2022-01-10 18:11:44 +00:00
|
|
|
# Pull Request Example #
|
2022-01-05 20:02:50 +00:00
|
|
|
|
2022-01-10 17:42:13 +00:00
|
|
|
Thank you for contributing to CISA's Log4j-affected-db GitHub Repository! Please
|
2022-01-10 18:10:45 +00:00
|
|
|
follow the steps listed below in order to add a product to the public
|
|
|
|
repository. **Note:** To assure the accuracy of data please only include
|
|
|
|
products that have official advisories or alerts that verify the product's
|
|
|
|
vulnerability status to [CVE-2021-4104](https://nvd.nist.gov/vuln/detail/cve-2021-4104),
|
|
|
|
[CVE-2021-44228](https://nvd.nist.gov/vuln/detail/CVE-2021-44228),
|
|
|
|
[CVE-2021-45046](https://nvd.nist.gov/vuln/detail/CVE-2021-45046),
|
2022-01-10 18:02:34 +00:00
|
|
|
and/or [CVE-2021-45105](https://nvd.nist.gov/vuln/detail/CVE-2021-45105?s=09).
|
2022-01-05 17:16:44 +00:00
|
|
|
|
2022-01-10 19:00:26 +00:00
|
|
|
**Step 1:** Go to the [cisagov data .yml files](https://github.com/cisagov/log4j-affected-db/tree/develop/data/)
|
2022-01-10 19:03:12 +00:00
|
|
|
and choose the appropriate file to include your updates.
|
2022-01-10 19:00:26 +00:00
|
|
|
The files are separated alphabetically based on the first letter of the
|
2022-01-10 19:03:12 +00:00
|
|
|
vendor name. For example, 'CISA' would be located in
|
2022-01-10 19:00:26 +00:00
|
|
|
[`cisagov_C.yml`](https://github.com/cisagov/log4j-affected-db/blob/develop/data/cisagov_C.yml).
|
2022-01-05 17:16:44 +00:00
|
|
|
|
2022-01-05 17:39:50 +00:00
|
|
|
**Step 2:** Click the file edit button.
|
2022-01-05 17:16:44 +00:00
|
|
|
|
2022-01-10 17:42:13 +00:00
|
|
|
**Step 3:** Add the blank template to the **.yml** file for new entries and fill
|
2022-01-10 18:10:45 +00:00
|
|
|
it out with the correct data.
|
2022-01-05 17:16:44 +00:00
|
|
|
|
|
|
|
Blank template:
|
2022-01-10 17:42:13 +00:00
|
|
|
|
2022-01-10 17:55:58 +00:00
|
|
|
```yml
|
2022-01-10 20:43:15 +00:00
|
|
|
- vendor: ''
|
|
|
|
product: ''
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- ''
|
|
|
|
notes: ''
|
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: ''
|
2022-01-05 17:39:50 +00:00
|
|
|
```
|
2022-01-05 17:54:44 +00:00
|
|
|
|
2022-01-10 18:10:45 +00:00
|
|
|
**Step 4:** Verify the new entry was entered before and/or after the prior and
|
2022-01-10 17:42:13 +00:00
|
|
|
next entries.
|
2022-01-10 18:07:38 +00:00
|
|
|
|
2022-01-10 18:10:45 +00:00
|
|
|
- If you are adding it to the beginning of the file, ensure you are pasting
|
2022-01-10 18:02:34 +00:00
|
|
|
it after `software:` and before the next entry starting with `- vendor:`.
|
2022-01-10 18:10:45 +00:00
|
|
|
- If you are adding it to the end of the file, ensure the entry ends before
|
2022-01-10 18:02:34 +00:00
|
|
|
the file is closed out with `...`.
|
2022-01-10 17:42:13 +00:00
|
|
|
|
2022-01-10 18:02:34 +00:00
|
|
|
**Step 5:** When you add content to the file, remove the `''` or `[]` for fields
|
2022-01-10 17:42:13 +00:00
|
|
|
which are replaced with values (strings `''` or lists `[]` should be replaced as
|
2022-01-10 18:10:45 +00:00
|
|
|
shown in the example below, with list values on the following line(s) starting
|
|
|
|
with hyphen(s) `-`). The symbols should only remain used when fields remain
|
|
|
|
empty. For example, `fixed_versions: []` in our example below remains as is,
|
2022-01-10 17:42:13 +00:00
|
|
|
given there are no patched versions available for this entry.
|
2022-01-05 17:16:44 +00:00
|
|
|
|
2022-01-05 20:02:50 +00:00
|
|
|
**Note:** not all fields have to be updated.
|
2022-01-05 17:16:44 +00:00
|
|
|
|
|
|
|
Entry example:
|
2022-01-10 17:42:13 +00:00
|
|
|
|
2022-01-10 17:55:58 +00:00
|
|
|
```yml
|
2022-01-10 20:43:15 +00:00
|
|
|
- vendor: Example Vendor
|
|
|
|
product: Example Product
|
|
|
|
cves:
|
|
|
|
cve-2021-4104:
|
|
|
|
investigated: false
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-44228:
|
|
|
|
investigated: true
|
|
|
|
affected_versions:
|
2022-01-11 14:44:47 +00:00
|
|
|
- <=8.4.6
|
|
|
|
- <=8.5.3
|
|
|
|
- <=8.6.4
|
2022-01-10 20:43:15 +00:00
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45046:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
cve-2021-45105:
|
|
|
|
investigated: ''
|
|
|
|
affected_versions: []
|
|
|
|
fixed_versions: []
|
|
|
|
unaffected_versions: []
|
|
|
|
vendor_links:
|
|
|
|
- https://www.example.org/
|
2022-01-10 20:45:14 +00:00
|
|
|
notes: Contains vulnerable code but not likely to get
|
2022-01-11 19:17:29 +00:00
|
|
|
unauthenticated user input to the log4j component.
|
2022-01-10 20:43:15 +00:00
|
|
|
references:
|
|
|
|
- ''
|
|
|
|
last_updated: '2021-12-14T00:00:00'
|
2022-01-05 17:39:50 +00:00
|
|
|
```
|
2022-01-10 17:42:13 +00:00
|
|
|
|
2022-01-10 18:10:45 +00:00
|
|
|
**Step 6:** Validate that your data follows the appropriate format and proceed
|
|
|
|
with submitting the pull request.
|
2022-01-05 17:16:44 +00:00
|
|
|
|
2022-01-11 19:17:44 +00:00
|
|
|
For any additional questions feel free to [submit an Issue](https://github.com/cisagov/log4j-affected-db/issues).
|