sonatype-nexus-community / nancy

A tool to check for vulnerabilities in your Golang dependencies, powered by Sonatype OSS Index
Apache License 2.0
549 stars 76 forks source link

[DepShield] (CVSS 5.9) Vulnerability due to usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 #179

Closed sonatype-depshield[bot] closed 3 years ago

sonatype-depshield[bot] commented 3 years ago

Vulnerabilities

DepShield reports that this application's usage of golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 results in the following vulnerability(s):


Occurrences

golang.org/x:crypto:0.0.0-20180904163835-0709b304e793 is a transitive dependency introduced by the following direct dependency(s):

github.com/spf13:cobra:1.0.0         └─ github.com/spf13:viper:1.4.0               └─ github.com/prometheus:client_golang:0.9.3                     └─ github.com/prometheus:common:0.4.0                           └─ github.com/sirupsen:logrus:1.2.0                                 └─ golang.org/x:crypto:0.0.0-20180904163835-0709b304e793

github.com/spf13:viper:1.7.1         └─ github.com/prometheus:client_golang:0.9.3               └─ github.com/prometheus:common:0.4.0                     └─ github.com/sirupsen:logrus:1.2.0                           └─ golang.org/x:crypto:0.0.0-20180904163835-0709b304e793

This is an automated GitHub Issue created by Sonatype DepShield. Details on managing GitHub Apps, including DepShield, are available for personal and organization accounts. Please submit questions or feedback about DepShield to the Sonatype DepShield Community.

DarthHater commented 3 years ago

@bhamail this is a false positive correct (since we replace this)?

bhamail commented 3 years ago

Closing as false positive. The app actually uses a different version of crypto than reported by go mod graph:

$ go list -m all | grep crypto
golang.org/x/crypto v0.0.0-20190820162420-60c769a6c586