Skip to content

Create a best practices of the CVE JSON usage #241

@sei-vsarvepalli

Description

@sei-vsarvepalli

There are potential valid CVE JSON record are valid as far as CVE5JSON schema goes, but have information that is not very meaningful. This may be due to the lack of examples in this repository or due to lack of additional guidance. The proposal is to update the version.md file and add a new best-practices.md to capture some guidelines to help CNA's have sufficient guidance to provide quality data for the CVE Program.

Two examples from the CVE-2023-30906 that illustrate the affected versions being misunderstood

  1. CVE-2023-30906 has affected/0/defaultStatus as unaffected and the affected/0/versions/0/status is also unaffected - this suggest no product is affected in the CVE record.
  2. CVE-2023-30906 has affected/0/versions/0/version shows v2.87 or later which likely actually means versions below 2.87 are affected should be in JSON like
    "versions": [{ "status": "affected", "version": "0", "lessThan": "2.87" }

Related issue from #215 - versions affected.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions