|
| 1 | +# |
| 2 | +# Copyright (c) nexB Inc. and others. All rights reserved. |
| 3 | +# VulnerableCode is a trademark of nexB Inc. |
| 4 | +# SPDX-License-Identifier: Apache-2.0 |
| 5 | +# See http://www.apache.org/licenses/LICENSE-2.0 for the license text. |
| 6 | +# See https://github.com/aboutcode-org/vulnerablecode for support or download. |
| 7 | +# See https://aboutcode.org for more information about nexB OSS projects. |
| 8 | +# |
| 9 | + |
| 10 | +import os |
| 11 | +from datetime import datetime |
| 12 | +from unittest import mock |
| 13 | +from unittest.mock import MagicMock |
| 14 | + |
| 15 | +import pytest |
| 16 | + |
| 17 | +from vulnerabilities.models import AdvisoryAlias |
| 18 | +from vulnerabilities.models import AdvisoryExploit |
| 19 | +from vulnerabilities.models import AdvisoryV2 |
| 20 | +from vulnerabilities.pipelines.v2_improvers.enhance_with_github_poc import ( |
| 21 | + GithubPocsImproverPipeline, |
| 22 | +) |
| 23 | + |
| 24 | +BASE_DIR = os.path.dirname(os.path.abspath(__file__)) |
| 25 | + |
| 26 | +TEST_REPO_DIR = os.path.join(BASE_DIR, "../../test_data/github_poc") |
| 27 | + |
| 28 | + |
| 29 | +@pytest.mark.django_db |
| 30 | +@mock.patch("vulnerabilities.pipelines.v2_improvers.enhance_with_github_poc.fetch_via_vcs") |
| 31 | +def test_github_poc_db_improver(mock_fetch_via_vcs): |
| 32 | + mock_vcs = MagicMock() |
| 33 | + mock_vcs.dest_dir = TEST_REPO_DIR |
| 34 | + mock_vcs.delete = MagicMock() |
| 35 | + mock_fetch_via_vcs.return_value = mock_vcs |
| 36 | + |
| 37 | + adv1 = AdvisoryV2.objects.create( |
| 38 | + advisory_id="VCIO-123-0001", |
| 39 | + datasource_id="ds", |
| 40 | + avid="ds/VCIO-123-0001", |
| 41 | + unique_content_id="sgsdg45", |
| 42 | + url="https://test.com", |
| 43 | + date_collected=datetime.now(), |
| 44 | + ) |
| 45 | + adv2 = AdvisoryV2.objects.create( |
| 46 | + advisory_id="VCIO-123-1002", |
| 47 | + datasource_id="ds", |
| 48 | + avid="ds/VCIO-123-1002", |
| 49 | + unique_content_id="6hd4d6f", |
| 50 | + url="https://test.com", |
| 51 | + date_collected=datetime.now(), |
| 52 | + ) |
| 53 | + adv3 = AdvisoryV2.objects.create( |
| 54 | + advisory_id="VCIO-123-1003", |
| 55 | + datasource_id="ds", |
| 56 | + avid="ds/VCIO-123-1003", |
| 57 | + unique_content_id="sd6h4sh", |
| 58 | + url="https://test.com", |
| 59 | + date_collected=datetime.now(), |
| 60 | + ) |
| 61 | + |
| 62 | + alias1 = AdvisoryAlias.objects.create(alias="CVE-2022-0236") |
| 63 | + alias2 = AdvisoryAlias.objects.create(alias="CVE-2025-0108") |
| 64 | + alias3 = AdvisoryAlias.objects.create(alias="CVE-2025-0309") |
| 65 | + adv1.aliases.add(alias1) |
| 66 | + adv2.aliases.add(alias2) |
| 67 | + adv3.aliases.add(alias3) |
| 68 | + |
| 69 | + improver = GithubPocsImproverPipeline() |
| 70 | + improver.execute() |
| 71 | + |
| 72 | + assert len(AdvisoryExploit.objects.all()) == 10 |
| 73 | + exploit = AdvisoryExploit.objects.first() |
| 74 | + assert exploit.data_source == "GitHub-PoC" |
| 75 | + assert exploit.source_url == "https://github.com/iSee857/CVE-2025-0108-PoC" |
0 commit comments