diff --git a/dojo/settings/settings.dist.py b/dojo/settings/settings.dist.py index 429b5646b90..2da65a5ebb6 100644 --- a/dojo/settings/settings.dist.py +++ b/dojo/settings/settings.dist.py @@ -2036,6 +2036,7 @@ def saml2_attrib_map_format(din): "KHV": "https://avd.aquasec.com/misconfig/kubernetes/", # e.g. https://avd.aquasec.com/misconfig/kubernetes/khv045 "LEN-": "https://support.lenovo.com/cl/de/product_security/", # e.g. https://support.lenovo.com/cl/de/product_security/LEN-94953 "MAL-": "https://cvepremium.circl.lu/vuln/", # e.g. https://cvepremium.circl.lu/vuln/mal-2025-49305 + "MFSA": "https://www.mozilla.org/en-US/security/advisories/", # e.g. https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/ "MGAA-": "https://advisories.mageia.org/&&.html", # e.g. https://advisories.mageia.org/MGAA-2013-0054.html "MGASA-": "https://advisories.mageia.org/&&.html", # e.g. https://advisories.mageia.org/MGASA-2025-0023.html "MSRC_": "https://cvepremium.circl.lu/vuln/", # e.g. https://cvepremium.circl.lu/vuln/msrc_cve-2025-59200 diff --git a/dojo/templatetags/display_tags.py b/dojo/templatetags/display_tags.py index 25dee916bd1..be102783d03 100644 --- a/dojo/templatetags/display_tags.py +++ b/dojo/templatetags/display_tags.py @@ -854,7 +854,7 @@ def vulnerability_url(vulnerability_id): return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.replace("SSA:", "SSA-")) if key == "SSA-" and not re.findall(r"SSA-\d{4}-", vulnerability_id): return "https://cert-portal.siemens.com/productcert/html/" + str(vulnerability_id.lower()) + ".html" - if key in {"AVD", "KHV", "C-", "ELA-"}: + if key in {"AVD", "KHV", "C-", "ELA-", "MFSA"}: return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.lower()) if key == "SUSE-SU-": return settings.VULNERABILITY_URLS[key] + str(vulnerability_id.lower().removeprefix("suse-su-")[:4]) + "/" + vulnerability_id.replace(":", "")