diff --git a/cve-vulner-manager/cve-ddd/infrastructure/latestrpmimpl/impl.go b/cve-vulner-manager/cve-ddd/infrastructure/latestrpmimpl/impl.go index 21b8fdca89f7e948dd1057dd03bf99403ef13070..9df44c99cd6cc2483e05ca25316d4602d8ee89b5 100644 --- a/cve-vulner-manager/cve-ddd/infrastructure/latestrpmimpl/impl.go +++ b/cve-vulner-manager/cve-ddd/infrastructure/latestrpmimpl/impl.go @@ -73,6 +73,7 @@ func (l *latestRpm) parseFile(content []byte) map[string]time.Time { buff := bytes.NewBuffer(content) r := csv.NewReader(buff) + const lineLength = 3 componentAndTime := make(map[string]time.Time) for { line, err1 := r.Read() @@ -80,7 +81,7 @@ func (l *latestRpm) parseFile(content []byte) map[string]time.Time { break } - if err1 != nil { + if err1 != nil || len(line) < lineLength { continue } diff --git a/cve-vulner-manager/routers/middleware.go b/cve-vulner-manager/routers/middleware.go index 41d5d0bc7386c5f67048427f0a240c50b5b7af4c..43c043a13b8bf61d81a8039130cccd927e6cb4de 100644 --- a/cve-vulner-manager/routers/middleware.go +++ b/cve-vulner-manager/routers/middleware.go @@ -20,6 +20,15 @@ func initMiddleware() { func addHeader(ctx *context.Context) { ctx.ResponseWriter.Header().Add("Strict-Transport-Security", "max-age=31536000; includeSubDomains") + ctx.ResponseWriter.Header().Add("X-XSS-Protection", "1; mode=block") + ctx.ResponseWriter.Header().Add("X-Frame-Options", "DENY") + ctx.ResponseWriter.Header().Add("X-Content-Type-Options", "nosniff") + ctx.ResponseWriter.Header().Add("Strict-Transport-Security", "max-age=31536000; includeSubDomains") + ctx.ResponseWriter.Header().Add("Content-Security-Policy", "script-src 'self'; object-src 'none'; frame-src 'none'") + ctx.ResponseWriter.Header().Add("Cache-Control", "no-cache,no-store,must-revalidate") + ctx.ResponseWriter.Header().Add("Pragma", "no-cache") + ctx.ResponseWriter.Header().Add("Expires", "0") + } func checkReferer(ctx *context.Context) { diff --git a/cve-vulner-manager/taskhandler/check.go b/cve-vulner-manager/taskhandler/check.go index 5900f1c463c1f7f56aef7a17e7f16494f790a631..2a1c9ee70b597942139ae597b840a99ad7cfee21 100644 --- a/cve-vulner-manager/taskhandler/check.go +++ b/cve-vulner-manager/taskhandler/check.go @@ -65,7 +65,7 @@ func CheckIssueAnalysisComplete(i *models.IssueTemplate, organizationID int8) (m return } - if i.OpenEulerScore == 0.0 && i.OpenEulerVector != util.VectorNone { + if i.OpenEulerScore == 0.0 { msg = "2.openEulerScore=> 没有填写或正确填写(0-10)" return } @@ -349,7 +349,7 @@ func CheckIssueClosedAnalysisComplete(i *models.IssueTemplate) (msg, tbStr strin tbContent[7] = "3.openEulerVector" tbContent[8] = util.TrimStringNR(i.OpenEulerVector) } else { - if i.OpenEulerScore == 0.0 && i.OpenEulerVector != util.VectorNone { + if i.OpenEulerScore == 0.0 { tbContent[3] = "待分析" tbContent[4] = "2.openEulerScore" tbContent[5] = fmt.Sprintf("2.openEulerScore=> 没有填写或正确填写(0-10)") diff --git a/cve-vulner-manager/util/calculator.go b/cve-vulner-manager/util/calculator.go index 60562ebf3884342dc62a0597cf13feef68dcb36b..d06472992a5a2aaadd9f7e6468d183b333784bb2 100644 --- a/cve-vulner-manager/util/calculator.go +++ b/cve-vulner-manager/util/calculator.go @@ -29,7 +29,7 @@ const ( // Calculate CVSS v3 basescore based on vector func CalculateCVSSV3BaseScore(vector string) float64 { - if vector == VectorNone { + if vector == "" { return 0 } diff --git a/cve-vulner-manager/util/parsepayload.go b/cve-vulner-manager/util/parsepayload.go index 68cf7d2c5a8b377ac3ea22f784752b937ac2be03..5229e477ec07e3925adcf969e5e9952432e751db 100644 --- a/cve-vulner-manager/util/parsepayload.go +++ b/cve-vulner-manager/util/parsepayload.go @@ -625,11 +625,6 @@ func ExtractCommentOpenEulerScore(str string) (score, vector string) { if vector == "" { vector = ExtractVector(str, CvsScoreV2) } - - if vector == "" { - vector = VectorNone - } - return }