Skip to content

bitnami/vulndb

The Bitnami Vulnerability Database

ALPHA: we continue evolving this repository to be adopted by the most popular vulnerability scanners. This repository would have to break changes during this stage.

This repository contains the data and configuration provided by Bitnami to generate its vulnerability database.

Please note that this database is populated with information from the year 2020 onwards.

Table of contents

How the database is created

In the config folder you can find the information about the Bitnami components, especially the vendor and product names to work with their CPE specifications. Based on this information, the data folder is updated periodically with the set of CVEs related to our components.

Available fields in config files

Most of the files under the config/components directory only include their component name, but components are defining other properties like cpeVendor, cpeProduct, or cpeSoftwareEdition. To filter the CVEs related to each component, a sample :cpeVendor:cpeProduct: string is used, where cpeVendor and cpeProduct can be overridden by defining the property in its config file, being name the default value for both properties.

All keys in the CPE string can be defined in the different config files, which will be consumed by the Bitnami processes generating the SPDX information that is available in the final images. Here is the list of the different keys available: cpeVendor, cpeProduct, cpeVersion, cpeUpdate, cpeEdition, cpeLanguage, cpeSoftwareEdition, cpeTargetSoftware, cpeTargetHardware, and cpeOther.

Only name is mandatory in the JSON file, and the rest are optional. As mentioned previously, cpeVendor and cpeProduct defaults to the name key, while the rest of the properties are set to * by default in case it is not specified.

Additionally, a to-be-deprecated: <date> value may be present in those components that will be removed in the short term. For further information on this, please check the deprecation policy section.

Deprecation policy

From time to time, one or more assets may be deprecated. In that situation, we will continue generating the related CVE information for at least one month, or after the expiration date is met. Notice the expiration date is present in the format yyyymmdd (i.e. 20231231 stands for Dec. 31st, 2023). The procedure of deprecation and deletion is done by:

  • Annotate components with the to-be-deprecated: <date> field in their config file setting the date when it will be removed. Add a deprecation notice in this README.md file as well.
  • Delete the config file and the associated data/${name} folder once the retention period has expired.

How to consume this CVE feed

This database includes CVE information only for Bitnami packages installed on top of the operating system for all distributed solutions (containers, Helm charts, OVAs, cloud images, etc.). The procedure to consume this information is shown below:

  • Find the SPDX file in your solution. They are located under the /opt/bitnami/<component> directory and named with the pattern .spdx-<component>.spdx

For instance, in the case of a container:

$ docker run bitnami/postgresql find /opt/bitnami -type f -name ".spdx-*"
/opt/bitnami/postgresql/.spdx-postgresql.spdx

$ docker run bitnami/postgresql cat /opt/bitnami/postgresql/.spdx-postgresql.spdx
{
    "SPDXID": "SPDXRef-postgresql",
    "spdxVersion": "SPDX-2.3",
    ...
  • Get the packages included in the SPDX file under the packages section.

For instance, in the case of a container image:

$ docker run bitnami/postgresql cat /opt/bitnami/postgresql/.spdx-postgresql.spdx
  "...": "...",
  "packages": [
    {
      "SPDXID": "SPDXRef-postgresql",
      "name": "PostgreSQL",
      "versionInfo": "15.3.0",
      "downloadLocation": "https://ftp.postgresql.org/pub/source/v15.3/postgresql-15.3.tar.gz",
      "licenseConcluded": "PostgreSQL",
      "licenseDeclared": "PostgreSQL",
      "filesAnalyzed": false,
      "externalRefs": [
        {
          "referenceCategory": "SECURITY",
          "referenceType": "cpe23Type",
          "referenceLocator": "cpe:2.3:*:postgresql:postgresql:15.3.0:*:*:*:*:*:*:*"
        },
        {
          "referenceCategory": "PACKAGE-MANAGER",
          "referenceType": "purl",
          "referenceLocator": "pkg:bitnami/postgresql@15.3.0"
        }
      ]
    },
    {
      "SPDXID": "SPDXRef-geos",
      "name": "GEOS",
      "versionInfo": "3.8.3",
      "downloadLocation": "https://github.com/libgeos/geos/archive/3.8.3.tar.gz",
      "licenseConcluded": "LGPL-2.1-only",
      "licenseDeclared": "LGPL-2.1-only",
      "filesAnalyzed": false,
      "externalRefs": [
        {
          "referenceCategory": "SECURITY",
          "referenceType": "cpe23Type",
          "referenceLocator": "cpe:2.3:*:libgeos:geos:3.8.3:*:*:*:*:*:*:*"
        },
        {
          "referenceCategory": "PACKAGE-MANAGER",
          "referenceType": "purl",
          "referenceLocator": "pkg:bitnami/geos@3.8.3"
        }
      ]
    },
  "...": "...",
  • Finally, verify the version of your components against the affected versions of the different CVEs located under the data/<name>/ directory (lowercase) to get the number of CVEs that affect it. Notice the CVE files honor the OSV format.

Reporting a vulnerability or feedback

Click here to report a public vulnerability in the Bitnami ecosystem, or give us feedback about the project.

Deprecation notes

2024-06

  • Kafka Exporter

2024-03

  • Abantecart
  • Canvas LMS
  • Canvas RCE API
  • CiviCRM
  • Codeigniter
  • Concrete5
  • Kapacitor
  • Mantis
  • MODX
  • MyBB
  • Neos
  • OpenProject
  • OroCRM
  • Osclass
  • Percona XtraBackup
  • phpList
  • ReportServer
  • ReviewBoard
  • Roundcube
  • SEO Panel
  • Symfony
  • JasperReports
  • JRuby
  • Tinytinyrss
  • ttrss-mailer-smtp
  • Typo3
  • Weblate

2024-01

  • ProcessMaker

2023-11

  • Apache MXNet

2023-09

  • Harbor Notary signer
  • Harbor Notary server

2023-08

  • Bitnami Shell

2023-07

  • Wavefront
  • Wavefront Proxy
  • Wavefront Prometheus Adapter
  • Wavefront HPA Adapter

License

Copyright © 2024 Broadcom. The term "Broadcom" refers to Broadcom Inc. and/or its subsidiaries.

Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License.

You may obtain a copy of the License at

http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.

About

The Bitnami Vulnerability Database

Resources

License

Code of conduct

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages