The problem of unsecure software is a leading technical challenge of our time. To provide robust, fault tolerant software is key priority of the organization. In this blog we will be discussing in brief about OWASP tool and demonstrating how to integrate OWASP dependency check tool with Jenkins to scan vulnerability in early phases of development.
Vulnerable software is major concern to companies, and it can lead to major loss to the users. Recently on December 9th, 2021, a 0-day exploit in the popular Java logging library log4j2 was discovered that resulted in Remote Code Execution (RCE) by logging a certain string. – CVE-2021-44228. This vulnerability got fixed in log4j 2.15.0.
After that two new vulnerabilities named, CVE-2021-45046 and CVE-2021-45105, were introduced in log4j2, and they were fixed in the latest log4j2 version 2.17.0.
(*CVE – Common Vulnerabilities and Exposures)
OWASP ( Open Web Application Security Project ) dependency tool is free, opensource tool which you can integrate to detect vulnerabilities in project dependencies. It easily integrates with Maven, Gradle, Jenkins with plugins.
How dependency check detects vulnerabilities?
OWASP Dependency-Check identifies vulnerabilities using Analyzers. These are dedicated open-source projects that execute the entire dependency scanning process on list of repositories defined.
It collects evidence in the form of vender, product and version information from Karlo files scanned by its analyzers and it assigned a confidence level of low, medium, high, or highest according to its reliability.
How to Integrate with Jenkins?
1. First step is to go to the Jenkins dashboard, select Manage Jenkins->Manage Plugins option, and install the OWASP Dependency-Check Plugin.
2. Second step is to install the dependency-check tool from the Jenkins Global Tool Configuration under the System Configuration. In the Jenkins dashboard, select Manage Jenkins->Global Tool Configuration option, and scroll down to the last you will find the Dependency Check Installation block.