1
0
Fork 0
mirror of https://github.com/cisagov/log4j-affected-db.git synced 2024-11-17 06:17:55 +00:00
log4j-affected-db/PULL-EXAMPLE.md

91 lines
3.5 KiB
Markdown
Raw Normal View History

Thank you for contributing to CISA's Log4j-affected-db GitHub Repository! Please follow the steps listed below:
2022-01-05 17:16:44 +00:00
2022-01-05 17:39:50 +00:00
**Step 1:** Go to the cisagov data .yml files for choosing the appropriate file to include your updates (example link). The files are separated based on the alphabetical first letter of the vendor name. For example, 'CISA' would be located in .../cisagov_C.yml
2022-01-05 17:16:44 +00:00
2022-01-05 17:39:50 +00:00
**Step 2:** Click the file edit button.
2022-01-05 17:16:44 +00:00
2022-01-05 17:39:50 +00:00
**Step 3:** Add the blank template to the **.yml** file for new entries and fill it out with the correct data. Note: we are tracking multiple CVEs on the backend but are currently only displaying all the CVE-2021-44228. The multiple CVEs will not be listed in the table per the current request, instead the logic will determine and present a single status based on the available data in the template.
2022-01-05 17:16:44 +00:00
Blank template:
2022-01-05 17:39:50 +00:00
```
2022-01-05 17:16:44 +00:00
- vendor: ''
product: ''
cves:
cve-2021-4104:
investigated: ''
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: ''
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: ''
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: ''
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- ''
notes: ''
references:
- ''
reporter: cisagov
last_updated: ''
2022-01-05 17:39:50 +00:00
```
**Step 3:** Verify the new entry was entered before and/or after the prior and next entries.
2022-01-05 17:54:44 +00:00
- If you are adding it to the beginning of the file, ensure you are pasting it after “software:” and before the next entry starting with “- vendor:”.
- If you are adding it to the end of the file, ensure the entry ends before the file is closed out with: “...”
2022-01-05 17:16:44 +00:00
2022-01-05 17:39:50 +00:00
**Step 4:** When you add content to the file, remove the '' or [] for fields which are replaced with values (strings '' or lists [] should be replaced as shown in the example below, with list values on the following line(s), starting with hyphen(s) “-”). The symbols should only remain used when fields remain empty. For example, fixed_versions: [] in our example below remains as is, given there are no patched versions available for this entry.
2022-01-05 17:16:44 +00:00
Note: not all fields have to be updated.
Entry example:
2022-01-05 17:39:50 +00:00
```
- vendor: CISA
2022-01-05 17:54:44 +00:00
product: Product
2022-01-05 17:16:44 +00:00
cves:
cve-2021-4104:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-44228:
investigated: true
affected_versions:
- <=8.4.6
- <=8.5.3
- <=8.6.4
fixed_versions: []
unaffected_versions: []
cve-2021-45046:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
cve-2021-45105:
investigated: false
affected_versions: []
fixed_versions: []
unaffected_versions: []
vendor_links:
- https://forums.extrahop.com/t/extrahop-update-on-log4shell/8148
notes: Contains vulnerable code but not likely to get
unauthenticated user input to the log4j component.
references:
- ''
reporter: cisagov
last_updated: '2021-12-14T00:00:00'
2022-01-05 17:39:50 +00:00
```
2022-01-05 18:24:04 +00:00
**Step 5:** validate your data follows the appropriate format and proceed with submitting the pull request. Follow questions may be submitted through the Pull Request.
2022-01-05 17:16:44 +00:00
For any additional questions feel free to submit a Issue request [here](https://github.com/cisagov/log4j-affected-db/issues)