cve-vulnerability-analysis
Compare original and translation side by side
🇺🇸
Original
English🇨🇳
Translation
ChineseCVE漏洞分析技能
CVE Vulnerability Analysis Skill
概述
Overview
本技能用于分析Java和JavaScript组件的CVE(通用漏洞披露)漏洞,提供误报判断、兼容性风险评估和升级建议。技能遵循系统化工作流程,确保分析的一致性和准确性。
This skill is used to analyze CVE (Common Vulnerabilities and Exposures) vulnerabilities in Java and JavaScript components, providing false positive determination, compatibility risk assessment, and upgrade recommendations. The skill follows a systematic workflow to ensure consistency and accuracy of analysis.
工作流程
Workflow
执行CVE漏洞分析时,遵循以下步骤:
-
获取CVE详情
- 从NVD(国家漏洞数据库)API获取漏洞详细信息
- 提取漏洞描述、CVSS评分、影响范围等关键信息
-
误报分析
- 检查GitHub issues仓库中的误报报告:
- 比较CVE描述中提到的仓库地址与受影响对象的仓库地址
- 检查受影响对象仓库中的issues、公告和声明
-
误报判断标准
- 如果满足以下任一条件,判断为误报:
- GitHub issues中提到了CVE误报,且issues中的对象与提供的对象相匹配
- CVE漏洞描述中提到的仓库地址与被疑似误报的仓库地址不是同一个
- 被疑似误报对象的仓库中的issues、公告、声明中明确表示这不是一个误报
- 如果不满足以上条件,判断为真实漏洞
- 如果满足以下任一条件,判断为误报:
-
升级可行性分析
- 查找可用的安全更新版本
- 分析版本升级的兼容性风险
- 提供具体的升级建议
-
生成标准报告
- 按照预设模板生成详细分析报告
- 包含证据链接和具体建议
When performing CVE vulnerability analysis, follow these steps:
-
Obtain CVE Details
- Retrieve vulnerability details from the NVD (National Vulnerability Database) API
- Extract key information such as vulnerability description, CVSS score, and impact scope
-
False Positive Analysis
- Check false positive reports in GitHub issues repositories:
- Compare the repository URL mentioned in the CVE description with that of the affected object
- Check issues, announcements, and statements in the affected object's repository
-
False Positive Determination Criteria
- Judge as false positive if any of the following conditions are met:
- The CVE false positive is mentioned in GitHub issues, and the object in the issues matches the provided object
- The repository URL mentioned in the CVE vulnerability description is not the same as that of the suspected false positive object
- The issues, announcements, and statements in the repository of the suspected false positive object clearly state that this is not a false positive
- Judge as a real vulnerability if none of the above conditions are met
- Judge as false positive if any of the following conditions are met:
-
Upgrade Feasibility Analysis
- Find available security update versions
- Analyze compatibility risks of version upgrades
- Provide specific upgrade recommendations
-
Generate Standard Report
- Generate a detailed analysis report according to the preset template
- Include evidence links and specific recommendations
误报分析详细指南
Detailed Guide for False Positive Analysis
GitHub Issues搜索
GitHub Issues Search
- 使用GitHub API或web搜索查找相关issues
- 搜索关键词:CVE编号 + "false positive" + 受影响对象名称
- 检查issue状态:open/closed、评论内容、解决方案
- Use GitHub API or web search to find relevant issues
- Search keywords: CVE number + "false positive" + affected object name
- Check issue status: open/closed, comment content, solutions
仓库地址比对
Repository URL Comparison
- 从CVE描述中提取提到的仓库URL
- 获取受影响对象的实际仓库URL(从pom.xml、package.json等)
- 比较两个URL是否指向同一仓库
- Extract the repository URL mentioned in the CVE description
- Obtain the actual repository URL of the affected object (from pom.xml, package.json, etc.)
- Compare whether the two URLs point to the same repository
官方声明核实
Official Statement Verification
- 检查受影响对象仓库的Security Advisories
- 查看RELEASES.md、CHANGELOG.md等文件
- 搜索仓库中的安全公告和漏洞声明
- Check Security Advisories in the affected object's repository
- View files such as RELEASES.md, CHANGELOG.md
- Search for security announcements and vulnerability statements in the repository
兼容性风险评估规则
Compatibility Risk Assessment Rules
评估版本升级的兼容性风险:
| 版本变更类型 | 风险等级 | 说明 |
|---|---|---|
| 大版本变更 | 高风险 | 如9.3.2变更为11.3.8,可能涉及重大API变更和架构调整 |
| 中间版本变更 | 中风险 | 如5.3.39变更为5.4.0,存在值得注意的兼容性问题 |
| 小版本变更 | 低风险 | 如5.3.39变更为5.3.40,通常只包含bug修复和安全更新 |
Assess the compatibility risk of version upgrades:
| Version Change Type | Risk Level | Description |
|---|---|---|
| Major version change | High risk | e.g., from 9.3.2 to 11.3.8, may involve major API changes and architecture adjustments |
| Intermediate version change | Medium risk | e.g., from 5.3.39 to 5.4.0, there are notable compatibility issues |
| Patch version change | Low risk | e.g., from 5.3.39 to 5.3.40, usually only includes bug fixes and security updates |
风险评估指导
Risk Assessment Guidelines
- 高风险:建议进行全面的测试,检查API变更、配置变更和依赖关系
- 中风险:建议检查主要功能,关注变更日志中的破坏性变更
- 低风险:可以直接升级,但仍建议进行基本功能测试
- High risk: It is recommended to conduct comprehensive testing, check API changes, configuration changes, and dependencies
- Medium risk: It is recommended to check main functions and focus on breaking changes in the changelog
- Low risk: Can be upgraded directly, but basic functional testing is still recommended
输出格式模板
Output Format Template
始终使用以下标准报告格式:
undefinedAlways use the following standard report format:
undefinedCVE漏洞分析报告
CVE Vulnerability Analysis Report
执行摘要
Executive Summary
[概述:是否误报、风险等级、关键发现]
[Overview: whether it is a false positive, risk level, key findings]
漏洞详情
Vulnerability Details
- CVE编号:[CVE编号]
- 漏洞描述:[简要描述]
- CVSS评分:[评分及严重等级]
- 受影响对象:[提供的对象名称和版本]
- 影响范围:[受影响版本范围]
- CVE ID: [CVE number]
- Vulnerability Description: [Brief description]
- CVSS Score: [Score and severity level]
- Affected Object: [Provided object name and version]
- Impact Scope: [Affected version range]
误报分析
False Positive Analysis
GitHub Issues检查
GitHub Issues Check
- [是否找到相关issues]
- [issues内容摘要]
- [链接]
- [Whether relevant issues are found]
- [Summary of issue content]
- [Link]
仓库地址比对
Repository URL Comparison
- CVE描述中提到的仓库:[URL]
- 受影响对象的实际仓库:[URL]
- 比对结果:[是否一致]
- Repository mentioned in CVE description: [URL]
- Actual repository of affected object: [URL]
- Comparison Result: [Whether consistent]
官方声明核实
Official Statement Verification
- [是否找到相关公告]
- [公告内容摘要]
- [链接]
- [Whether relevant announcements are found]
- [Summary of announcement content]
- [Link]
误报判断
False Positive Determination
- 结论:[是误报/不是误报]
- 判断依据:[详细说明]
- Conclusion: [Is false positive / Not false positive]
- Basis for Judgment: [Detailed explanation]
升级建议
Upgrade Recommendations
可用安全版本
Available Security Versions
- [推荐升级到的版本]
- [其他可选版本]
- [Recommended version to upgrade to]
- [Other optional versions]
兼容性风险评估
Compatibility Risk Assessment
- 当前版本:[版本号]
- 目标版本:[版本号]
- 版本变更类型:[大/中/小版本变更]
- 风险等级:[高/中/低]
- 风险评估说明:[详细说明]
- Current Version: [Version number]
- Target Version: [Version number]
- Version Change Type: [Major/Intermediate/Patch version change]
- Risk Level: [High/Medium/Low]
- Risk Assessment Explanation: [Detailed explanation]
具体升级建议
Specific Upgrade Recommendations
- [具体的升级步骤]
- [需要注意的事项]
- [测试建议]
- [Specific upgrade steps]
- [Notes to pay attention to]
- [Testing recommendations]
参考链接
Reference Links
- [相关GitHub issues链接]
- [安全公告链接]
- [官方文档链接]
- [其他相关资源]
undefined- [Relevant GitHub issues links]
- [Security announcement links]
- [Official documentation links]
- [Other relevant resources]
undefined资源使用
Resource Usage
scripts/ 目录
scripts/ Directory
包含可执行脚本,用于自动化分析任务:
- - 从NVD API获取CVE详情
fetch_cve_details.py - - 搜索GitHub issues
check_github_issues.py - - 分析版本兼容性
analyze_version_compatibility.py - - 生成标准报告
generate_report.py
Contains executable scripts for automated analysis tasks:
- - Retrieve CVE details from NVD API
fetch_cve_details.py - - Search GitHub issues
check_github_issues.py - - Analyze version compatibility
analyze_version_compatibility.py - - Generate standard reports
generate_report.py
references/ 目录
references/ Directory
包含详细参考文档:
- - 完整工作流程详解
cve_analysis_workflow.md - - 误报判断标准详细说明
false_positive_criteria.md - - 兼容性风险评估指南
compatibility_risk_assessment.md
Contains detailed reference documents:
- - Detailed explanation of the complete workflow
cve_analysis_workflow.md - - Detailed explanation of false positive determination criteria
false_positive_criteria.md - - Guide for compatibility risk assessment
compatibility_risk_assessment.md
assets/ 目录
assets/ Directory
包含报告模板和其他资源文件
Contains report templates and other resource files
注意事项
Notes
- 数据来源验证:始终验证从外部API获取的数据的准确性
- 版本识别:准确识别受影响对象的版本号,避免误判
- 风险沟通:明确传达兼容性风险,提供缓解建议
- 链接时效性:提供的参考链接应确保可访问和最新
- 安全边界:仅分析公开信息,不尝试主动探测漏洞
- Data Source Verification: Always verify the accuracy of data obtained from external APIs
- Version Identification: Accurately identify the version number of the affected object to avoid misjudgment
- Risk Communication: Clearly communicate compatibility risks and provide mitigation recommendations
- Link Timeliness: Ensure that the provided reference links are accessible and up-to-date
- Security Boundaries: Only analyze public information, do not attempt to actively probe vulnerabilities
工具使用建议
Tool Usage Recommendations
- 使用WebFetch工具获取NVD API响应
- 使用Bash工具执行脚本和命令行操作
- 使用GitHub API时注意速率限制
- 优先使用官方文档和公告作为信息源
- Use WebFetch tool to obtain NVD API responses
- Use Bash tool to execute scripts and command-line operations
- Pay attention to rate limits when using GitHub API
- Prioritize official documentation and announcements as information sources