Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add JSON data format #4

Open
edoardottt opened this issue Nov 29, 2023 · 1 comment · Fixed by #10
Open

Add JSON data format #4

edoardottt opened this issue Nov 29, 2023 · 1 comment · Fixed by #10
Labels
enhancement New feature or request good first issue Good for newcomers help wanted Extra attention is needed

Comments

@edoardottt
Copy link
Owner

Add JSON data format

@edoardottt
Copy link
Owner Author

edoardottt commented Dec 2, 2024

cc @bernard-yip

I've fixed some issues with the JSON data format + input.

However, there are still things that are not working properly and I cannot merge the changes into main.

Invalid JSON:

cat data/all.json | jq .
jq: parse error: Invalid string: control characters from U+0000 through U+001F must be escaped at line 153162, column 1514

Here the corrupted line:

{
  "cve": "CVE-2024-21690",
  "category": " XSS  XSS",
  "url": "https://github.com/trickest/cve/blob/main/2024/CVE-2024-21690.md",
  "description": "This High severity Reflected XSS and CSRF (Cross-Site Request Forgery) vulnerability was introduced in versions 7.19.0, 7.20.0, 8.0.0, 8.1.0, 8.2.0, 8.3.0, 8.4.0, 8.5.0, 8.6.0, 8.7.1, 8.8.0, and 8.9.0 of Confluence Data Center and Server. 		This Reflected XSS and CSRF (Cross-Site Request Forgery) vulnerability, with a CVSS Score of 7.1, allows an unauthenticated attacker to execute arbitrary HTML or JavaScript code on a victims browser and force a end user to execute unwanted actions on a web application in which they're currently authenticated which has high impact to confidentiality, low impact to integrity, no impact to availability, and requires user interaction. 		Atlassian recommends that Confluence Data Center and Server customers upgrade to latest version, if you are unable to do so, upgrade your instance to one of the specified supported fixed versions:				* Confluence Data Center and Server 7.19: Upgrade to a release greater than or equal to 7.19.26				* Confluence Data Center and Server 8.5: Upgrade to a release greater than or equal to 8.5.14				* Confluence Data Center and Server 9.0: Upgrade to a release greater than or equal to 9.0.1						See the release notes (https://confluence.atlassian.com/doc/confluence-release-notes-327.html). You can download the latest version of Confluence Data Center and Server from the download center (https://www.atlassian.com/software/confluence/download-archives). 		This vulnerability was reported via our Bug Bounty program. "
},

Also what about double quotes?

For sure double quotes must be escaped when used in the description of a CVE (using sed, " -> \").

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request good first issue Good for newcomers help wanted Extra attention is needed
Projects
None yet
1 participant