Shaded Vulnerability Detection
The Shaded Vulnerability Detection dashboard is a tool to estimate the impact of the increase in policy violations that users will experience, due to the introduction of our new Shaded Vulnerability Detection algorithm.
Our new Shaded Vulnerability Detection algorithm has uncovered a new threat layer that was previously undetectable by vulnerability detection tools in the market today. It can detect vulnerabilities that have been shaded or recompiled (depends upon factors such as compiler optimizations). This means that if an author of an open source component has included vulnerable code in their project and then relocated or recompiled it, the shaded vulnerability detection algorithm will still be able to detect that vulnerability. The algorithm can also detect simple modifications to the source code, post re-recompilation.
Due to the newer vulnerabilities being discovered, users will see new policy violations, which could break builds or stall the development processes at different stages. The Shaded Vulnerability Detection Dashboard assists with the identification and prioritizing the remediation process.
How to Prioritize Remediation for Shaded Vulnerabilities
Using this dashboard you can establish the priority of remediation, by making an informed decision based on the risk due to shaded vulnerabilities.
The key vulnerability attributes that can impact prioritizing any potential remediation are:
Applications
Review the newly identified vulnerable open source components your mission-critical applications use, to determine the impact from the newly identified vulnerabilities.
Severity
Prioritize the remediation of your applications against the severity of the newly identified vulnerabilities.
Stage
Based on your application's stage in the development cycle, determine the timing of remediation.
Critical Fixes and High Fixes
Remediate and prioritize updates to your applications based on whether a non-vulnerable version is available.
# Vulns
Prioritize based on the number of published security advisories (#Vulns) for the vulnerabilities identified.
For Faster Remediation
Enable Auto PRs to allow Sonatype Lifecycle to update components to non-violation versions.
Use Component Search to find other available component versions.
Drip Dates - Phased Roll-out of Shaded Vulnerabilities
Based on the new shaded vulnerability detection algorithm, you may experience an increase in the number of policy violations in Lifecycle. To assist remediating these violations, Sonatype is managing the identification and release of additional vulnerabilities in stages, based on the severity.
The Drips, i.e. the data roll-out dates represent the dates when the shaded vulnerability data will be rolled out to Sonatype customers. As a result, Lifecyle users will see new policy violations.
Drips | Dates for Release | Severity of Shaded Vulnerabilities |
---|---|---|
Drip 1 | 09/09/2024 - 09/23/2024 | All Critical Shaded Vulnerabilities |
Drip 2 | 09/30/2024 - 10/21/2024 | All High Shaded Vulnerabilities |
Drip 3 | 10/28/2024 - 11/18/2024 | All Medium Shaded Vulnerabilities |
Drip 4 | 11/25/2024 and later | All Low shaded vulnerabilities |
Get to know your Shaded Vulnerability Detection Dashboard
The Shaded Vulnerability Detection dashboard shows data for affected customers and visualizations with key vulnerability attributes to help prioritize and suggest remediation plans.
Host Name of the Selected Instance
![Shaded vulnerability detection](image/uuid-a922bf9b-a5e5-d8bc-51df-d7d48b6e7021.png)
The host name on the top right of the dashboard indicates the instance of Sonatype IQ Server where the shaded vulnerabilities have been detected.
Shaded Vulnerabilities Chart
![shaded_vuln_scorecard.png](image/uuid-2b237199-c60e-d0f1-0caa-f18e26b0cae7.png)
The Shaded Vulnerabilities chart shows the total number of vulnerabilities in each category, i.e. critical, high, medium, and low found across all applications.
Vulnerable Components per Application Table
This table shows a list of all applications and the corresponding components on the current Sonatype IQ instance (host).
![Vulnerable_Component_tables.png](image/uuid-01325220-4e2b-4a90-ce84-9c2b1ccde3bb.png)
Table column | Description |
---|---|
Application | The name of the applications in the current instance of Sonatype IQ Server. |
Component | The name of the implicated component in the Sonatype IQ instance that contains the shaded vulnerability |
Severity | Indicates the severity level assigned to the implicated component |
Version | Indicates the version number of the implicated component |
Stage | The development stage (develop, source, build, stage-release, release or operate) at which policy evaluation is configured for the application. |
Direct/Transitive | Indicates whether the implicated component is called as a direct or transitive dependency |
Fixes | Indicates if a fix for the implicated component is available |
Fixes Available for Highest Risk and Total Vulnerabilties
![High_risk_fixes_and_total_shaded.png](image/uuid-5277575c-8a24-6995-227f-4f1474ab3de6.png)
The Fixes Available for Highest Risk section shows the number of fixes (non-vulnerable versions of the implicated component) for critical and high severity vulnerabilities.
NOTE: The Fixes Available shown in this metric are not based on policy. You may see different results, depending on how your policy is structured.
The total shaded vulnerabilities chart shows the number of shaded vulnerabilities detected for each category of severity.
Breakdown of Fixes Available
![Shaded_Vuln_ss_1.png](image/uuid-e74692b3-e30f-3d87-183e-824d6843b47e.png)
![shaded_vuln_2_of_4.png](image/uuid-cbafe880-dcd1-cd8a-da36-db0b3d027ab7.png)
![shaded_vuln_3_of_4.png](image/uuid-a3a03fb3-6298-ba67-a195-daba41534cb7.png)
![shaded_vuln_4_of_4.png](image/uuid-55cb393d-4418-f8aa-35ff-c55fff0cb7e5.png)
This section shows a breakdown of fixes available for each severity level of the of implicated components.
Use the corresponding table to determine if a fix is available for the component to prioritize remediation.
Table column | Description |
---|---|
Component Name | The name of the implicated component in the Sonatype IQ instance that contains the shaded vulnerability |
Version | Indicates the version number of the implicated component |
Fix Available | "Yes" if a fix for the component is available |
Highest Risk by Components
This table shows a list of components that are "critical" or "high" risks. You can sort the table on the relevant columns to get different perspectives on the risk. For e.g. sorting on the column 'Stage' gives you a list of components implicated with shaded vulnerabilities in a specific stage of development. You can prioritize the remediation at the stage that is most relevant for your situation.
![Highest_risk_by_component.png](image/uuid-940c5be4-5ec6-201f-266c-f92d5052b24a.png)
Table column | Description |
---|---|
Component | The name of the implicated component in the Sonatype IQ instance that contains the shaded vulnerability |
Version | Indicates the version number of the implicated component |
# Vulns | Indicates the number of published security advisories that implicate the component |
Apps | Indicates the number of applications containing the implicated component |
Max Severity | Indicates the maximum severity level assigned to the implicated component |
Direct | "Yes" indicates that the implicated component is called as a direct dependency |
Transitive | "Yes" indicates that the implicated component is called as a transitive dependency |
Stage | The development stage (develop, source, build, stage-release, release or operate) at which policy evaluation is configured |
Fixes | 'Fix' implies a non-vulnerable version of the component. "Y" or "N" indicates a fix is available or not available for the implicated component. |
Risk by Stage for Direct/Transitive Dependencies
![risk_by_stage_.png](image/uuid-55e36efd-1c01-aee8-f175-d8b339341c63.png)
This section shows the magnitude of shaded vulnerabilities, found in direct and transitive dependencies at each stage. The colors in the chart represent each severity level, i.e. critical, high, medium and low.
All Shaded Vulnerabilities
![New_All_Shaded_Vulns.png](image/uuid-debf2454-5ee5-d96e-d0a0-508e939c9c13.png)
This table shows a list of all vulnerabilities discovered by the Shaded Vulnerability Algorithm on your IQ instance.
Table column | Description |
---|---|
Max Severity | Indicates the maximum severity level assigned to the implicated component |
# Vulns | Indicates the number of published security advisories that implicate the component |
Component | Indicates the name of the implicated component |
Version | Indicates the version number of the implicated component |
Apps | Indicates the number of of shaded vulnerabilities of severity High in that stage |
Fixes | Indicates if a fix is available for the implicated component. 'Fix' implies a non-vulnerable version of the component. |
Implication Paths | The exact paths of the vulnerable classes |