-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positive for CVE-2019-3826 #840
Comments
Hi @anuragagarwal561994, thanks for reporting this! I've confirmed that
Now I'll get some details about the issue. Here's some info from the match details: CVE-2019-3826 from https://nvd.nist.gov/vuln/detail/CVE-2019-3826 It looks to me like CVE-2019-3826 is a cross-site scripting vulnerability in the Prometheus front-end, which seems like it can't possibly affect a jar. I think the CPEs being generated, which include |
Thanks for looking into this @willmurphyscode The vulnerability was present in the prometheus server I believe, while this is more related to the client jar. |
Hello, after upgrading to the latest Grype I can confirm that this false positive is no longer reported. Please see https://anchore.com/blog/say-goodbye-to-false-positives/ for more details. |
Thanks for update |
What happened:
Grype results in false positive for CVE-2019-3826
What you expected to happen:
No false positive for CVE-2019-3826
How to reproduce it (as minimally and precisely as possible):
Anything else we need to know?:
Environment:
grype version
: 0.43.0cat /etc/os-release
or similar): Mac M1The text was updated successfully, but these errors were encountered: