Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

certifi CPE? (Common Platform Enumeration) #338

Open
pcreager23 opened this issue Feb 11, 2025 · 4 comments
Open

certifi CPE? (Common Platform Enumeration) #338

pcreager23 opened this issue Feb 11, 2025 · 4 comments

Comments

@pcreager23
Copy link

pcreager23 commented Feb 11, 2025

@Lukasa , et al,
I'm working with NVD to get them to correct the CPEs for certifi (re: CVE-2024-39689).

Can someone confirm what the correct CPE format is for certifi?
cpe:2.3:a:certifi_project:certifi:*:*:*:*:*:*:*:*
cpe:2.3:a:python-certifi:certifi:*:*:*:*:*:*:*:*
cpe:2.3:a:certifi:certifi:*:*:*:*:*:*:*:*

Thanks

@alex
Copy link
Member

alex commented Feb 11, 2025

I don't know the answer to this (I doubt Cory does either). How are we supposed to know what is correct?

@pcreager23
Copy link
Author

The CPE naming spec is here: https://nvlpubs.nist.gov/nistpubs/Legacy/IR/nistir7695.pdf

The doubt for many FOSS package centers around the 'vendor' field, which identifies the "the person or organization that manufactured or created the product", i.e. the project developer.

The goal is to improve the accuracy of vulnerability scanning tools, such as grype.

@alex
Copy link
Member

alex commented Feb 11, 2025

I suppose if I had to pick, I'd say the vendor is "certifi", since that's the name of the github org.

But really, CPEs don't seem super useful.

@pcreager23
Copy link
Author

pcreager23 commented Feb 11, 2025

I'd say the vendor is "certifi", since that's the name of the github org.

Thanks, I will pass that along.

The doubt was:
certifi / python-certifi - it indicates the Python version of certifi, but "python-" is not part of the actual package name.

But really, CPEs don't seem super useful.

Indeed. Unfortunately, some scanners default to CPE matching, and the CPE string identified by NVD is ingested as part of the vulnerability feed, so getting it right will prevent false positive detections.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants