Skip to content

Commit 0582a71

Browse files
committed
CxOne 1.0.24 changes January 2025
1.Container Security Engine has been added to the Configuration Page; selecting that option will import Container Security results. 2.Findings no longer present in the Latest Scan will be marked Closed.
1 parent 02ad271 commit 0582a71

10 files changed

+13978
-13817
lines changed

Scripts/CheckmarxOneAppListIntegration_sys_script_include_f60f0ee047131110328ca368436d43ba.xml

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<unload unload_date="2024-12-20 12:24:17">
2+
<unload unload_date="2025-02-07 05:30:05">
33
<sys_script_include action="INSERT_OR_UPDATE">
44
<access>public</access>
55
<active>true</active>
66
<api_name>x_chec3_chexone.CheckmarxOneAppListIntegration</api_name>
77
<caller_access/>
88
<client_callable>false</client_callable>
99
<description>Integration script for use with the CheckmarxOne Application List Integration run.</description>
10+
<mobile_callable>false</mobile_callable>
1011
<name>CheckmarxOneAppListIntegration</name>
12+
<sandbox_callable>false</sandbox_callable>
1113
<script><![CDATA[var CheckmarxOneAppListIntegration = Class.create();
1214
CheckmarxOneAppListIntegration.prototype = Object.extendsObject(sn_vul.ApplicationVulnerabilityIntegrationBase, {
1315

Scripts/CheckmarxOneAppListProcessor_sys_script_include_716c87ad471f1110328ca368436d438a.xml

+3-1
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<unload unload_date="2024-12-20 12:24:20">
2+
<unload unload_date="2025-02-07 05:33:25">
33
<sys_script_include action="INSERT_OR_UPDATE">
44
<access>public</access>
55
<active>true</active>
66
<api_name>x_chec3_chexone.CheckmarxOneAppListProcessor</api_name>
77
<caller_access/>
88
<client_callable>false</client_callable>
99
<description>Converts the appinfo xml data into a json object that can be consumed by the VR Application Vulnerability API.</description>
10+
<mobile_callable>false</mobile_callable>
1011
<name>CheckmarxOneAppListProcessor</name>
12+
<sandbox_callable>false</sandbox_callable>
1113
<script><![CDATA[var CheckmarxOneAppListProcessor = Class.create();
1214
CheckmarxOneAppListProcessor.prototype = Object.extendsObject(sn_vul.ApplicationVulnerabilityImportProcessorBase, {
1315
/*

Scripts/CheckmarxOneAppVulItemIntegration_sys_script_include_891d8fed471f1110328ca368436d4334.xml

+48-103
Large diffs are not rendered by default.

Scripts/CheckmarxOneAppVulItemProcessor_sys_script_include_ba2b3da69769e510026f72021153af1b.xml

+49-154
Large diffs are not rendered by default.

Scripts/CheckmarxOneConfigUtilBase_sys_script_include_508f0d54471f1110328ca368436d43f8.xml

+12-8
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<unload unload_date="2024-12-20 12:24:35">
2+
<unload unload_date="2025-02-07 05:40:43">
33
<sys_script_include action="INSERT_OR_UPDATE">
44
<access>package_private</access>
55
<active>true</active>
66
<api_name>x_chec3_chexone.CheckmarxOneConfigUtilBase</api_name>
77
<caller_access/>
88
<client_callable>false</client_callable>
99
<description>Wrapper class to assemble the components for Checkmarx One Configuration Calls.</description>
10+
<mobile_callable>false</mobile_callable>
1011
<name>CheckmarxOneConfigUtilBase</name>
12+
<sandbox_callable>false</sandbox_callable>
1113
<script><![CDATA[var CheckmarxOneConfigUtilBase = Class.create();
1214
CheckmarxOneConfigUtilBase.prototype = {
1315
initialize: function() {},
@@ -66,22 +68,24 @@ CheckmarxOneConfigUtilBase.prototype = {
6668
"checkmarxone_api_base_url": gr.getValue("checkmarxone_api_base_url"),
6769
"checkmarxone_server_url": gr.getValue("checkmarxone_server_url"),
6870
"include_first_detection_date": gr.getValue("include_first_detection_date") === "1",
71+
"include_only_similarity_id": gr.getValue("include_only_similarity_id") === "1",
6972
"import_sca": gr.getValue("import_sca") === "1",
7073
"import_sast": gr.getValue("import_sast") === "1",
7174
"import_kics": gr.getValue("import_kics") === "1",
72-
"exclude_dev_and_test_dependencies": gr.getValue("exclude_dev_and_test_dependencies") === "1",
75+
"include_container_security": gr.getValue("include_container_security") === "1",
76+
"exclude_dev_and_test_dependencies": gr.getValue("exclude_dev_and_test_dependencies") === "1",
7377
"triaging_in_snow": gr.getValue("triaging_in_snow") === "1",
7478
"vulnerability_threshold_level": gr.getValue("vulnerability_threshold_level"),
7579
"scan_synchronization": gr.getValue("scan_synchronization"),
7680
"access_token": gr.access_token.getDecryptedValue(),
7781
"sync_only_primary_branch": gr.getValue("sync_only_primary_branch") === "1",
7882
"list_projects": gr.getValue("list_of_project_id_s"),
79-
"result_states": gr.getValue("result_states"),
80-
"link": gr.getValue("link"),
83+
"result_states": gr.getValue("result_states"),
84+
"link": gr.getValue("link"),
8185
"project_filter_by_name": gr.getValue("project_filter_by_name"),
8286
"filter_project": gr.getValue("filter_project"),
83-
"severity": gr.getValue("severity"),
84-
"scan_type" : gs.nil(gr.getValue("scan_type")) ? "" : gr.getValue("scan_type"),
87+
"severity": gr.getValue("severity"),
88+
"scan_type": gs.nil(gr.getValue("scan_type")) ? "" : gr.getValue("scan_type"),
8589
};
8690
8791
new sn_sec_int.Implementation().setConfiguration(instance, newconfig);
@@ -96,13 +100,13 @@ CheckmarxOneConfigUtilBase.prototype = {
96100
<sys_created_by>admin</sys_created_by>
97101
<sys_created_on>2022-11-17 05:45:19</sys_created_on>
98102
<sys_id>508f0d54471f1110328ca368436d43f8</sys_id>
99-
<sys_mod_count>64</sys_mod_count>
103+
<sys_mod_count>66</sys_mod_count>
100104
<sys_name>CheckmarxOneConfigUtilBase</sys_name>
101105
<sys_package display_value="Checkmarx One Vulnerability Integration" source="x_chec3_chexone">3d20e92d47471110328ca368436d436a</sys_package>
102106
<sys_policy/>
103107
<sys_scope display_value="Checkmarx One Vulnerability Integration">3d20e92d47471110328ca368436d436a</sys_scope>
104108
<sys_update_name>sys_script_include_508f0d54471f1110328ca368436d43f8</sys_update_name>
105109
<sys_updated_by>admin</sys_updated_by>
106-
<sys_updated_on>2024-11-05 10:44:52</sys_updated_on>
110+
<sys_updated_on>2025-01-21 07:27:57</sys_updated_on>
107111
</sys_script_include>
108112
</unload>

Scripts/CheckmarxOneScanSummaryIntegration_sys_script_include_d7f2d2e447131110328ca368436d4321.xml

+54-3
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<unload unload_date="2024-12-20 12:24:40">
2+
<unload unload_date="2025-02-07 05:42:00">
33
<sys_script_include action="INSERT_OR_UPDATE">
44
<access>public</access>
55
<active>true</active>
66
<api_name>x_chec3_chexone.CheckmarxOneScanSummaryIntegration</api_name>
77
<caller_access/>
88
<client_callable>false</client_callable>
99
<description>Integration script for the CheckmarxOne Scan Summary Integration.</description>
10+
<mobile_callable>false</mobile_callable>
1011
<name>CheckmarxOneScanSummaryIntegration</name>
12+
<sandbox_callable>false</sandbox_callable>
1113
<script><![CDATA[var CheckmarxOneScanSummaryIntegration = Class.create();
1214
CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.ApplicationVulnerabilityIntegrationBase, {
1315
@@ -59,11 +61,13 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
5961
var scaScanSummaryAll = '';
6062
var sastScanSummaryAll = '';
6163
var kicsScanSummaryAll = '';
64+
var containerSecurityScanSummaryAll = '';
6265
var includescanSummaryAll = '';
6366
var newoffset = offsetId - 1;
6467
var includesca = this.UTIL.importScaFlaw(this.IMPLEMENTATION);
6568
var includesast = this.UTIL.importSastFlaw(this.IMPLEMENTATION);
6669
var includekics = this.UTIL.importKicsFlaw(this.IMPLEMENTATION);
70+
var includeContainerSecurity = this.UTIL.importContainerSecurityFlaw(this.IMPLEMENTATION);
6771
var config = this.UTIL._getConfig(this.IMPLEMENTATION);
6872
var scan_synchronization = config.scan_synchronization.toString();
6973
var primaryBranch = '';
@@ -93,16 +97,20 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
9397
var prvSastScanIdBranch = '';
9498
var prvScaScanIdBranch = '';
9599
var prvKicsScanIdBranch = '';
100+
var prvConSecScanIdBranch = '';
96101
var sastPrvScanId = '';
97102
var scaPrvScanId = '';
98103
var kicsPrvScanId = '';
104+
var conSecPrvScanId = '';
99105
var lastSastDate;
100106
var lastScaDate;
101107
var lastKicsDate;
108+
var lastConSecDate;
102109
var prvBranch = '';
103110
var prvSastScanBranch = '';
104111
var prvScaScanBranch = '';
105112
var prvKicsScanBranch = '';
113+
var prvConSecScanBranch = '';
106114
107115
while (scanSummary.hasNext()) {
108116
scanSummary.next();
@@ -165,6 +173,19 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
165173
prvKicsScanIdBranch += prvBranch + ':::' + prvScanId + ':::' + lastUpdatedDate;
166174
}
167175
}
176+
177+
if (prvScanId.indexOf('CS') != -1 && isBranchMatched == 'true') {
178+
if ((null == lastConSecDate || '' == lastConSecDate || 'undefined' == lastConSecDate) || (lastConSecDate && lastUpdatedDate >= lastConSecDate)) {
179+
conSecPrvScanId = prvScanId;
180+
prvConSecScanBranch = prvBranch;
181+
lastConSecDate = lastUpdatedDate;
182+
}
183+
if (null != scan_synchronization && '' != scan_synchronization && 'undefined' != scan_synchronization && scan_synchronization == 'latest scan from each branch') {
184+
if (prvConSecScanIdBranch != '')
185+
prvConSecScanIdBranch += '|||';
186+
prvConSecScanIdBranch += prvBranch + ':::' + prvScanId + ':::' + lastUpdatedDate;
187+
}
188+
}
168189
}
169190
}
170191
@@ -258,6 +279,33 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
258279
'" app_name="' + appId + '"/>';
259280
}
260281
}
282+
283+
//Container Security scan summary
284+
if (includeContainerSecurity && jsonLastScanSummResp.scans[item].engines.toString().indexOf("containers") != -1 && branch.indexOf(jsonLastScanSummResp.scans[item].branch) == -1) {
285+
var containerSecurityResponseVul = this.UTIL.getContainerSecurityScanSummaryInfo(this.IMPLEMENTATION, jsonLastScanSummResp.scans[item].id);
286+
var scanType = "Full Scan";
287+
if (containerSecurityResponseVul != -1) {
288+
289+
if (null != scan_synchronization && '' != scan_synchronization && 'undefined' != scan_synchronization && scan_synchronization == 'latest scan from each branch') {
290+
conSecPrvScanId = this._getPrvScanIdForSpecificBranch(prvConSecScanIdBranch, jsonLastScanSummResp.scans[item].branch);
291+
if (conSecPrvScanId == '')
292+
prvConSecScanBranch = '';
293+
else
294+
prvConSecScanBranch = '' + jsonLastScanSummResp.scans[item].branch;
295+
}
296+
containerSecurityScanSummaryAll += '<scan id="' + 'CS' + jsonLastScanSummResp.scans[item].id + '" app_id="' + appId +
297+
'" last_scan_date="' + this.UTIL.parseDate(jsonLastScanSummResp.scans[item].updatedAt) +
298+
'" total_no_flaws="' + containerSecurityResponseVul +
299+
'" branch="' + jsonLastScanSummResp.scans[item].branch +
300+
'" prvScanId="' + conSecPrvScanId +
301+
'" scan_origin="' + jsonLastScanSummResp.scans[item].sourceOrigin +
302+
'" scan_source="' + jsonLastScanSummResp.scans[item].sourceType +
303+
'" scan_type="' + scanType +
304+
'" prvBranch="' + prvConSecScanBranch +
305+
'" app_name="' + appId + '"/>';
306+
}
307+
}
308+
261309
branch.push(jsonLastScanSummResp.scans[item].branch);
262310
263311
var date = new GlideDateTime(this.UTIL.parseDate(jsonLastScanSummResp.scans[item].updatedAt));
@@ -273,6 +321,9 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
273321
if (includekics) {
274322
includescanSummaryAll += "<kicsScanData><scans>" + kicsScanSummaryAll + "</scans></kicsScanData>";
275323
}
324+
if (includeContainerSecurity) {
325+
includescanSummaryAll += "<conSecScanData><scans>" + containerSecurityScanSummaryAll + "</scans></conSecScanData>";
326+
}
276327
277328
reportContent = scanSummaryRootNodeStart + includescanSummaryAll + scanSummaryRootNodeEnd;
278329
} catch (err) {
@@ -464,13 +515,13 @@ CheckmarxOneScanSummaryIntegration.prototype = Object.extendsObject(sn_vul.Appli
464515
<sys_created_by>admin</sys_created_by>
465516
<sys_created_on>2022-11-18 05:18:19</sys_created_on>
466517
<sys_id>d7f2d2e447131110328ca368436d4321</sys_id>
467-
<sys_mod_count>267</sys_mod_count>
518+
<sys_mod_count>271</sys_mod_count>
468519
<sys_name>CheckmarxOneScanSummaryIntegration</sys_name>
469520
<sys_package display_value="Checkmarx One Vulnerability Integration" source="x_chec3_chexone">3d20e92d47471110328ca368436d436a</sys_package>
470521
<sys_policy/>
471522
<sys_scope display_value="Checkmarx One Vulnerability Integration">3d20e92d47471110328ca368436d436a</sys_scope>
472523
<sys_update_name>sys_script_include_d7f2d2e447131110328ca368436d4321</sys_update_name>
473524
<sys_updated_by>admin</sys_updated_by>
474-
<sys_updated_on>2024-12-11 16:31:25</sys_updated_on>
525+
<sys_updated_on>2024-12-31 08:00:01</sys_updated_on>
475526
</sys_script_include>
476527
</unload>

Scripts/CheckmarxOneScanSummaryProcessor_sys_script_include_ec0e828f47f42110328ca368436d433b.xml

+33-3
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,15 @@
11
<?xml version="1.0" encoding="UTF-8"?>
2-
<unload unload_date="2024-12-20 12:24:45">
2+
<unload unload_date="2025-02-07 05:43:01">
33
<sys_script_include action="INSERT_OR_UPDATE">
44
<access>public</access>
55
<active>true</active>
66
<api_name>x_chec3_chexone.CheckmarxOneScanSummaryProcessor</api_name>
77
<caller_access/>
88
<client_callable>false</client_callable>
99
<description>This script process the payload from CheckmarxOne app summary endpoint.</description>
10+
<mobile_callable>false</mobile_callable>
1011
<name>CheckmarxOneScanSummaryProcessor</name>
12+
<sandbox_callable>false</sandbox_callable>
1113
<script><![CDATA[var CheckmarxOneScanSummaryProcessor = Class.create();
1214
CheckmarxOneScanSummaryProcessor.prototype = Object.extendsObject(sn_vul.ApplicationVulnerabilityImportProcessorBase, {
1315
MSG: 'CheckmarxOne Scan Summary Processor: ',
@@ -29,6 +31,9 @@ CheckmarxOneScanSummaryProcessor.prototype = Object.extendsObject(sn_vul.Applica
2931
if (node.toString().indexOf("kicsScanData") != -1) {
3032
var kicsnodes = doc.getNode('/scanData/kicsScanData/scans');
3133
}
34+
if (node.toString().indexOf("conSecScanData") != -1) {
35+
var containerSecurityNodes = doc.getNode('/scanData/conSecScanData/scans');
36+
}
3237
3338
} catch (ex) {
3439
gs.error(this.MSG + "Error occurred while validating or parsing the XML: " + ex);
@@ -112,6 +117,31 @@ CheckmarxOneScanSummaryProcessor.prototype = Object.extendsObject(sn_vul.Applica
112117
}
113118
}
114119
}
120+
if (containerSecurityNodes) {
121+
var conSecData = {};
122+
var conSecIteration = containerSecurityNodes.getChildNodeIterator();
123+
while (conSecIteration.hasNext()) {
124+
try {
125+
var conSecAppNode = conSecIteration.next();
126+
var conSecAttributes = conSecAppNode.getAttributes();
127+
var conSecPrvScanId = conSecAttributes.prvScanId;
128+
//map attributes from CheckmarxOne into the servicenow scan summary table
129+
conSecData['source_app_id'] = conSecAttributes.app_id;
130+
conSecData['source_scan_id'] = conSecAttributes.id;
131+
conSecData['detected_flaw_count'] = +conSecAttributes.total_no_flaws;
132+
conSecData['last_scan_date'] = new GlideDateTime(conSecAttributes.last_scan_date);
133+
conSecData['scan_summary_name'] = conSecAttributes.id + ' ' + conSecData['last_scan_date'];
134+
conSecData['tags'] = "Branch: " + conSecAttributes.branch + " | Old ScanId: " + conSecPrvScanId + " | Old Branch: " + prvBranch;
135+
conSecData['scan_submitted_by'] = 'Scan Origin: ' + conSecAttributes.scan_origin + '\n' + 'Scan Source: ' + conSecAttributes.scan_source + '\n' + 'Scan Type: ' + conSecAttributes.scan_type + '\n';
136+
this._upsert(conSecData);
137+
} catch (ex) {
138+
errorMessage = gs.getMessage("Error in retriving data for scan list integration!");
139+
gs.error(this.MSG + "errorMessage " + ex);
140+
errorProcess += " | " + ex.getMessage();
141+
//throw ex;
142+
}
143+
}
144+
}
115145
if (!gs.nil(errorProcess))
116146
gs.error(this.MSG + "All errors that occurred while processing scan summary: " + errorProcess);
117147
this.completeProcess(this.integrationProcessGr, this.import_counts);
@@ -164,13 +194,13 @@ CheckmarxOneScanSummaryProcessor.prototype = Object.extendsObject(sn_vul.Applica
164194
<sys_created_by>admin</sys_created_by>
165195
<sys_created_on>2023-02-08 12:56:43</sys_created_on>
166196
<sys_id>ec0e828f47f42110328ca368436d433b</sys_id>
167-
<sys_mod_count>25</sys_mod_count>
197+
<sys_mod_count>29</sys_mod_count>
168198
<sys_name>CheckmarxOneScanSummaryProcessor</sys_name>
169199
<sys_package display_value="Checkmarx One Vulnerability Integration" source="x_chec3_chexone">3d20e92d47471110328ca368436d436a</sys_package>
170200
<sys_policy/>
171201
<sys_scope display_value="Checkmarx One Vulnerability Integration">3d20e92d47471110328ca368436d436a</sys_scope>
172202
<sys_update_name>sys_script_include_ec0e828f47f42110328ca368436d433b</sys_update_name>
173203
<sys_updated_by>admin</sys_updated_by>
174-
<sys_updated_on>2024-11-27 10:02:47</sys_updated_on>
204+
<sys_updated_on>2024-12-31 08:05:21</sys_updated_on>
175205
</sys_script_include>
176206
</unload>

0 commit comments

Comments
 (0)