-
Notifications
You must be signed in to change notification settings - Fork 8.5k
Search for CVE id in all search params instead of only name #221099
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Search for CVE id in all search params instead of only name #221099
Conversation
|
@maxcold LGTM |
|
Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security) |
💛 Build succeeded, but was flaky
Failed CI Steps
Metrics [docs]Async chunks
History
|
|
Starting backport for target branches: 8.19 |
💔 All backports failedManual backportTo create the backport manually run: Questions ?Please refer to the Backport tool documentation |
💚 All backports created successfully
Note: Successful backport PRs will be merged automatically after passing CI. Questions ?Please refer to the Backport tool documentation |
|
Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync. |
…221099) (#221602) # Backport This will backport the following commits from `main` to `8.19`: - [Search for CVE id in all search params instead of only name (#221099)](#221099) <!--- Backport version: 10.0.0 --> ### Questions ? Please refer to the [Backport tool documentation](https://github.com/sorenlouv/backport) <!--BACKPORT [{"author":{"name":"Maxim Kholod","email":"maxim.kholod@elastic.co"},"sourceCommit":{"committedDate":"2025-05-26T12:51:50Z","message":"Search for CVE id in all search params instead of only name (#221099)\n\n## Summary\n\nWhile reviewing Tenable mapping for CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE link\nis not rendered for the following case\n\n```\nvulnerability.reference: [\n 'http://www.nessus.org/u?5b3cb0db',\n 'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n 'https://www.openssl.org/news/secadv/20220621.txt',\n ];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility looking only into `name` search param. Fixing\nthat by iterating over all params\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n\n---------\n\nCo-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Cloud Security","backport:version","v9.1.0","v8.19.0"],"title":"Search for CVE id in all search params instead of only name","number":221099,"url":"https://github.com/elastic/kibana/pull/221099","mergeCommit":{"message":"Search for CVE id in all search params instead of only name (#221099)\n\n## Summary\n\nWhile reviewing Tenable mapping for CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE link\nis not rendered for the following case\n\n```\nvulnerability.reference: [\n 'http://www.nessus.org/u?5b3cb0db',\n 'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n 'https://www.openssl.org/news/secadv/20220621.txt',\n ];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility looking only into `name` search param. Fixing\nthat by iterating over all params\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n\n---------\n\nCo-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f"}},"sourceBranch":"main","suggestedTargetBranches":["8.19"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/221099","number":221099,"mergeCommit":{"message":"Search for CVE id in all search params instead of only name (#221099)\n\n## Summary\n\nWhile reviewing Tenable mapping for CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE link\nis not rendered for the following case\n\n```\nvulnerability.reference: [\n 'http://www.nessus.org/u?5b3cb0db',\n 'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n 'https://www.openssl.org/news/secadv/20220621.txt',\n ];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility looking only into `name` search param. Fixing\nthat by iterating over all params\n\n### Checklist\n\nCheck the PR satisfies following conditions. \n\nReviewers should verify this PR satisfies this list as well.\n\n- [x] [Unit or functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere updated or added to match the most common scenarios\n\n---------\n\nCo-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}] BACKPORT--> Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
…221099) ## Summary While reviewing Tenable mapping for CDR elastic/integrations#13636 noticed that CVE link is not rendered for the following case ``` vulnerability.reference: [ 'http://www.nessus.org/u?5b3cb0db', 'https://www.cve.org/CVERecord?id=CVE-2022-2068', 'https://www.openssl.org/news/secadv/20220621.txt', ]; vulnerability.id: ['CVE-2022-2068'] ``` due to the find utility looking only into `name` search param. Fixing that by iterating over all params ### Checklist Check the PR satisfies following conditions. Reviewers should verify this PR satisfies this list as well. - [x] [Unit or functional tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html) were updated or added to match the most common scenarios --------- Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Summary
While reviewing Tenable mapping for CDR elastic/integrations#13636 noticed that CVE link is not rendered for the following case
due to the find utility looking only into
namesearch param. Fixing that by iterating over all paramsChecklist
Check the PR satisfies following conditions.
Reviewers should verify this PR satisfies this list as well.