Skip to content

Conversation

@maxcold
Copy link
Contributor

@maxcold maxcold commented May 21, 2025

Summary

While reviewing Tenable mapping for CDR elastic/integrations#13636 noticed that CVE link is not rendered for the following case

vulnerability.reference: [
      'http://www.nessus.org/u?5b3cb0db',
      'https://www.cve.org/CVERecord?id=CVE-2022-2068',
      'https://www.openssl.org/news/secadv/20220621.txt',
    ];
vulnerability.id: ['CVE-2022-2068']

due to the find utility looking only into name search param. Fixing that by iterating over all params

Checklist

Check the PR satisfies following conditions.

Reviewers should verify this PR satisfies this list as well.

@maxcold maxcold requested a review from alexreal1314 May 21, 2025 10:20
@maxcold maxcold added release_note:enhancement Team:Cloud Security Cloud Security team related backport:version Backport to applied version labels v8.19.0 labels May 21, 2025
@alexreal1314
Copy link
Contributor

@maxcold LGTM

@maxcold maxcold marked this pull request as ready for review May 22, 2025 08:27
@maxcold maxcold requested a review from a team as a code owner May 22, 2025 08:27
@elasticmachine
Copy link
Contributor

Pinging @elastic/kibana-cloud-security-posture (Team:Cloud Security)

@elasticmachine
Copy link
Contributor

💛 Build succeeded, but was flaky

Failed CI Steps

Metrics [docs]

Async chunks

Total size of all lazy-loaded chunks that will be downloaded as the user navigates the app

id before after diff
cloudSecurityPosture 540.6KB 540.7KB +76.0B
securitySolution 9.2MB 9.2MB +76.0B
total +152.0B

History

@maxcold maxcold merged commit 684c877 into main May 26, 2025
8 checks passed
@maxcold maxcold deleted the csp-improve-findReferenceLink-to-check-all-params branch May 26, 2025 12:51
@kibanamachine
Copy link
Contributor

Starting backport for target branches: 8.19

https://github.com/elastic/kibana/actions/runs/15254440029

@maxcold
Copy link
Contributor Author

maxcold commented May 27, 2025

💚 All backports created successfully

Status Branch Result
8.19

Note: Successful backport PRs will be merged automatically after passing CI.

Questions ?

Please refer to the Backport tool documentation

@kibanamachine kibanamachine added the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 27, 2025
@kibanamachine
Copy link
Contributor

Looks like this PR has a backport PR but it still hasn't been merged. Please merge it ASAP to keep the branches relatively in sync.
cc: @maxcold

maxcold added a commit that referenced this pull request May 27, 2025
…221099) (#221602)

# Backport

This will backport the following commits from `main` to `8.19`:
- [Search for CVE id in all search params instead of only name
(#221099)](#221099)

<!--- Backport version: 10.0.0 -->

### Questions ?
Please refer to the [Backport tool
documentation](https://github.com/sorenlouv/backport)

<!--BACKPORT [{"author":{"name":"Maxim
Kholod","email":"maxim.kholod@elastic.co"},"sourceCommit":{"committedDate":"2025-05-26T12:51:50Z","message":"Search
for CVE id in all search params instead of only name (#221099)\n\n##
Summary\n\nWhile reviewing Tenable mapping for
CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE
link\nis not rendered for the following
case\n\n```\nvulnerability.reference: [\n
'http://www.nessus.org/u?5b3cb0db',\n
'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n
'https://www.openssl.org/news/secadv/20220621.txt',\n
];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility
looking only into `name` search param. Fixing\nthat by iterating over
all params\n\n### Checklist\n\nCheck the PR satisfies following
conditions. \n\nReviewers should verify this PR satisfies this list as
well.\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common
scenarios\n\n---------\n\nCo-authored-by: kibanamachine
<42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f","branchLabelMapping":{"^v9.1.0$":"main","^v(\\d+).(\\d+).\\d+$":"$1.$2"}},"sourcePullRequest":{"labels":["release_note:enhancement","Team:Cloud
Security","backport:version","v9.1.0","v8.19.0"],"title":"Search for CVE
id in all search params instead of only
name","number":221099,"url":"https://github.com/elastic/kibana/pull/221099","mergeCommit":{"message":"Search
for CVE id in all search params instead of only name (#221099)\n\n##
Summary\n\nWhile reviewing Tenable mapping for
CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE
link\nis not rendered for the following
case\n\n```\nvulnerability.reference: [\n
'http://www.nessus.org/u?5b3cb0db',\n
'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n
'https://www.openssl.org/news/secadv/20220621.txt',\n
];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility
looking only into `name` search param. Fixing\nthat by iterating over
all params\n\n### Checklist\n\nCheck the PR satisfies following
conditions. \n\nReviewers should verify this PR satisfies this list as
well.\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common
scenarios\n\n---------\n\nCo-authored-by: kibanamachine
<42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f"}},"sourceBranch":"main","suggestedTargetBranches":["8.19"],"targetPullRequestStates":[{"branch":"main","label":"v9.1.0","branchLabelMappingKey":"^v9.1.0$","isSourceBranch":true,"state":"MERGED","url":"https://github.com/elastic/kibana/pull/221099","number":221099,"mergeCommit":{"message":"Search
for CVE id in all search params instead of only name (#221099)\n\n##
Summary\n\nWhile reviewing Tenable mapping for
CDR\nhttps://github.com/elastic/integrations/pull/13636 noticed that CVE
link\nis not rendered for the following
case\n\n```\nvulnerability.reference: [\n
'http://www.nessus.org/u?5b3cb0db',\n
'https://www.cve.org/CVERecord?id=CVE-2022-2068',\n
'https://www.openssl.org/news/secadv/20220621.txt',\n
];\nvulnerability.id: ['CVE-2022-2068']\n```\n\ndue to the find utility
looking only into `name` search param. Fixing\nthat by iterating over
all params\n\n### Checklist\n\nCheck the PR satisfies following
conditions. \n\nReviewers should verify this PR satisfies this list as
well.\n\n- [x] [Unit or
functional\ntests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)\nwere
updated or added to match the most common
scenarios\n\n---------\n\nCo-authored-by: kibanamachine
<42973632+kibanamachine@users.noreply.github.com>","sha":"684c87750c0c4039724434d2dfe35d3b7a567a6f"}},{"branch":"8.19","label":"v8.19.0","branchLabelMappingKey":"^v(\\d+).(\\d+).\\d+$","isSourceBranch":false,"state":"NOT_CREATED"}]}]
BACKPORT-->

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
@kibanamachine kibanamachine removed the backport missing Added to PRs automatically when the are determined to be missing a backport. label May 27, 2025
akowalska622 pushed a commit to akowalska622/kibana that referenced this pull request May 29, 2025
…221099)

## Summary

While reviewing Tenable mapping for CDR
elastic/integrations#13636 noticed that CVE link
is not rendered for the following case

```
vulnerability.reference: [
      'http://www.nessus.org/u?5b3cb0db',
      'https://www.cve.org/CVERecord?id=CVE-2022-2068',
      'https://www.openssl.org/news/secadv/20220621.txt',
    ];
vulnerability.id: ['CVE-2022-2068']
```

due to the find utility looking only into `name` search param. Fixing
that by iterating over all params

### Checklist

Check the PR satisfies following conditions. 

Reviewers should verify this PR satisfies this list as well.

- [x] [Unit or functional
tests](https://www.elastic.co/guide/en/kibana/master/development-tests.html)
were updated or added to match the most common scenarios

---------

Co-authored-by: kibanamachine <42973632+kibanamachine@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

backport:version Backport to applied version labels release_note:enhancement Team:Cloud Security Cloud Security team related v8.19.0 v9.1.0

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants