This is an automated email from the ASF dual-hosted git repository.

janhoy pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/solr-site.git


The following commit(s) were added to refs/heads/main by this push:
     new 84d44f4a7 First draft presenting dependency vulnerability info
     new 07f83bb84 Merge pull request #86 from raboof/vex
84d44f4a7 is described below

commit 84d44f4a74919dd051d990d3e08631ad5a8ee2df
Author: Arnout Engelen <[email protected]>
AuthorDate: Wed Dec 14 17:34:07 2022 +0100

    First draft presenting dependency vulnerability info
    
    To replace 
https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools
    and ask for feedback and experiences on approaches to VEX as discussed in
    https://lists.apache.org/thread/j35clzm48s7xxc9671qogzr54bsdj1lz
---
 content/pages/security.md                |   35 +-
 pelicanconf.py                           |    3 +-
 plugins/vex/__init__.py                  |    1 +
 plugins/vex/schema/bom-1.4.schema.json   | 1697 ++++++++++++++++++++++++++++++
 plugins/vex/schema/vex-input.schema.json |   35 +
 plugins/vex/vex.py                       |   70 ++
 requirements.txt                         |    3 +
 themes/solr/templates/security.html      |   36 +
 vex-input.json                           |  469 +++++++++
 9 files changed, 2342 insertions(+), 7 deletions(-)

diff --git a/content/pages/security.md b/content/pages/security.md
index 7ed52caea..449c54692 100644
--- a/content/pages/security.md
+++ b/content/pages/security.md
@@ -10,20 +10,21 @@ Every CVE that is detected by a software scanner is by 
definition already public
 
 To find a path forward in addressing a detected CVE we suggest the following 
process for fastest results:
 
-1. Check further down this page to see if the CVE is listed as exploitable in 
Solr.
-2. Check the [officially published non-exploitable 
vulnerabilities](https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity#SolrSecurity-SolrandVulnerabilityScanningTools)
 list to see if the CVE is listed as not exploitable in Solr.
+1. Check [further down this page](#recent-cve-reports-for-apache-solr) to see 
if the CVE is listed as exploitable in Solr.
+2. Check the [officially published non-exploitable 
vulnerabilities](#cve-reports-for-apache-solr-dependencies) list to see if the 
CVE is listed as not exploitable in Solr.
 3. Search through the [Solr users mailing list 
archive](https://lists.apache.org/[email protected])  to see if 
anyone else has brought up this dependency CVE.
 4. If no one has, then please do [subscribe to the users mailing 
list](https://solr.apache.org/community.html#mailing-lists-chat) and then send 
an email asking about the CVE.
 
 #### Dos and Don'ts
-* Please DO discuss the possible need for library upgrades on the user list. 
+* Please DO discuss the possible need for library upgrades on the user list.
 * Please DO search Jira for the CVE number to see if we are addressing it 
already.
 * Please DO create Jira issues and associated pull requests to propose and 
discuss upgrades of *a single specific* dependency.
 * Please DO NOT attach a scan report, or paste output of a scan into Jira 
(just link the CVE instead)
 * Please DO NOT email the security email below with a scan report it will be 
ignored.
+* Please DO look into automating some of this with [VEX](#vex) and share your 
experience.
 
 #### Use of Jira
-Jira is for discussing specific development modifications. Any Jira that 
contains only scan report output, or references multiple dependencies at the 
same time is likely to be ignored/closed. The large number of folks sending us 
reports of things that are already known is a serious drag on our (volunteer) 
time so **please search Jira** before opening a new issue. 
+Jira is for discussing specific development modifications. Any Jira that 
contains only scan report output, or references multiple dependencies at the 
same time is likely to be ignored/closed. The large number of folks sending us 
reports of things that are already known is a serious drag on our (volunteer) 
time so **please search Jira** before opening a new issue.
 
 ### New Exploits <span style="color:blue">You</span> Discover in Solr
 
@@ -37,8 +38,30 @@ Before reporting a new exploit ensure that you have tested 
it against an instanc
 1. **Authentication** - Exploits demonstrated without login waste our time 
because Solr is not meant to run such that the entire world has access to all 
of its APIs. Running without forcing users to log in is no more valid than 
running linux with a widely known default root password, or a database with a 
root account that has no password.
 2. **Authorization** - It is not an exploit unless the authenticated user was 
configured with a role that should have prohibited the action, or the action 
should never be allowed for any user regardless of role. Your report should say 
why you think this action is not acceptable for the role(s) you tested it with.
 
+#### VEX
+Since the process of checking whether CVEs in dependencies of Solr affect your
+Solr deployment is tedious and error-prone, we are experimenting with sharing
+information about advisories that are known (not) to affect Solr in a
+machine-readable way.
+
+File formats to share this information are called 'VEX' formats. A number of
+such formats are under active development, such as based on
+[CycloneDX](https://cyclonedx.org/capabilities/vex/) and
+[CSAF](https://github.com/oasis-tcs/csaf/blob/master/csaf_2.0/prose/csaf-v2-editor-draft.md#45-profile-5-vex).
+
+We are currently providing vulnerability information in a CycloneDX JSON-based
+format [here](/solr.vex.json). We are very curious to hear about your 
experience,
+and to find out what is still missing to reduce the signal/noise ratio and make
+these tools more effective. We invite you to join the discussion at the
+[security-discuss](mailto:[email protected])
+[mailinglist](https://www.apache.org/foundation/mailinglists.html) or,
+if you prefer to collaborate in private, contact
+[[email protected]](mailto:[email protected]). It will likely be 
interesting
+to know what security scanning/reporting tool you are using, exactly on which
+artifacts, and if/how its vendor appears to support VEX. We'd be happy to work
+with you to see if we can provide this information in other variations or 
formats.
+
+
 ### More information
 You will find more security related information on our Wiki: 
[https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity](https://cwiki.apache.org/confluence/display/SOLR/SolrSecurity)
 
-# Recent CVE reports for Apache Solr
-Below is a list of already announced CVE vulnerabilities. These are also 
available as an [ATOM feed](/feeds/solr/security.atom.xml):
diff --git a/pelicanconf.py b/pelicanconf.py
index 204127011..d628e3c2e 100755
--- a/pelicanconf.py
+++ b/pelicanconf.py
@@ -96,7 +96,8 @@ PLUGINS = [
     'extract_toc',
     'jinja2content',
     'regex_replace',
-    'age_days_lt'
+    'age_days_lt',
+    'vex'
 #    'md_inline_extension',
 ]
 
diff --git a/plugins/vex/__init__.py b/plugins/vex/__init__.py
new file mode 100644
index 000000000..226902b84
--- /dev/null
+++ b/plugins/vex/__init__.py
@@ -0,0 +1 @@
+from .vex import *
diff --git a/plugins/vex/schema/bom-1.4.schema.json 
b/plugins/vex/schema/bom-1.4.schema.json
new file mode 100644
index 000000000..65c3c3c0c
--- /dev/null
+++ b/plugins/vex/schema/bom-1.4.schema.json
@@ -0,0 +1,1697 @@
+{
+  "$schema": "http://json-schema.org/draft-07/schema#";,
+  "$id": "http://cyclonedx.org/schema/bom-1.4.schema.json";,
+  "type": "object",
+  "title": "CycloneDX Software Bill of Materials Standard",
+  "$comment" : "CycloneDX JSON schema is published under the terms of the 
Apache License 2.0.",
+  "required": [
+    "bomFormat",
+    "specVersion",
+    "version"
+  ],
+  "additionalProperties": false,
+  "properties": {
+    "$schema": {
+      "type": "string",
+      "enum": [
+        "http://cyclonedx.org/schema/bom-1.4.schema.json";
+      ]
+    },
+    "bomFormat": {
+      "type": "string",
+      "title": "BOM Format",
+      "description": "Specifies the format of the BOM. This helps to identify 
the file as CycloneDX since BOMs do not have a filename convention nor does 
JSON schema support namespaces. This value MUST be \"CycloneDX\".",
+      "enum": [
+        "CycloneDX"
+      ]
+    },
+    "specVersion": {
+      "type": "string",
+      "title": "CycloneDX Specification Version",
+      "description": "The version of the CycloneDX specification a BOM 
conforms to (starting at version 1.2).",
+      "examples": ["1.4"]
+    },
+    "serialNumber": {
+      "type": "string",
+      "title": "BOM Serial Number",
+      "description": "Every BOM generated SHOULD have a unique serial number, 
even if the contents of the BOM have not changed over time. If specified, the 
serial number MUST conform to RFC-4122. Use of serial numbers are RECOMMENDED.",
+      "examples": ["urn:uuid:3e671687-395b-41f5-a30f-a58921a69b79"],
+      "pattern": 
"^urn:uuid:[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}$"
+    },
+    "version": {
+      "type": "integer",
+      "title": "BOM Version",
+      "description": "Whenever an existing BOM is modified, either manually or 
through automated processes, the version of the BOM SHOULD be incremented by 1. 
When a system is presented with multiple BOMs with identical serial numbers, 
the system SHOULD use the most recent version of the BOM. The default version 
is '1'.",
+      "default": 1,
+      "examples": [1]
+    },
+    "metadata": {
+      "$ref": "#/definitions/metadata",
+      "title": "BOM Metadata",
+      "description": "Provides additional information about a BOM."
+    },
+    "components": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/component"},
+      "uniqueItems": true,
+      "title": "Components",
+      "description": "A list of software and hardware components."
+    },
+    "services": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/service"},
+      "uniqueItems": true,
+      "title": "Services",
+      "description": "A list of services. This may include microservices, 
function-as-a-service, and other types of network or intra-process services."
+    },
+    "externalReferences": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/externalReference"},
+      "title": "External References",
+      "description": "External references provide a way to document systems, 
sites, and information that may be relevant but which are not included with the 
BOM."
+    },
+    "dependencies": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/dependency"},
+      "uniqueItems": true,
+      "title": "Dependencies",
+      "description": "Provides the ability to document dependency 
relationships."
+    },
+    "compositions": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/compositions"},
+      "uniqueItems": true,
+      "title": "Compositions",
+      "description": "Compositions describe constituent parts (including 
components, services, and dependency relationships) and their completeness."
+    },
+    "vulnerabilities": {
+      "type": "array",
+      "additionalItems": false,
+      "items": {"$ref": "#/definitions/vulnerability"},
+      "uniqueItems": true,
+      "title": "Vulnerabilities",
+      "description": "Vulnerabilities identified in components or services."
+    },
+    "signature": {
+      "$ref": "#/definitions/signature",
+      "title": "Signature",
+      "description": "Enveloped signature in [JSON Signature Format 
(JSF)](https://cyberphone.github.io/doc/security/jsf.html)."
+    }
+  },
+  "definitions": {
+    "refType": {
+      "$comment": "Identifier-DataType for interlinked elements.",
+      "type": "string"
+    },
+    "metadata": {
+      "type": "object",
+      "title": "BOM Metadata Object",
+      "additionalProperties": false,
+      "properties": {
+        "timestamp": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Timestamp",
+          "description": "The date and time (timestamp) when the BOM was 
created."
+        },
+        "tools": {
+          "type": "array",
+          "title": "Creation Tools",
+          "description": "The tool(s) used in the creation of the BOM.",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/tool"}
+        },
+        "authors" :{
+          "type": "array",
+          "title": "Authors",
+          "description": "The person(s) who created the BOM. Authors are 
common in BOMs created through manual processes. BOMs created through automated 
means may not have authors.",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/organizationalContact"}
+        },
+        "component": {
+          "title": "Component",
+          "description": "The component that the BOM describes.",
+          "$ref": "#/definitions/component"
+        },
+        "manufacture": {
+          "title": "Manufacture",
+          "description": "The organization that manufactured the component 
that the BOM describes.",
+          "$ref": "#/definitions/organizationalEntity"
+        },
+        "supplier": {
+          "title": "Supplier",
+          "description": " The organization that supplied the component that 
the BOM describes. The supplier may often be the manufacturer, but may also be 
a distributor or repackager.",
+          "$ref": "#/definitions/organizationalEntity"
+        },
+        "licenses": {
+          "type": "array",
+          "title": "BOM License(s)",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/licenseChoice"}
+        },
+        "properties": {
+          "type": "array",
+          "title": "Properties",
+          "description": "Provides the ability to document properties in a 
name-value store. This provides flexibility to include data not officially 
supported in the standard without having to use additional namespaces or create 
extensions. Unlike key-value stores, properties support duplicate names, each 
potentially having different values. Property names of interest to the general 
public are encouraged to be registered in the [CycloneDX Property 
Taxonomy](https://github.com/CycloneDX/ [...]
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/property"}
+        }
+      }
+    },
+    "tool": {
+      "type": "object",
+      "title": "Tool",
+      "description": "Information about the automated or manual tool used",
+      "additionalProperties": false,
+      "properties": {
+        "vendor": {
+          "type": "string",
+          "title": "Tool Vendor",
+          "description": "The name of the vendor who created the tool"
+        },
+        "name": {
+          "type": "string",
+          "title": "Tool Name",
+          "description": "The name of the tool"
+        },
+        "version": {
+          "type": "string",
+          "title": "Tool Version",
+          "description": "The version of the tool"
+        },
+        "hashes": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/hash"},
+          "title": "Hashes",
+          "description": "The hashes of the tool (if applicable)."
+        },
+        "externalReferences": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/externalReference"},
+          "title": "External References",
+          "description": "External references provide a way to document 
systems, sites, and information that may be relevant but which are not included 
with the BOM."
+        }
+      }
+    },
+    "organizationalEntity": {
+      "type": "object",
+      "title": "Organizational Entity Object",
+      "description": "",
+      "additionalProperties": false,
+      "properties": {
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of the organization",
+          "examples": [
+            "Example Inc."
+          ]
+        },
+        "url": {
+          "type": "array",
+          "items": {
+            "type": "string",
+            "format": "iri-reference"
+          },
+          "title": "URL",
+          "description": "The URL of the organization. Multiple URLs are 
allowed.",
+          "examples": ["https://example.com";]
+        },
+        "contact": {
+          "type": "array",
+          "title": "Contact",
+          "description": "A contact at the organization. Multiple contacts are 
allowed.",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/organizationalContact"}
+        }
+      }
+    },
+    "organizationalContact": {
+      "type": "object",
+      "title": "Organizational Contact Object",
+      "description": "",
+      "additionalProperties": false,
+      "properties": {
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of a contact",
+          "examples": ["Contact name"]
+        },
+        "email": {
+          "type": "string",
+          "format": "idn-email",
+          "title": "Email Address",
+          "description": "The email address of the contact.",
+          "examples": ["[email protected]"]
+        },
+        "phone": {
+          "type": "string",
+          "title": "Phone",
+          "description": "The phone number of the contact.",
+          "examples": ["800-555-1212"]
+        }
+      }
+    },
+    "component": {
+      "type": "object",
+      "title": "Component Object",
+      "required": [
+        "type",
+        "name"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "type": {
+          "type": "string",
+          "enum": [
+            "application",
+            "framework",
+            "library",
+            "container",
+            "operating-system",
+            "device",
+            "firmware",
+            "file"
+          ],
+          "title": "Component Type",
+          "description": "Specifies the type of component. For software 
components, classify as application if no more specific appropriate 
classification is available or cannot be determined for the component. Types 
include:\n\n* __application__ = A software application. Refer to 
[https://en.wikipedia.org/wiki/Application_software](https://en.wikipedia.org/wiki/Application_software)
 for information about applications.\n* __framework__ = A software framework. 
Refer to [https://en.wikiped [...]
+          "examples": ["library"]
+        },
+        "mime-type": {
+          "type": "string",
+          "title": "Mime-Type",
+          "description": "The optional mime-type of the component. When used 
on file components, the mime-type can provide additional context about the kind 
of file being represented such as an image, font, or executable. Some library 
or framework components may also have an associated mime-type.",
+          "examples": ["image/jpeg"],
+          "pattern": "^[-+a-z0-9.]+/[-+a-z0-9.]+$"
+        },
+        "bom-ref": {
+          "$ref": "#/definitions/refType",
+          "title": "BOM Reference",
+          "description": "An optional identifier which can be used to 
reference the component elsewhere in the BOM. Every bom-ref MUST be unique 
within the BOM."
+        },
+        "supplier": {
+          "title": "Component Supplier",
+          "description": " The organization that supplied the component. The 
supplier may often be the manufacturer, but may also be a distributor or 
repackager.",
+          "$ref": "#/definitions/organizationalEntity"
+        },
+        "author": {
+          "type": "string",
+          "title": "Component Author",
+          "description": "The person(s) or organization(s) that authored the 
component",
+          "examples": ["Acme Inc"]
+        },
+        "publisher": {
+          "type": "string",
+          "title": "Component Publisher",
+          "description": "The person(s) or organization(s) that published the 
component",
+          "examples": ["Acme Inc"]
+        },
+        "group": {
+          "type": "string",
+          "title": "Component Group",
+          "description": "The grouping name or identifier. This will often be 
a shortened, single name of the company or project that produced the component, 
or the source package or domain name. Whitespace and special characters should 
be avoided. Examples include: apache, org.apache.commons, and apache.org.",
+          "examples": ["com.acme"]
+        },
+        "name": {
+          "type": "string",
+          "title": "Component Name",
+          "description": "The name of the component. This will often be a 
shortened, single name of the component. Examples: commons-lang3 and jquery",
+          "examples": ["tomcat-catalina"]
+        },
+        "version": {
+          "type": "string",
+          "title": "Component Version",
+          "description": "The component version. The version should ideally 
comply with semantic versioning but is not enforced.",
+          "examples": ["9.0.14"]
+        },
+        "description": {
+          "type": "string",
+          "title": "Component Description",
+          "description": "Specifies a description for the component"
+        },
+        "scope": {
+          "type": "string",
+          "enum": [
+            "required",
+            "optional",
+            "excluded"
+          ],
+          "title": "Component Scope",
+          "description": "Specifies the scope of the component. If scope is 
not specified, 'required' scope SHOULD be assumed by the consumer of the BOM.",
+          "default": "required"
+        },
+        "hashes": {
+          "type": "array",
+          "title": "Component Hashes",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/hash"}
+        },
+        "licenses": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/licenseChoice"},
+          "title": "Component License(s)"
+        },
+        "copyright": {
+          "type": "string",
+          "title": "Component Copyright",
+          "description": "A copyright notice informing users of the underlying 
claims to copyright ownership in a published work.",
+          "examples": ["Acme Inc"]
+        },
+        "cpe": {
+          "type": "string",
+          "title": "Component Common Platform Enumeration (CPE)",
+          "description": "Specifies a well-formed CPE name that conforms to 
the CPE 2.2 or 2.3 specification. See 
[https://nvd.nist.gov/products/cpe](https://nvd.nist.gov/products/cpe)",
+          "examples": ["cpe:2.3:a:acme:component_framework:-:*:*:*:*:*:*:*"]
+        },
+        "purl": {
+          "type": "string",
+          "title": "Component Package URL (purl)",
+          "description": "Specifies the package-url (purl). The purl, if 
specified, MUST be valid and conform to the specification defined at: 
[https://github.com/package-url/purl-spec](https://github.com/package-url/purl-spec)",
+          "examples": 
["pkg:maven/com.acme/[email protected]?packaging=jar"]
+        },
+        "swid": {
+          "$ref": "#/definitions/swid",
+          "title": "SWID Tag",
+          "description": "Specifies metadata and content for [ISO-IEC 19770-2 
Software Identification (SWID) Tags](https://www.iso.org/standard/65666.html)."
+        },
+        "modified": {
+          "type": "boolean",
+          "title": "Component Modified From Original",
+          "description": "[Deprecated] - DO NOT USE. This will be removed in a 
future version. Use the pedigree element instead to supply information on 
exactly how the component was modified. A boolean value indicating if the 
component has been modified from the original. A value of true indicates the 
component is a derivative of the original. A value of false indicates the 
component has not been modified from the original."
+        },
+        "pedigree": {
+          "type": "object",
+          "title": "Component Pedigree",
+          "description": "Component pedigree is a way to document complex 
supply chain scenarios where components are created, distributed, modified, 
redistributed, combined with other components, etc. Pedigree supports viewing 
this complex chain from the beginning, the end, or anywhere in the middle. It 
also provides a way to document variants where the exact relation may not be 
known.",
+          "additionalProperties": false,
+          "properties": {
+            "ancestors": {
+              "type": "array",
+              "title": "Ancestors",
+              "description": "Describes zero or more components in which a 
component is derived from. This is commonly used to describe forks from 
existing projects where the forked version contains a ancestor node containing 
the original component it was forked from. For example, Component A is the 
original component. Component B is the component being used and documented in 
the BOM. However, Component B contains a pedigree node with a single ancestor 
documenting Component A - the origi [...]
+              "additionalItems": false,
+              "items": {"$ref": "#/definitions/component"}
+            },
+            "descendants": {
+              "type": "array",
+              "title": "Descendants",
+              "description": "Descendants are the exact opposite of ancestors. 
This provides a way to document all forks (and their forks) of an original or 
root component.",
+              "additionalItems": false,
+              "items": {"$ref": "#/definitions/component"}
+            },
+            "variants": {
+              "type": "array",
+              "title": "Variants",
+              "description": "Variants describe relations where the 
relationship between the components are not known. For example, if Component A 
contains nearly identical code to Component B. They are both related, but it is 
unclear if one is derived from the other, or if they share a common ancestor.",
+              "additionalItems": false,
+              "items": {"$ref": "#/definitions/component"}
+            },
+            "commits": {
+              "type": "array",
+              "title": "Commits",
+              "description": "A list of zero or more commits which provide a 
trail describing how the component deviates from an ancestor, descendant, or 
variant.",
+              "additionalItems": false,
+              "items": {"$ref": "#/definitions/commit"}
+            },
+            "patches": {
+              "type": "array",
+              "title": "Patches",
+              "description": ">A list of zero or more patches describing how 
the component deviates from an ancestor, descendant, or variant. Patches may be 
complimentary to commits or may be used in place of commits.",
+              "additionalItems": false,
+              "items": {"$ref": "#/definitions/patch"}
+            },
+            "notes": {
+              "type": "string",
+              "title": "Notes",
+              "description": "Notes, observations, and other non-structured 
commentary describing the components pedigree."
+            }
+          }
+        },
+        "externalReferences": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/externalReference"},
+          "title": "External References",
+          "description": "External references provide a way to document 
systems, sites, and information that may be relevant but which are not included 
with the BOM."
+        },
+        "components": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/component"},
+          "uniqueItems": true,
+          "title": "Components",
+          "description": "A list of software and hardware components included 
in the parent component. This is not a dependency tree. It provides a way to 
specify a hierarchical representation of component assemblies, similar to 
system &#8594; subsystem &#8594; parts assembly in physical supply chains."
+        },
+        "evidence": {
+          "$ref": "#/definitions/componentEvidence",
+          "title": "Evidence",
+          "description": "Provides the ability to document evidence collected 
through various forms of extraction or analysis."
+        },
+        "releaseNotes": {
+          "$ref": "#/definitions/releaseNotes",
+          "title": "Release notes",
+          "description": "Specifies optional release notes."
+        },
+        "properties": {
+          "type": "array",
+          "title": "Properties",
+          "description": "Provides the ability to document properties in a 
name-value store. This provides flexibility to include data not officially 
supported in the standard without having to use additional namespaces or create 
extensions. Unlike key-value stores, properties support duplicate names, each 
potentially having different values. Property names of interest to the general 
public are encouraged to be registered in the [CycloneDX Property 
Taxonomy](https://github.com/CycloneDX/ [...]
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/property"}
+        },
+        "signature": {
+          "$ref": "#/definitions/signature",
+          "title": "Signature",
+          "description": "Enveloped signature in [JSON Signature Format 
(JSF)](https://cyberphone.github.io/doc/security/jsf.html)."
+        }
+      }
+    },
+    "swid": {
+      "type": "object",
+      "title": "SWID Tag",
+      "description": "Specifies metadata and content for ISO-IEC 19770-2 
Software Identification (SWID) Tags.",
+      "required": [
+        "tagId",
+        "name"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "tagId": {
+          "type": "string",
+          "title": "Tag ID",
+          "description": "Maps to the tagId of a SoftwareIdentity."
+        },
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "Maps to the name of a SoftwareIdentity."
+        },
+        "version": {
+          "type": "string",
+          "title": "Version",
+          "default": "0.0",
+          "description": "Maps to the version of a SoftwareIdentity."
+        },
+        "tagVersion": {
+          "type": "integer",
+          "title": "Tag Version",
+          "default": 0,
+          "description": "Maps to the tagVersion of a SoftwareIdentity."
+        },
+        "patch": {
+          "type": "boolean",
+          "title": "Patch",
+          "default": false,
+          "description": "Maps to the patch of a SoftwareIdentity."
+        },
+        "text": {
+          "title": "Attachment text",
+          "description": "Specifies the metadata and content of the SWID tag.",
+          "$ref": "#/definitions/attachment"
+        },
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "description": "The URL to the SWID file.",
+          "format": "iri-reference"
+        }
+      }
+    },
+    "attachment": {
+      "type": "object",
+      "title": "Attachment",
+      "description": "Specifies the metadata and content for an attachment.",
+      "required": [
+        "content"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "contentType": {
+          "type": "string",
+          "title": "Content-Type",
+          "description": "Specifies the content type of the text. Defaults to 
text/plain if not specified.",
+          "default": "text/plain"
+        },
+        "encoding": {
+          "type": "string",
+          "title": "Encoding",
+          "description": "Specifies the optional encoding the text is 
represented in.",
+          "enum": [
+            "base64"
+          ]
+        },
+        "content": {
+          "type": "string",
+          "title": "Attachment Text",
+          "description": "The attachment data. Proactive controls such as 
input validation and sanitization should be employed to prevent misuse of 
attachment text."
+        }
+      }
+    },
+    "hash": {
+      "type": "object",
+      "title": "Hash Objects",
+      "required": [
+        "alg",
+        "content"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "alg": {
+          "$ref": "#/definitions/hash-alg"
+        },
+        "content": {
+          "$ref": "#/definitions/hash-content"
+        }
+      }
+    },
+    "hash-alg": {
+      "type": "string",
+      "enum": [
+        "MD5",
+        "SHA-1",
+        "SHA-256",
+        "SHA-384",
+        "SHA-512",
+        "SHA3-256",
+        "SHA3-384",
+        "SHA3-512",
+        "BLAKE2b-256",
+        "BLAKE2b-384",
+        "BLAKE2b-512",
+        "BLAKE3"
+      ],
+      "title": "Hash Algorithm"
+    },
+    "hash-content": {
+      "type": "string",
+      "title": "Hash Content (value)",
+      "examples": ["3942447fac867ae5cdb3229b658f4d48"],
+      "pattern": 
"^([a-fA-F0-9]{32}|[a-fA-F0-9]{40}|[a-fA-F0-9]{64}|[a-fA-F0-9]{96}|[a-fA-F0-9]{128})$"
+    },
+    "license": {
+      "type": "object",
+      "title": "License Object",
+      "oneOf": [
+        {
+          "required": ["id"]
+        },
+        {
+          "required": ["name"]
+        }
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "id": {
+          "$ref": "spdx.schema.json",
+          "title": "License ID (SPDX)",
+          "description": "A valid SPDX license ID",
+          "examples": ["Apache-2.0"]
+        },
+        "name": {
+          "type": "string",
+          "title": "License Name",
+          "description": "If SPDX does not define the license used, this field 
may be used to provide the license name",
+          "examples": ["Acme Software License"]
+        },
+        "text": {
+          "title": "License text",
+          "description": "An optional way to include the textual content of a 
license.",
+          "$ref": "#/definitions/attachment"
+        },
+        "url": {
+          "type": "string",
+          "title": "License URL",
+          "description": "The URL to the license file. If specified, a 
'license' externalReference should also be specified for completeness",
+          "examples": ["https://www.apache.org/licenses/LICENSE-2.0.txt";],
+          "format": "iri-reference"
+        }
+      }
+    },
+    "licenseChoice": {
+      "type": "object",
+      "title": "License(s)",
+      "additionalProperties": false,
+      "properties": {
+        "license": {
+          "$ref": "#/definitions/license"
+        },
+        "expression": {
+          "type": "string",
+          "title": "SPDX License Expression",
+          "examples": [
+            "Apache-2.0 AND (MIT OR GPL-2.0-only)",
+            "GPL-3.0-only WITH Classpath-exception-2.0"
+          ]
+        }
+      },
+      "oneOf":[
+        {
+          "required": ["license"]
+        },
+        {
+          "required": ["expression"]
+        }
+      ]
+    },
+    "commit": {
+      "type": "object",
+      "title": "Commit",
+      "description": "Specifies an individual commit",
+      "additionalProperties": false,
+      "properties": {
+        "uid": {
+          "type": "string",
+          "title": "UID",
+          "description": "A unique identifier of the commit. This may be 
version control specific. For example, Subversion uses revision numbers whereas 
git uses commit hashes."
+        },
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "description": "The URL to the commit. This URL will typically point 
to a commit in a version control system.",
+          "format": "iri-reference"
+        },
+        "author": {
+          "title": "Author",
+          "description": "The author who created the changes in the commit",
+          "$ref": "#/definitions/identifiableAction"
+        },
+        "committer": {
+          "title": "Committer",
+          "description": "The person who committed or pushed the commit",
+          "$ref": "#/definitions/identifiableAction"
+        },
+        "message": {
+          "type": "string",
+          "title": "Message",
+          "description": "The text description of the contents of the commit"
+        }
+      }
+    },
+    "patch": {
+      "type": "object",
+      "title": "Patch",
+      "description": "Specifies an individual patch",
+      "required": [
+        "type"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "type": {
+          "type": "string",
+          "enum": [
+            "unofficial",
+            "monkey",
+            "backport",
+            "cherry-pick"
+          ],
+          "title": "Type",
+          "description": "Specifies the purpose for the patch including the 
resolution of defects, security issues, or new behavior or functionality.\n\n* 
__unofficial__ = A patch which is not developed by the creators or maintainers 
of the software being patched. Refer to 
[https://en.wikipedia.org/wiki/Unofficial_patch](https://en.wikipedia.org/wiki/Unofficial_patch)\n*
 __monkey__ = A patch which dynamically modifies runtime behavior. Refer to 
[https://en.wikipedia.org/wiki/Monkey_patch [...]
+        },
+        "diff": {
+          "title": "Diff",
+          "description": "The patch file (or diff) that show changes. Refer to 
[https://en.wikipedia.org/wiki/Diff](https://en.wikipedia.org/wiki/Diff)",
+          "$ref": "#/definitions/diff"
+        },
+        "resolves": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/issue"},
+          "title": "Resolves",
+          "description": "A collection of issues the patch resolves"
+        }
+      }
+    },
+    "diff": {
+      "type": "object",
+      "title": "Diff",
+      "description": "The patch file (or diff) that show changes. Refer to 
https://en.wikipedia.org/wiki/Diff";,
+      "additionalProperties": false,
+      "properties": {
+        "text": {
+          "title": "Diff text",
+          "description": "Specifies the optional text of the diff",
+          "$ref": "#/definitions/attachment"
+        },
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "description": "Specifies the URL to the diff",
+          "format": "iri-reference"
+        }
+      }
+    },
+    "issue": {
+      "type": "object",
+      "title": "Diff",
+      "description": "An individual issue that has been resolved.",
+      "required": [
+        "type"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "type": {
+          "type": "string",
+          "enum": [
+            "defect",
+            "enhancement",
+            "security"
+          ],
+          "title": "Type",
+          "description": "Specifies the type of issue"
+        },
+        "id": {
+          "type": "string",
+          "title": "ID",
+          "description": "The identifier of the issue assigned by the source 
of the issue"
+        },
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of the issue"
+        },
+        "description": {
+          "type": "string",
+          "title": "Description",
+          "description": "A description of the issue"
+        },
+        "source": {
+          "type": "object",
+          "title": "Source",
+          "description": "The source of the issue where it is documented",
+          "additionalProperties": false,
+          "properties": {
+            "name": {
+              "type": "string",
+              "title": "Name",
+              "description": "The name of the source. For example 'National 
Vulnerability Database', 'NVD', and 'Apache'"
+            },
+            "url": {
+              "type": "string",
+              "title": "URL",
+              "description": "The url of the issue documentation as provided 
by the source",
+              "format": "iri-reference"
+            }
+          }
+        },
+        "references": {
+          "type": "array",
+          "items": {
+            "type": "string",
+            "format": "iri-reference"
+          },
+          "title": "References",
+          "description": "A collection of URL's for reference. Multiple URLs 
are allowed.",
+          "examples": ["https://example.com";]
+        }
+      }
+    },
+    "identifiableAction": {
+      "type": "object",
+      "title": "Identifiable Action",
+      "description": "Specifies an individual commit",
+      "additionalProperties": false,
+      "properties": {
+        "timestamp": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Timestamp",
+          "description": "The timestamp in which the action occurred"
+        },
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of the individual who performed the action"
+        },
+        "email": {
+          "type": "string",
+          "format": "idn-email",
+          "title": "E-mail",
+          "description": "The email address of the individual who performed 
the action"
+        }
+      }
+    },
+    "externalReference": {
+      "type": "object",
+      "title": "External Reference",
+      "description": "Specifies an individual external reference",
+      "required": [
+        "url",
+        "type"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "description": "The URL to the external reference",
+          "format": "iri-reference"
+        },
+        "comment": {
+          "type": "string",
+          "title": "Comment",
+          "description": "An optional comment describing the external 
reference"
+        },
+        "type": {
+          "type": "string",
+          "title": "Type",
+          "description": "Specifies the type of external reference. There are 
built-in types to describe common references. If a type does not exist for the 
reference being referred to, use the \"other\" type.",
+          "enum": [
+            "vcs",
+            "issue-tracker",
+            "website",
+            "advisories",
+            "bom",
+            "mailing-list",
+            "social",
+            "chat",
+            "documentation",
+            "support",
+            "distribution",
+            "license",
+            "build-meta",
+            "build-system",
+            "release-notes",
+            "other"
+          ]
+        },
+        "hashes": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/hash"},
+          "title": "Hashes",
+          "description": "The hashes of the external reference (if 
applicable)."
+        }
+      }
+    },
+    "dependency": {
+      "type": "object",
+      "title": "Dependency",
+      "description": "Defines the direct dependencies of a component. 
Components that do not have their own dependencies MUST be declared as empty 
elements within the graph. Components that are not represented in the 
dependency graph MAY have unknown dependencies. It is RECOMMENDED that 
implementations assume this to be opaque and not an indicator of a component 
being dependency-free.",
+      "required": [
+        "ref"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "ref": {
+          "$ref": "#/definitions/refType",
+          "title": "Reference",
+          "description": "References a component by the components bom-ref 
attribute"
+        },
+        "dependsOn": {
+          "type": "array",
+          "uniqueItems": true,
+          "additionalItems": false,
+          "items": {
+            "$ref": "#/definitions/refType"
+          },
+          "title": "Depends On",
+          "description": "The bom-ref identifiers of the components that are 
dependencies of this dependency object."
+        }
+      }
+    },
+    "service": {
+      "type": "object",
+      "title": "Service Object",
+      "required": [
+        "name"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "bom-ref": {
+          "$ref": "#/definitions/refType",
+          "title": "BOM Reference",
+          "description": "An optional identifier which can be used to 
reference the service elsewhere in the BOM. Every bom-ref MUST be unique within 
the BOM."
+        },
+        "provider": {
+          "title": "Provider",
+          "description": "The organization that provides the service.",
+          "$ref": "#/definitions/organizationalEntity"
+        },
+        "group": {
+          "type": "string",
+          "title": "Service Group",
+          "description": "The grouping name, namespace, or identifier. This 
will often be a shortened, single name of the company or project that produced 
the service or domain name. Whitespace and special characters should be 
avoided.",
+          "examples": ["com.acme"]
+        },
+        "name": {
+          "type": "string",
+          "title": "Service Name",
+          "description": "The name of the service. This will often be a 
shortened, single name of the service.",
+          "examples": ["ticker-service"]
+        },
+        "version": {
+          "type": "string",
+          "title": "Service Version",
+          "description": "The service version.",
+          "examples": ["1.0.0"]
+        },
+        "description": {
+          "type": "string",
+          "title": "Service Description",
+          "description": "Specifies a description for the service"
+        },
+        "endpoints": {
+          "type": "array",
+          "items": {
+            "type": "string",
+            "format": "iri-reference"
+          },
+          "title": "Endpoints",
+          "description": "The endpoint URIs of the service. Multiple endpoints 
are allowed.",
+          "examples": ["https://example.com/api/v1/ticker";]
+        },
+        "authenticated": {
+          "type": "boolean",
+          "title": "Authentication Required",
+          "description": "A boolean value indicating if the service requires 
authentication. A value of true indicates the service requires authentication 
prior to use. A value of false indicates the service does not require 
authentication."
+        },
+        "x-trust-boundary": {
+          "type": "boolean",
+          "title": "Crosses Trust Boundary",
+          "description": "A boolean value indicating if use of the service 
crosses a trust zone or boundary. A value of true indicates that by using the 
service, a trust boundary is crossed. A value of false indicates that by using 
the service, a trust boundary is not crossed."
+        },
+        "data": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/dataClassification"},
+          "title": "Data Classification",
+          "description": "Specifies the data classification."
+        },
+        "licenses": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/licenseChoice"},
+          "title": "Component License(s)"
+        },
+        "externalReferences": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/externalReference"},
+          "title": "External References",
+          "description": "External references provide a way to document 
systems, sites, and information that may be relevant but which are not included 
with the BOM."
+        },
+        "services": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/service"},
+          "uniqueItems": true,
+          "title": "Services",
+          "description": "A list of services included or deployed behind the 
parent service. This is not a dependency tree. It provides a way to specify a 
hierarchical representation of service assemblies."
+        },
+        "releaseNotes": {
+          "$ref": "#/definitions/releaseNotes",
+          "title": "Release notes",
+          "description": "Specifies optional release notes."
+        },
+        "properties": {
+          "type": "array",
+          "title": "Properties",
+          "description": "Provides the ability to document properties in a 
name-value store. This provides flexibility to include data not officially 
supported in the standard without having to use additional namespaces or create 
extensions. Unlike key-value stores, properties support duplicate names, each 
potentially having different values. Property names of interest to the general 
public are encouraged to be registered in the [CycloneDX Property 
Taxonomy](https://github.com/CycloneDX/ [...]
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/property"}
+        },
+        "signature": {
+          "$ref": "#/definitions/signature",
+          "title": "Signature",
+          "description": "Enveloped signature in [JSON Signature Format 
(JSF)](https://cyberphone.github.io/doc/security/jsf.html)."
+        }
+      }
+    },
+    "dataClassification": {
+      "type": "object",
+      "title": "Hash Objects",
+      "required": [
+        "flow",
+        "classification"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "flow": {
+          "$ref": "#/definitions/dataFlow",
+          "title": "Directional Flow",
+          "description": "Specifies the flow direction of the data. Direction 
is relative to the service. Inbound flow states that data enters the service. 
Outbound flow states that data leaves the service. Bi-directional states that 
data flows both ways, and unknown states that the direction is not known."
+        },
+        "classification": {
+          "type": "string",
+          "title": "Classification",
+          "description": "Data classification tags data according to its type, 
sensitivity, and value if altered, stolen, or destroyed."
+        }
+      }
+    },
+    "dataFlow": {
+      "type": "string",
+      "enum": [
+        "inbound",
+        "outbound",
+        "bi-directional",
+        "unknown"
+      ],
+      "title": "Data flow direction",
+      "description": "Specifies the flow direction of the data. Direction is 
relative to the service. Inbound flow states that data enters the service. 
Outbound flow states that data leaves the service. Bi-directional states that 
data flows both ways, and unknown states that the direction is not known."
+    },
+
+    "copyright": {
+      "type": "object",
+      "title": "Copyright",
+      "required": [
+        "text"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "text": {
+          "type": "string",
+          "title": "Copyright Text"
+        }
+      }
+    },
+
+    "componentEvidence": {
+      "type": "object",
+      "title": "Evidence",
+      "description": "Provides the ability to document evidence collected 
through various forms of extraction or analysis.",
+      "additionalProperties": false,
+      "properties": {
+        "licenses": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/licenseChoice"},
+          "title": "Component License(s)"
+        },
+        "copyright": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/copyright"},
+          "title": "Copyright"
+        }
+      }
+    },
+    "compositions": {
+      "type": "object",
+      "title": "Compositions",
+      "required": [
+        "aggregate"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "aggregate": {
+          "$ref": "#/definitions/aggregateType",
+          "title": "Aggregate",
+          "description": "Specifies an aggregate type that describe how 
complete a relationship is."
+        },
+        "assemblies": {
+          "type": "array",
+          "uniqueItems": true,
+          "items": {
+            "type": "string"
+          },
+          "title": "BOM references",
+          "description": "The bom-ref identifiers of the components or 
services being described. Assemblies refer to nested relationships whereby a 
constituent part may include other constituent parts. References do not cascade 
to child parts. References are explicit for the specified constituent part 
only."
+        },
+        "dependencies": {
+          "type": "array",
+          "uniqueItems": true,
+          "items": {
+            "type": "string"
+          },
+          "title": "BOM references",
+          "description": "The bom-ref identifiers of the components or 
services being described. Dependencies refer to a relationship whereby an 
independent constituent part requires another independent constituent part. 
References do not cascade to transitive dependencies. References are explicit 
for the specified dependency only."
+        },
+        "signature": {
+          "$ref": "#/definitions/signature",
+          "title": "Signature",
+          "description": "Enveloped signature in [JSON Signature Format 
(JSF)](https://cyberphone.github.io/doc/security/jsf.html)."
+        }
+      }
+    },
+    "aggregateType": {
+      "type": "string",
+      "default": "not_specified",
+      "enum": [
+        "complete",
+        "incomplete",
+        "incomplete_first_party_only",
+        "incomplete_third_party_only",
+        "unknown",
+        "not_specified"
+      ]
+    },
+    "property": {
+      "type": "object",
+      "title": "Lightweight name-value pair",
+      "properties": {
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of the property. Duplicate names are 
allowed, each potentially having a different value."
+        },
+        "value": {
+          "type": "string",
+          "title": "Value",
+          "description": "The value of the property."
+        }
+      }
+    },
+    "localeType": {
+      "type": "string",
+      "pattern": "^([a-z]{2})(-[A-Z]{2})?$",
+      "title": "Locale",
+      "description": "Defines a syntax for representing two character language 
code (ISO-639) followed by an optional two character country code. The language 
code MUST be lower case. If the country code is specified, the country code 
MUST be upper case. The language code and country code MUST be separated by a 
minus sign. Examples: en, en-US, fr, fr-CA"
+    },
+    "releaseType": {
+      "type": "string",
+      "examples": [
+        "major",
+        "minor",
+        "patch",
+        "pre-release",
+        "internal"
+      ],
+      "description": "The software versioning type. It is RECOMMENDED that the 
release type use one of 'major', 'minor', 'patch', 'pre-release', or 
'internal'. Representing all possible software release types is not practical, 
so standardizing on the recommended values, whenever possible, is strongly 
encouraged.\n\n* __major__ = A major release may contain significant changes or 
may introduce breaking changes.\n* __minor__ = A minor release, also known as 
an update, may contain a smaller [...]
+    },
+    "note": {
+      "type": "object",
+      "title": "Note",
+      "description": "A note containing the locale and content.",
+      "required": [
+        "text"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "locale": {
+          "$ref": "#/definitions/localeType",
+          "title": "Locale",
+          "description": "The ISO-639 (or higher) language code and optional 
ISO-3166 (or higher) country code. Examples include: \"en\", \"en-US\", \"fr\" 
and \"fr-CA\""
+        },
+        "text": {
+          "title": "Release note content",
+          "description": "Specifies the full content of the release note.",
+          "$ref": "#/definitions/attachment"
+        }
+      }
+    },
+    "releaseNotes": {
+      "type": "object",
+      "title": "Release notes",
+      "required": [
+        "type"
+      ],
+      "additionalProperties": false,
+      "properties": {
+        "type": {
+          "$ref": "#/definitions/releaseType",
+          "title": "Type",
+          "description": "The software versioning type the release note 
describes."
+        },
+        "title": {
+          "type": "string",
+          "title": "Title",
+          "description": "The title of the release."
+        },
+        "featuredImage": {
+          "type": "string",
+          "format": "iri-reference",
+          "title": "Featured image",
+          "description": "The URL to an image that may be prominently 
displayed with the release note."
+        },
+        "socialImage": {
+          "type": "string",
+          "format": "iri-reference",
+          "title": "Social image",
+          "description": "The URL to an image that may be used in messaging on 
social media platforms."
+        },
+        "description": {
+          "type": "string",
+          "title": "Description",
+          "description": "A short description of the release."
+        },
+        "timestamp": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Timestamp",
+          "description": "The date and time (timestamp) when the release note 
was created."
+        },
+        "aliases": {
+          "type": "array",
+          "items": {
+            "type": "string"
+          },
+          "title": "Aliases",
+          "description": "One or more alternate names the release may be 
referred to. This may include unofficial terms used by development and 
marketing teams (e.g. code names)."
+        },
+        "tags": {
+          "type": "array",
+          "items": {
+            "type": "string"
+          },
+          "title": "Tags",
+          "description": "One or more tags that may aid in search or retrieval 
of the release note."
+        },
+        "resolves": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/issue"},
+          "title": "Resolves",
+          "description": "A collection of issues that have been resolved."
+        },
+        "notes": {
+          "type": "array",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/note"},
+          "title": "Notes",
+          "description": "Zero or more release notes containing the locale and 
content. Multiple note objects may be specified to support release notes in a 
wide variety of languages."
+        },
+        "properties": {
+          "type": "array",
+          "title": "Properties",
+          "description": "Provides the ability to document properties in a 
name-value store. This provides flexibility to include data not officially 
supported in the standard without having to use additional namespaces or create 
extensions. Unlike key-value stores, properties support duplicate names, each 
potentially having different values. Property names of interest to the general 
public are encouraged to be registered in the [CycloneDX Property 
Taxonomy](https://github.com/CycloneDX/ [...]
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/property"}
+        }
+      }
+    },
+    "advisory": {
+      "type": "object",
+      "title": "Advisory",
+      "description": "Title and location where advisory information can be 
obtained. An advisory is a notification of a threat to a component, service, or 
system.",
+      "required": ["url"],
+      "additionalProperties": false,
+      "properties": {
+        "title": {
+          "type": "string",
+          "title": "Title",
+          "description": "An optional name of the advisory."
+        },
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "format": "iri-reference",
+          "description": "Location where the advisory can be obtained."
+        }
+      }
+    },
+    "cwe": {
+      "type": "integer",
+      "minimum": 1,
+      "title": "CWE",
+      "description": "Integer representation of a Common Weaknesses 
Enumerations (CWE). For example 399 (of 
https://cwe.mitre.org/data/definitions/399.html)"
+    },
+    "severity": {
+      "type": "string",
+      "title": "Severity",
+      "description": "Textual representation of the severity of the 
vulnerability adopted by the analysis method. If the analysis method uses 
values other than what is provided, the user is expected to translate 
appropriately.",
+      "enum": [
+        "critical",
+        "high",
+        "medium",
+        "low",
+        "info",
+        "none",
+        "unknown"
+      ]
+    },
+    "scoreMethod": {
+      "type": "string",
+      "title": "Method",
+      "description": "Specifies the severity or risk scoring methodology or 
standard used.\n\n* CVSSv2 - [Common Vulnerability Scoring System 
v2](https://www.first.org/cvss/v2/)\n* CVSSv3 - [Common Vulnerability Scoring 
System v3](https://www.first.org/cvss/v3-0/)\n* CVSSv31 - [Common Vulnerability 
Scoring System v3.1](https://www.first.org/cvss/v3-1/)\n* OWASP - [OWASP Risk 
Rating 
Methodology](https://owasp.org/www-community/OWASP_Risk_Rating_Methodology)",
+      "enum": [
+        "CVSSv2",
+        "CVSSv3",
+        "CVSSv31",
+        "OWASP",
+        "other"
+      ]
+    },
+    "impactAnalysisState": {
+      "type": "string",
+      "title": "Impact Analysis State",
+      "description": "Declares the current state of an occurrence of a 
vulnerability, after automated or manual analysis. \n\n* __resolved__ = the 
vulnerability has been remediated. \n* __resolved\\_with\\_pedigree__ = the 
vulnerability has been remediated and evidence of the changes are provided in 
the affected components pedigree containing verifiable commit history and/or 
diff(s). \n* __exploitable__ = the vulnerability may be directly or indirectly 
exploitable. \n* __in\\_triage__ =  [...]
+      "enum": [
+        "resolved",
+        "resolved_with_pedigree",
+        "exploitable",
+        "in_triage",
+        "false_positive",
+        "not_affected"
+      ]
+    },
+    "impactAnalysisJustification": {
+      "type": "string",
+      "title": "Impact Analysis Justification",
+      "description": "The rationale of why the impact analysis state was 
asserted. \n\n* __code\\_not\\_present__ = the code has been removed or 
tree-shaked. \n* __code\\_not\\_reachable__ = the vulnerable code is not 
invoked at runtime. \n* __requires\\_configuration__ = exploitability requires 
a configurable option to be set/unset. \n* __requires\\_dependency__ = 
exploitability requires a dependency that is not present. \n* 
__requires\\_environment__ = exploitability requires a certain [...]
+      "enum": [
+        "code_not_present",
+        "code_not_reachable",
+        "requires_configuration",
+        "requires_dependency",
+        "requires_environment",
+        "protected_by_compiler",
+        "protected_at_runtime",
+        "protected_at_perimeter",
+        "protected_by_mitigating_control"
+      ]
+    },
+    "rating": {
+      "type": "object",
+      "title": "Rating",
+      "description": "Defines the severity or risk ratings of a 
vulnerability.",
+      "additionalProperties": false,
+      "properties": {
+        "source": {
+          "$ref": "#/definitions/vulnerabilitySource",
+          "description": "The source that calculated the severity or risk 
rating of the vulnerability."
+        },
+        "score": {
+          "type": "number",
+          "title": "Score",
+          "description": "The numerical score of the rating."
+        },
+        "severity": {
+          "$ref": "#/definitions/severity",
+          "description": "Textual representation of the severity that 
corresponds to the numerical score of the rating."
+        },
+        "method": {
+          "$ref": "#/definitions/scoreMethod"
+        },
+        "vector": {
+          "type": "string",
+          "title": "Vector",
+          "description": "Textual representation of the metric values used to 
score the vulnerability"
+        },
+        "justification": {
+          "type": "string",
+          "title": "Justification",
+          "description": "An optional reason for rating the vulnerability as 
it was"
+        }
+      }
+    },
+    "vulnerabilitySource": {
+      "type": "object",
+      "title": "Source",
+      "description": "The source of vulnerability information. This is often 
the organization that published the vulnerability.",
+      "additionalProperties": false,
+      "properties": {
+        "url": {
+          "type": "string",
+          "title": "URL",
+          "description": "The url of the vulnerability documentation as 
provided by the source.",
+          "examples": [
+            "https://nvd.nist.gov/vuln/detail/CVE-2021-39182";
+          ]
+        },
+        "name": {
+          "type": "string",
+          "title": "Name",
+          "description": "The name of the source.",
+          "examples": [
+            "NVD",
+            "National Vulnerability Database",
+            "OSS Index",
+            "VulnDB",
+            "GitHub Advisories"
+          ]
+        }
+      }
+    },
+    "vulnerability": {
+      "type": "object",
+      "title": "Vulnerability",
+      "description": "Defines a weakness in an component or service that could 
be exploited or triggered by a threat source.",
+      "additionalProperties": false,
+      "properties": {
+        "bom-ref": {
+          "$ref": "#/definitions/refType",
+          "title": "BOM Reference",
+          "description": "An optional identifier which can be used to 
reference the vulnerability elsewhere in the BOM. Every bom-ref MUST be unique 
within the BOM."
+        },
+        "id": {
+          "type": "string",
+          "title": "ID",
+          "description": "The identifier that uniquely identifies the 
vulnerability.",
+          "examples": [
+            "CVE-2021-39182",
+            "GHSA-35m5-8cvj-8783",
+            "SNYK-PYTHON-ENROCRYPT-1912876"
+          ]
+        },
+        "source": {
+          "$ref": "#/definitions/vulnerabilitySource",
+          "description": "The source that published the vulnerability."
+        },
+        "references": {
+          "type": "array",
+          "title": "References",
+          "description": "Zero or more pointers to vulnerabilities that are 
the equivalent of the vulnerability specified. Often times, the same 
vulnerability may exist in multiple sources of vulnerability intelligence, but 
have different identifiers. References provide a way to correlate 
vulnerabilities across multiple sources of vulnerability intelligence.",
+          "additionalItems": false,
+          "items": {
+            "required": [
+              "id",
+              "source"
+            ],
+            "additionalProperties": false,
+            "properties": {
+              "id": {
+                "type": "string",
+                "title": "ID",
+                "description": "An identifier that uniquely identifies the 
vulnerability.",
+                "examples": [
+                  "CVE-2021-39182",
+                  "GHSA-35m5-8cvj-8783",
+                  "SNYK-PYTHON-ENROCRYPT-1912876"
+                ]
+              },
+              "source": {
+                "$ref": "#/definitions/vulnerabilitySource",
+                "description": "The source that published the vulnerability."
+              }
+            }
+          }
+        },
+        "ratings": {
+          "type": "array",
+          "title": "Ratings",
+          "description": "List of vulnerability ratings",
+          "additionalItems": false,
+          "items": {
+            "$ref": "#/definitions/rating"
+          }
+        },
+        "cwes": {
+          "type": "array",
+          "title": "CWEs",
+          "description": "List of Common Weaknesses Enumerations (CWEs) codes 
that describes this vulnerability. For example 399 (of 
https://cwe.mitre.org/data/definitions/399.html)",
+          "examples": [399],
+          "additionalItems": false,
+          "items": {
+            "$ref": "#/definitions/cwe"
+          }
+        },
+        "description": {
+          "type": "string",
+          "title": "Description",
+          "description": "A description of the vulnerability as provided by 
the source."
+        },
+        "detail": {
+          "type": "string",
+          "title": "Details",
+          "description": "If available, an in-depth description of the 
vulnerability as provided by the source organization. Details often include 
examples, proof-of-concepts, and other information useful in understanding root 
cause."
+        },
+        "recommendation": {
+          "type": "string",
+          "title": "Details",
+          "description": "Recommendations of how the vulnerability can be 
remediated or mitigated."
+        },
+        "advisories": {
+          "type": "array",
+          "title": "Advisories",
+          "description": "Published advisories of the vulnerability if 
provided.",
+          "additionalItems": false,
+          "items": {
+            "$ref": "#/definitions/advisory"
+          }
+        },
+        "created": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Created",
+          "description": "The date and time (timestamp) when the vulnerability 
record was created in the vulnerability database."
+        },
+        "published": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Published",
+          "description": "The date and time (timestamp) when the vulnerability 
record was first published."
+        },
+        "updated": {
+          "type": "string",
+          "format": "date-time",
+          "title": "Updated",
+          "description": "The date and time (timestamp) when the vulnerability 
record was last updated."
+        },
+        "credits": {
+          "type": "object",
+          "title": "Credits",
+          "description": "Individuals or organizations credited with the 
discovery of the vulnerability.",
+          "additionalProperties": false,
+          "properties": {
+            "organizations": {
+              "type": "array",
+              "title": "Organizations",
+              "description": "The organizations credited with vulnerability 
discovery.",
+              "additionalItems": false,
+              "items": {
+                "$ref": "#/definitions/organizationalEntity"
+              }
+            },
+            "individuals": {
+              "type": "array",
+              "title": "Individuals",
+              "description": "The individuals, not associated with 
organizations, that are credited with vulnerability discovery.",
+              "additionalItems": false,
+              "items": {
+                "$ref": "#/definitions/organizationalContact"
+              }
+            }
+          }
+        },
+        "tools": {
+          "type": "array",
+          "title": "Creation Tools",
+          "description": "The tool(s) used to identify, confirm, or score the 
vulnerability.",
+          "additionalItems": false,
+          "items": {"$ref": "#/definitions/tool"}
+        },
+        "analysis": {
+          "type": "object",
+          "title": "Impact Analysis",
+          "description": "An assessment of the impact and exploitability of 
the vulnerability.",
+          "additionalProperties": false,
+          "properties": {
+            "state": {
+              "$ref": "#/definitions/impactAnalysisState"
+            },
+            "justification": {
+              "$ref": "#/definitions/impactAnalysisJustification"
+            },
+            "response": {
+              "type": "array",
+              "title": "Response",
+              "description": "A response to the vulnerability by the 
manufacturer, supplier, or project responsible for the affected component or 
service. More than one response is allowed. Responses are strongly encouraged 
for vulnerabilities where the analysis state is exploitable.",
+              "additionalItems": false,
+              "items": {
+                "type": "string",
+                "enum": [
+                  "can_not_fix",
+                  "will_not_fix",
+                  "update",
+                  "rollback",
+                  "workaround_available"
+                ]
+              }
+            },
+            "detail": {
+              "type": "string",
+              "title": "Detail",
+              "description": "Detailed description of the impact including 
methods used during assessment. If a vulnerability is not exploitable, this 
field should include specific details on why the component or service is not 
impacted by this vulnerability."
+            }
+          }
+        },
+        "affects": {
+          "type": "array",
+          "uniqueItems": true,
+          "additionalItems": false,
+          "items": {
+            "required": [
+              "ref"
+            ],
+            "additionalProperties": false,
+            "properties": {
+              "ref": {
+                "$ref": "#/definitions/refType",
+                "title": "Reference",
+                "description": "References a component or service by the 
objects bom-ref"
+              },
+              "versions": {
+                "type": "array",
+                "title": "Versions",
+                "description": "Zero or more individual versions or range of 
versions.",
+                "additionalItems": false,
+                "items": {
+                  "oneOf": [
+                    {
+                      "required": ["version"]
+                    },
+                    {
+                      "required": ["range"]
+                    }
+                  ],
+                  "additionalProperties": false,
+                  "properties": {
+                    "version": {
+                      "description": "A single version of a component or 
service.",
+                      "$ref": "#/definitions/version"
+                    },
+                    "range": {
+                      "description": "A version range specified in Package URL 
Version Range syntax (vers) which is defined at 
https://github.com/package-url/purl-spec/VERSION-RANGE-SPEC.rst";,
+                      "$ref": "#/definitions/version"
+                    },
+                    "status": {
+                      "description": "The vulnerability status for the version 
or range of versions.",
+                      "$ref": "#/definitions/affectedStatus",
+                      "default": "affected"
+                    }
+                  }
+                }
+              }
+            }
+          },
+          "title": "Affects",
+          "description": "The components or services that are affected by the 
vulnerability."
+        },
+        "properties": {
+          "type": "array",
+          "title": "Properties",
+          "description": "Provides the ability to document properties in a 
name-value store. This provides flexibility to include data not officially 
supported in the standard without having to use additional namespaces or create 
extensions. Unlike key-value stores, properties support duplicate names, each 
potentially having different values. Property names of interest to the general 
public are encouraged to be registered in the [CycloneDX Property 
Taxonomy](https://github.com/CycloneDX/ [...]
+          "additionalItems": false,
+          "items": {
+            "$ref": "#/definitions/property"
+          }
+        }
+      }
+    },
+    "affectedStatus": {
+      "description": "The vulnerability status of a given version or range of 
versions of a product. The statuses 'affected' and 'unaffected' indicate that 
the version is affected or unaffected by the vulnerability. The status 
'unknown' indicates that it is unknown or unspecified whether the given version 
is affected. There can be many reasons for an 'unknown' status, including that 
an investigation has not been undertaken or that a vendor has not disclosed the 
status.",
+      "type": "string",
+      "enum": [
+        "affected",
+        "unaffected",
+        "unknown"
+      ]
+    },
+    "version": {
+      "description": "A single version of a component or service.",
+      "type": "string",
+      "minLength": 1,
+      "maxLength": 1024
+    },
+    "range": {
+      "description": "A version range specified in Package URL Version Range 
syntax (vers) which is defined at 
https://github.com/package-url/purl-spec/VERSION-RANGE-SPEC.rst";,
+      "type": "string",
+      "minLength": 1,
+      "maxLength": 1024
+    },
+    "signature": {
+      "$ref": "jsf-0.82.schema.json#/definitions/signature",
+      "title": "Signature",
+      "description": "Enveloped signature in [JSON Signature Format 
(JSF)](https://cyberphone.github.io/doc/security/jsf.html)."
+    }
+  }
+}
diff --git a/plugins/vex/schema/vex-input.schema.json 
b/plugins/vex/schema/vex-input.schema.json
new file mode 100644
index 000000000..7790632dc
--- /dev/null
+++ b/plugins/vex/schema/vex-input.schema.json
@@ -0,0 +1,35 @@
+{
+  "$schema": "http://json-schema.org/draft-07/schema#";,
+  "type": "array",
+  "title": "CycloneDX Software Bill of Materials Standard",
+  "items": {
+    "type": "object",
+    "required": [
+      "ids",
+      "versions",
+      "jars",
+      "analysis"
+    ],
+    "additionalProperties": false,
+    "properties": {
+      "ids": {
+        "type": "array",
+        "items": {
+          "type": "string"
+        }
+      },
+      "jars": {
+        "type": "array",
+        "items": {
+          "type": "string"
+        }
+      },
+      "versions": {
+        "type": "string"
+      },
+      "analysis": {
+        "$ref": 
"file:bom-1.4.schema.json#/definitions/vulnerability/properties/analysis"
+      }
+    }
+  }
+}
diff --git a/plugins/vex/vex.py b/plugins/vex/vex.py
new file mode 100644
index 000000000..62a8097c3
--- /dev/null
+++ b/plugins/vex/vex.py
@@ -0,0 +1,70 @@
+import os
+import sys
+import json
+from re import sub
+from uuid import UUID, uuid5
+from hashlib import md5
+from pelican import signals
+from jsonschema import validate
+import jsonref
+
+def pelican_init(pelicanobj):
+    with open('vex-input.json', 'r') as input:
+        vex_input = json.loads(input.read())
+
+    # Our own input format - feel free to change as needed,
+    # but remember to also update this plugin and the templates in
+    # /themes/solr/templates/security.html
+    with open('plugins/vex/schema/vex-input.schema.json', 'r') as file:
+        from pathlib import Path
+        loaded = jsonref.load(file, 
base_uri=Path('./plugins/vex/schema/base').absolute().as_uri())
+        validate(vex_input, loaded)
+
+    ns = UUID('4f298c2c-eb7c-4968-a827-1482b1e5c095')
+    ref = str(uuid5(ns, md5(json.dumps(vex_input).encode()).hexdigest()))
+
+    vulns = []
+    for v in vex_input:
+        for id in v['ids']:
+            vulns.append({
+                "id": id,
+                "analysis": v['analysis'],
+                "affects": [
+                    {
+                        "ref": ref
+                    }
+                ]
+            })
+    vex = {
+        # we're not committing to doing exactly what CycloneDX comes
+        # up with, but it seems like one of the promising formats, so
+        # let's align with it as much as possible:
+        "bomFormat": "CycloneDX",
+        "specVersion": "1.4",
+        "version": 1,
+        "metadata": {
+            "component": {
+                "name": "solr",
+                "version": "SNAPSHOT",
+                "type": "application",
+                "bom-ref": ref
+            }
+        },
+        "vulnerabilities": vulns
+    }
+    # From https://github.com/CycloneDX/specification/tree/master/schema
+    with open('plugins/vex/schema/bom-1.4.schema.json', 'r') as schema:
+        validate(vex, json.load(schema))
+
+    os.makedirs('output', exist_ok=True)
+    with open('output/solr.vex.json', 'w') as out:
+        json.dump(vex, out, indent=2)
+
+def generator_initialized(generator):
+    generator.context["vex"] = json.load(open('vex-input.json'))
+    generator.context["sub"] = sub
+
+def register():
+    """Plugin registration"""
+    signals.initialized.connect(pelican_init)
+    signals.generator_init.connect(generator_initialized)
diff --git a/requirements.txt b/requirements.txt
index 75ec2e7a4..814be3809 100644
--- a/requirements.txt
+++ b/requirements.txt
@@ -5,6 +5,9 @@ checksumdir~=1.2.0
 # Pelican plugins
 mdx-include~=1.4.1
 beautifulsoup4~=4.9.3
+# Dependencies of the vex plugin
+jsonschema~=4.17.3
+jsonref~=1.0.1
 
 # Dev tools
 invoke~=1.5.0
diff --git a/themes/solr/templates/security.html 
b/themes/solr/templates/security.html
index bbb55e9d7..1c465737a 100644
--- a/themes/solr/templates/security.html
+++ b/themes/solr/templates/security.html
@@ -16,6 +16,9 @@
   <h1 id="solr-news">Solr<sup>™</sup> Security News<a class="headerlink" 
href="#solr-news" title="Permanent link">¶</a></h1>
   {{page.content}}
 
+  <h1 id="recent-cve-reports-for-apache-solr">Recent CVE reports for Apache 
Solr</h1>
+  <p>Below is a list of already announced CVE vulnerabilities. These are also 
available as an <a href="/feeds/solr/security.atom.xml">ATOM feed</a>:</p>
+
     <table>
         <tr>
             <th width="130">CVE#</th>
@@ -38,5 +41,38 @@
   {{article.content}}
   <hr/>
   {% endfor %}
+  <h1 id="cve-reports-for-apache-solr-dependencies">CVE reports for Apache 
Solr dependencies</h1>
+  <p>Below is a list of CVE vulnerabilities in Apache Solr dependencies, and 
the state of their applicability to Solr.</p>
+  <p>We are currently experimenting with providing this information in a <a 
href="#vex">machine-readable VEX format</a> and encourage you to 
participate.</p>
+    <table>
+      <tr>
+        <th>id</th>
+        <th>versions</th>
+        <th>jars</th>
+        <th>state</th>
+        <th>detail</th>
+      </tr>
+      {# CVE's that do affect Solr have their own advisory page above #}
+      {% for v in (vex | selectattr("analysis.state", "ne", "exploitable")) %}
+      <tr>
+        <td>
+          {% for id in v.ids %}
+            {% if id.startswith('CVE') %}<a 
href="https://nvd.nist.gov/vuln/detail/{{ id }}">{{ id }}</a>{% else %}{{ id 
}}{% endif %}
+            {%- if not loop.last %}, {% endif %}
+          {% endfor %}
+        </td>
+        <td>
+          {{ v.versions }}
+        </td>
+        <td>
+          {% for jar in v.jars %}
+            {{ jar }}{% if not loop.last %}, {% endif %}
+          {% endfor %}
+        </td>
+        <td>{{ v.analysis.state.replace('_', ' ') }}</td>
+        <td>{{ sub("(https://.*?)([.;]\s)", "<a href=\"\\1\">\\1</a>\\2", 
v.analysis.detail) }}</td>
+      </tr>
+      {% endfor %}
+    </table>
 </div>
 {% endblock content_inner %}
diff --git a/vex-input.json b/vex-input.json
new file mode 100644
index 000000000..9e829d82c
--- /dev/null
+++ b/vex-input.json
@@ -0,0 +1,469 @@
+[
+  {
+    "ids": [
+      "CVE-2022-33980"
+    ],
+    "versions": "< 9.1",
+    "jars": [
+      "commons-configuration2-2.7.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr uses commons-configuration2 for \"hadoop-auth\" only 
(for Kerberos). It is only used for loading Hadoop configuration files that 
would only ever be provided by trusted administrators, not externally 
(untrusted)."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2022-42889"
+    ],
+    "versions": "< 9.1",
+    "jars": [
+      "commons-text-1.9.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr uses commons-text directly 
(StringEscapeUtils.escapeEcmaScript) in LoadAdminUiServlet that is not 
vulnerable. Solr also has a \"hadoop-auth\" module that uses Apache Hadoop 
which uses commons-text through commons-configuration2. For Solr, the concern 
is limited to loading Hadoop configuration files that would only ever be 
provided by trusted administrators, not externally (untrusted)."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2022-25168"
+    ],
+    "versions": "< 9.1",
+    "jars": [
+      "hadoop-common-3.2.2.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "The vulnerable code won't be used by Solr because Solr only 
is only using HDFS as a client."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2021-44832"
+    ],
+    "versions": "7.4-8.11.1",
+    "jars": [
+      "log4j-core-2.14.1.jar",
+      "log4j-core-2.16.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr's default log configuration doesn't use JDBCAppender and 
we don't imagine a user would want to use it or other obscure appenders."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2021-45105",
+      "CVE-2021-45046"
+    ],
+    "versions": "7.4-8.11.1",
+    "jars": [
+      "log4j-core-2.14.1.jar",
+      "log4j-core-2.16.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "The MDC data used by Solr are for the collection, shard, 
replica, core and node names, and a potential trace id, which are all 
sanitized. Furthermore, Solr's default log configuration doesn't use 
double-dollar-sign and we don't imagine a user would want to do that."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2020-13955"
+    ],
+    "versions": "8.1.0- today",
+    "jars": [
+      "avatica-core-1.13.0.jar",
+      "calcite-core-1.18.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr's SQL adapter does not use the vulnerable class 
\"HttpUtils\". Calcite only used it to talk to Druid or Splunk."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-10237"
+    ],
+    "versions": "5.4.0-today",
+    "jars": [
+      "carrot2-guava-18.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only used with the Carrot2 clustering engine."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2014-0114"
+    ],
+    "versions": "4.9.0-7.5.0",
+    "jars": [
+      "commons-beanutils-1.8.3.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "This is only used at compile time and it cannot be used to 
attack Solr. Since it is generally unnecessary, the dependency has been removed 
as of 7.5.0. See SOLR-12617."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2019-10086"
+    ],
+    "versions": "8.0.0-8.3.0",
+    "jars": [
+      "commons-beanutils-1.9.3.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "While commons-beanutils was removed in 7.5, it was added back 
in 8.0 in error and removed again in 8.3. The vulnerable class was not used in 
any Solr code path. This jar remains a dependency of both Velocity and 
hadoop-common, but Solr does not use it in our implementations."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2012-2098",
+      "CVE-2018-1324",
+      "CVE-2018-11771"
+    ],
+    "versions": "4.6.0-today",
+    "jars": [
+      "commons-compress (only as part of Ant 1.8.2)"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only used in test framework and at build time."
+    }
+  },
+  {
+    "ids": [
+      "CVE-"
+    ],
+    "versions": "4.6.0-today",
+    "jars": [
+      "derby-10.9.1.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Used only in DataImportHandler tests and example 
implementation, which should not be used in production."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-1000632"
+    ],
+    "versions": "4.6.0-today",
+    "jars": [
+      "dom4j-1.6.1.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only used in Solr tests."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-10237"
+    ],
+    "versions": "4.6.0-today",
+    "jars": [
+      "guava-*.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only used in tests."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2017-15718"
+    ],
+    "versions": "6.6.1-7.6.0",
+    "jars": [
+      "hadoop-auth-2.7.4.jar",
+      "hadoop-hdfs-2.7.4.jar (all Hadoop)"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Does not impact Solr because Solr uses Hadoop as a client 
library."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2017-14952"
+    ],
+    "versions": "6.0.0-7.5.0",
+    "jars": [
+      "icu4j-56.1.jar",
+      "icu4j-59.1.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Issue applies only to the C++ release of ICU and not ICU4J, 
which is what Lucene uses. ICU4J is at v63.2 as of Lucene/Solr 7.6.0"
+    }
+  },
+  {
+    "ids": [
+      "CVE-2017-15095",
+      "CVE-2017-17485",
+      "CVE-2017-7525",
+      "CVE-2018-5968",
+      "CVE-2018-7489",
+      "CVE-2019-12086",
+      "CVE-2019-12384",
+      "CVE-2018-12814",
+      "CVE-2019-14379",
+      "CVE-2019-14439",
+      "CVE-2020-35490",
+      "CVE-2020-35491",
+      "CVE-2021-20190",
+      "CVE-2019-14540",
+      "CVE-2019-16335"
+    ],
+    "versions": "4.7.0-today",
+    "jars": [
+      "jackson-databind-*.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "These CVEs, and most of the known jackson-databind CVEs since 
2017, are all related to problematic 'gadgets' that could be exploited during 
deserialization of untrusted data. The Jackson developers described 4 
conditions that must be met in order for a problematic gadget to be exploited. 
See 
https://medium.com/@cowtowncoder/on-jackson-cves-dont-panic-here-is-what-you-need-to-know-54cd0d6e8062.
 Solr's use of jackson-databind does not meet 1 of the 4 conditions described w 
[...]
+    }
+  },
+  {
+    "ids": [
+      "CVE-2019-10241",
+      "CVE-2019-10247"
+    ],
+    "versions": "7.7.0-8.2",
+    "jars": [
+      "jetty-9.4.14"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr upgraded to Jetty 9.4.19 for the 8.2 release. 
Additionally, the path to exploit these vulnerabilities was fixed in 8.1 and 
7.7.2. Earlier versions can manually patch their configurations as described in 
SOLR-13409."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2020-27218"
+    ],
+    "versions": "7.3.0-8.8.0",
+    "jars": [
+      "jetty-9.4.0 to 9.4.34"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only exploitable through use of Jetty's GzipHandler, which is 
only implemented in Embedded Solr Server."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2020-27223"
+    ],
+    "versions": "7.3.0-present",
+    "jars": [
+      "jetty-9.4.6 to 9.4.36"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only exploitable if Solr's webapp directory is deployed as a 
symlink, which is not Solr's default."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2021-33813"
+    ],
+    "versions": "to present",
+    "jars": [
+      "jdom-*.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "JDOM is only used in Solr Cell, which should not be used in 
production which makes the vulnerability unexploitable. It is a dependency of 
Apache Tika, which has analyzed the issue and determined the vulnerability is 
limited to two libraries not commonly used in search applications, see 
TIKA-3488 for details. Since Tika should be used outside of Solr, use a version 
of Tika which updates the affected libraries if concerned about exposure to 
this issue."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-1000056"
+    ],
+    "versions": "4.6.0-7.6.0",
+    "jars": [
+      "junit-4.10.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "JUnit only used in tests; CVE only refers to a Jenkins plugin 
not used by Solr."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2014-7940",
+      "CVE-2016-6293",
+      "CVE-2016-7415",
+      "CVE-2017-14952",
+      "CVE-2017-17484",
+      "CVE-2017-7867",
+      "CVE-2017-7868"
+    ],
+    "versions": "7.3.1",
+    "jars": [
+      "lucene-analyzers-icu-7.3.1.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "All of these issues apply to the C++ release of ICU and not 
ICU4J, which is what Lucene uses."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2019-16869"
+    ],
+    "versions": "8.2-8.3",
+    "jars": [
+      "netty-all-4.1.29.Final.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "This is not included in Solr but is a dependency of ZooKeeper 
3.5.5. The version was upgraded in ZooKeeper 3.5.6, included with Solr 8.3. The 
specific classes mentioned in the CVE are not used in Solr (nor in ZooKeeper as 
far as the Solr community can determine)."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2017-14868",
+      "CVE-2017-14949"
+    ],
+    "versions": "5.2.0-today",
+    "jars": [
+      "org.restlet-2.3.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr should not be exposed outside a firewall where bad 
actors can send HTTP requests. These two CVEs specifically involve classes 
(SimpleXMLProvider and XmlRepresentation, respectively) that Solr does not use 
in any code path."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2015-5237"
+    ],
+    "versions": "6.5.0-today",
+    "jars": [
+      "protobuf-java-3.1.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Dependency for Hadoop and Calcite. ??"
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-1471"
+    ],
+    "versions": "5.4.0-7.7.2, 8.0-8.3",
+    "jars": [
+      "simple-xml-2.7.1.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Dependency of Carrot2 and used during compilation, not at 
runtime (see SOLR-769. This .jar was replaced in Solr 8.3 and backported to 
7.7.3 (see SOLR-13779)."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-8088"
+    ],
+    "versions": "4.x-today",
+    "jars": [
+      "slf4j-api-1.7.24.jar",
+      "jcl-over-slf4j-1.7.24.jar",
+      "jul-to-slf4j-1.7.24.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "The reported CVE impacts org.slf4j.ext.EventData, which is 
not used in Solr."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2018-1335"
+    ],
+    "versions": "7.3.1-7.5.0",
+    "jars": [
+      "tika-core.1.17.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr does not run tika-server, so this is not a problem."
+    }
+  },
+  {
+    "ids": [
+      "CVE-"
+    ],
+    "versions": "7.3.1-today",
+    "jars": [
+      "tika-core.*.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "All Tika issues that could be Solr vulnerabilities would only 
be exploitable if untrusted files are indexed with SolrCell. This is not 
recommended in production systems, so Solr does not consider these valid CVEs 
for Solr."
+    }
+  },
+  {
+    "ids": [
+      "CVE-"
+    ],
+    "versions": "6.6.2-today",
+    "jars": [
+      "velocity-tools-2.0.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Solr does not ship a Struts jar. This is a transitive POM 
listing and not included with Solr (see comment in SOLR-2849)."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2016-6809",
+      "CVE-2018-1335",
+      "CVE-2018-1338",
+      "CVE-2018-1339"
+    ],
+    "versions": "5.5.5, 6.2.0-today",
+    "jars": [
+      "vorbis-java-tika-0.8.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "See https://github.com/Gagravarr/VorbisJava/issues/30; 
reported CVEs are not related to OggVorbis at all."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2012-0881"
+    ],
+    "versions": "~2.9-today",
+    "jars": [
+      "xercesImpl-2.9.1.jar"
+    ],
+    "analysis": {
+      "state": "not_affected",
+      "detail": "Only used in Lucene Benchmarks and Solr tests."
+    }
+  },
+  {
+    "ids": [
+      "CVE-2022-39135"
+    ],
+    "versions": "6.5-8.11.2, 9.0",
+    "jars": [
+      "calcite-1.31.0.jar"
+    ],
+    "analysis": {
+      "state": "exploitable",
+      "response": [
+        "update"
+      ],
+      "detail": "Apache Calcite has a vulnerability, CVE-2022-39135, that is 
exploitable in Apache Solr in SolrCloud mode. If an untrusted user can supply 
SQL queries to Solr's '/sql' handler (even indirectly via proxies / other 
apps), then the user could perform an XML External Entity (XXE) attack. This 
might have been exposed by some deployers of Solr in order for internal 
analysts to use JDBC based tooling, but would have unlikely been granted to 
wider audiences."
+    }
+  }
+]


Reply via email to