component.get("bom-ref"):
194+
components_map[metadata_component["bom-ref"]] = metadata_component
195+
196+
# Add all components
197+
for component in data.get("components", []):
198+
if component.get("bom-ref"):
199+
components_map[component["bom-ref"]] = component
200+
201+
return components_map
202+
203+
204+
def _parse_analysis(analysis: dict, vulnerability_counter: int) -> CycloneDX_Analysis:
205+
state = analysis.get("state", "")
206+
if not state:
207+
raise ValidationError(f"vulnerability[{vulnerability_counter}]/analysis/state is missing")
208+
209+
justification = analysis.get("justification", "")
210+
if justification:
211+
justification = _map_cyclonedx_justification_to_vex_justification(justification) or ""
212+
response = analysis.get("response", [])
213+
if not isinstance(response, list):
214+
response = []
215+
216+
detail = analysis.get("detail", "")
217+
first_issued = analysis.get("firstIssued", "")
218+
last_updated = analysis.get("lastUpdated", "")
219+
220+
return CycloneDX_Analysis(
221+
state=state,
222+
justification=justification,
223+
response=response,
224+
detail=detail,
225+
first_issued=first_issued,
226+
last_updated=last_updated,
227+
)
228+
229+
230+
def _map_cyclonedx_state_to_vex_status(state: str) -> Optional[str]:
231+
mapping = {
232+
CycloneDX_Analysis_State.CYCLONEDX_STATE_RESOLVED: VEX_Status.VEX_STATUS_FIXED,
233+
CycloneDX_Analysis_State.CYCLONEDX_STATE_RESOLVED_WITH_PEDIGREE: VEX_Status.VEX_STATUS_FIXED,
234+
CycloneDX_Analysis_State.CYCLONEDX_STATE_EXPLOITABLE: VEX_Status.VEX_STATUS_AFFECTED,
235+
CycloneDX_Analysis_State.CYCLONEDX_STATE_IN_TRIAGE: VEX_Status.VEX_STATUS_UNDER_INVESTIGATION,
236+
CycloneDX_Analysis_State.CYCLONEDX_STATE_FALSE_POSITIVE: VEX_Status.VEX_STATUS_NOT_AFFECTED,
237+
CycloneDX_Analysis_State.CYCLONEDX_STATE_NOT_AFFECTED: VEX_Status.VEX_STATUS_NOT_AFFECTED,
238+
}
239+
return mapping.get(state)
240+
241+
242+
def _build_remediation_text(response: Optional[list[str]], recommendation: str) -> str:
243+
remediation_parts = []
244+
245+
if response:
246+
response_text = ", ".join(response)
247+
remediation_parts.append(f"Response: {response_text}")
248+
249+
if recommendation:
250+
remediation_parts.append(f"Recommendation: {recommendation}")
251+
252+
return "; ".join(remediation_parts)
253+
254+
255+
def _map_cyclonedx_justification_to_vex_justification(justification: str) -> Optional[str]:
256+
mapping = {
257+
"code_not_present": VEX_Justification.STATUS_VULNERABLE_CODE_NOT_PRESENT,
258+
"code_not_reachable": VEX_Justification.STATUS_VULNERABLE_CODE_NOT_IN_EXECUTE_PATH,
259+
"requires_configuration": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
260+
"requires_dependency": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
261+
"requires_environment": VEX_Justification.STATUS_VULNERABLE_CODE_CANNOT_BE_CONTROLLED_BY_ADVERSARY,
262+
"protected_by_compiler": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
263+
"protected_at_runtime": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
264+
"protected_at_perimeter": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
265+
"protected_by_mitigating_control": VEX_Justification.STATUS_INLINE_MITIGATIONS_ALREADY_EXIST,
266+
}
267+
return mapping.get(justification)
268+
269+
270+
def _process_affected_components(
271+
*,
272+
cyclonedx_document: VEX_Document,
273+
product_purls: set,
274+
vex_statements: set,
275+
vulnerability_counter: int,
276+
vulnerability_id: str,
277+
description: str,
278+
vex_status: str,
279+
justification: str,
280+
impact: str,
281+
remediation: str,
282+
affects: list,
283+
components_map: dict,
284+
product_purl: str,
285+
) -> None:
286+
affected_counter = 0
287+
for affected in affects:
288+
if not isinstance(affected, dict):
289+
raise ValidationError(f"affects[{vulnerability_counter}][{affected_counter}] is not a dictionary")
290+
291+
ref = affected.get("ref")
292+
if not ref:
293+
raise ValidationError(f"affects[{vulnerability_counter}][{affected_counter}]/ref is missing")
294+
295+
component = components_map.get(ref)
296+
if not component:
297+
raise ValidationError(
298+
f"affects[{vulnerability_counter}][{affected_counter}]/ref '{ref}' not found in components"
299+
)
300+
301+
component_purl = component.get("purl", "")
302+
if not component_purl:
303+
raise ValidationError(
304+
f"affects[{vulnerability_counter}][{affected_counter}]/ref '{ref}' component is missing purl"
305+
)
306+
validate_purl(component_purl)
307+
308+
_create_vex_statement(
309+
cyclonedx_document,
310+
vulnerability_id,
311+
description,
312+
vex_status,
313+
justification,
314+
impact,
315+
remediation,
316+
product_purl,
317+
component_purl,
318+
product_purls,
319+
vex_statements,
320+
)
321+
322+
affected_counter += 1
323+
324+
325+
def _create_vex_statement(
326+
cyclonedx_document: VEX_Document,
327+
vulnerability_id: str,
328+
description: str,
329+
vex_status: str,
330+
justification: str,
331+
impact: str,
332+
remediation: str,
333+
product_purl: str,
334+
component_purl: str,
335+
product_purls: set,
336+
vex_statements: set,
337+
) -> None:
338+
vex_statement = VEX_Statement(
339+
document=cyclonedx_document,
340+
vulnerability_id=vulnerability_id,
341+
description=description,
342+
status=vex_status,
343+
justification=justification,
344+
impact=impact,
345+
remediation=remediation,
346+
product_purl=product_purl,
347+
component_purl=component_purl,
348+
)
349+
vex_statement.save()
350+
vex_statements.add(vex_statement)
351+
product_purls.add(product_purl)

backend/application/vex/services/vex_import.py

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,7 @@
55
from rest_framework.exceptions import ValidationError
66

77
from application.vex.services.csaf_parser import parse_csaf_data
8+
from application.vex.services.cyclonedx_parser import parse_cyclonedx_data
89
from application.vex.services.openvex_parser import parse_openvex_data
910
from application.vex.types import VEX_Document_Type
1011

@@ -22,6 +23,8 @@ def import_vex(vex_file: File) -> None:
2223
parse_openvex_data(data)
2324
elif vex_type == VEX_Document_Type.VEX_DOCUMENT_TYPE_CSAF:
2425
parse_csaf_data(data)
26+
elif vex_type == VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX:
27+
parse_cyclonedx_data(data)
2528

2629

2730
def _get_json_data(vex_file: File) -> Optional[dict]:
@@ -40,4 +43,7 @@ def _get_vex_type(data: dict) -> Optional[str]:
4043
if data.get("document", {}).get("category") == "csaf_vex" and data.get("document", {}).get("csaf_version") == "2.0":
4144
return VEX_Document_Type.VEX_DOCUMENT_TYPE_CSAF
4245

46+
if data.get("bomFormat") == "CycloneDX":
47+
return VEX_Document_Type.VEX_DOCUMENT_TYPE_CYCLONEDX
48+
4349
return None

0 commit comments

Comments
 (0)