Vulnerability Page (ULTIMATE)
Introduced in GitLab 13.0.
Each vulnerability in a project has a vulnerability page containing details of the vulnerability, including:
- Description
- When it was detected
- Current status
- Available actions
- Linked issues
- Actions log
If the scanner determined the vulnerability to be a false positive, an alert message is included at the top of the vulnerability's page.
When a vulnerability is no longer detected in a project's default branch, you should change its status to Resolved. This ensures that if it is accidentally reintroduced in a future merge, it is reported again as a new record. To change the status of multiple vulnerabilities, use the Vulnerability Report's Activity filter.
Vulnerability status values
A vulnerability's status can be:
- Detected: The default state for a newly discovered vulnerability. Appears as "Needs triage" in the UI.
- Confirmed: A user has seen this vulnerability and confirmed it to be accurate.
- Dismissed: A user has seen this vulnerability and dismissed it because it is not accurate or otherwise not to be resolved. Dismissed vulnerabilities are ignored if detected in subsequent scans.
- Resolved: The vulnerability has been fixed or is no longer present. Resolved vulnerabilities that are reintroduced and detected by subsequent scans have a new vulnerability record created.
Vulnerability dismissal reasons
- Introduced in GitLab 15.11 with a feature flag named
dismissal_reason
.- Enabled on GitLab.com in GitLab 15.11. For self-managed customers, contact Support if you would like to use this feature in GitLab 15.11.
When dismissing a vulnerability, one of the following reasons must be chosen to clarify why it is being dismissed:
- Acceptable risk: The vulnerability is known, and has not been remediated or mitigated, but is considered to be an acceptable business risk.
- False positive: An error in reporting in which a test result incorrectly indicates the presence of a vulnerability in a system when the vulnerability is not present.
- Mitigating control: A management, operational, or technical control (that is, safeguard or countermeasure) employed by an organization that provides equivalent or comparable protection for an information system.
- Used in tests: The finding is not a vulnerability because it is part of a test or is test data.
- Not applicable: The vulnerability is known, and has not been remediated or mitigated, but is considered to be in a part of the application that will not be updated.
Change status of a vulnerability
To change a vulnerability's status from its Vulnerability Page:
-
On the top bar, select Main menu > Projects and find your project.
-
On the left sidebar, select Security and Compliance > Vulnerability report.
-
Select the vulnerability's description.
-
From the Status dropdown list select a status, then select Change status.
In GitLab 15.11 and later, you must select a dismissal reason when you change a vulnerability's status to Dismissed.
-
Optionally, at the bottom of the page, add a comment to the log entry.
Details of the status change, including who made the change and when, are recorded in the vulnerability's action log.
Creating an issue for a vulnerability
From a vulnerability's page you can create an issue to track all action taken to resolve or mitigate it.
You can create either:
- A GitLab issue (default).
- A Jira issue.
Creating a Jira issue requires that Jira integration is enabled on the project. Note that when Jira integration is enabled, the GitLab issue feature is not available.
Create a GitLab issue for a vulnerability
To create a GitLab issue for a vulnerability:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability's description.
- Select Create issue.
An issue is created in the project, pre-populated with information from the vulnerability report. The issue is then opened so you can take further action.
Create a Jira issue for a vulnerability
- Introduced in GitLab 13.9.
- Feature flag removed in GitLab 13.12.
Prerequisites:
- Enable Jira integration. The Enable Jira issue creation from vulnerabilities option must be selected as part of the configuration.
- Each user must have a personal Jira user account with permission to create issues in the target project.
To create a Jira issue for a vulnerability:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability's description.
- Select Create Jira issue.
- If you're not already logged in to Jira, sign in.
The Jira issue is created and opened in a new browser tab. The Summary and Description fields are pre-populated from the vulnerability's details.
Unlike GitLab issues, the status of whether a Jira issue is open or closed does not display in the GitLab user interface.
Linking a vulnerability to issues
NOTE: If Jira issue support is enabled, GitLab issues are disabled so this feature is not available.
You can link a vulnerability to one or more existing GitLab issues. Adding a link helps track the issue that resolves or mitigates a vulnerability.
Issues linked to a vulnerability are shown in the Vulnerability Report and the vulnerability's page.
Be aware of the following conditions between a vulnerability and a linked issue:
- The vulnerability page shows related issues, but the issue page doesn't show the vulnerability it's related to.
- An issue can only be related to one vulnerability at a time.
- Issues can be linked across groups and projects.
Link a vulnerability to existing issues
To link a vulnerability to existing issues:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability's description.
- In the Linked issues section, select the plus icon ({plus}).
- For each issue to be linked, either:
- Paste a link to the issue.
- Enter the issue's ID (prefixed with a hash
#
).
- Select Add.
The selected issues are added to the Linked issues section, and the linked issues counter is updated.
Resolve a vulnerability
For some vulnerabilities a solution is already known. In those instances, a vulnerability's page includes a Resolve with merge request option.
The following scanners are supported by this feature:
-
Dependency Scanning.
Automatic patch creation is only available for Node.js projects managed with
yarn
. Also, Automatic patch creation is only supported when FIPS mode is disabled. - Container Scanning.
To resolve a vulnerability, you can either:
Resolve a vulnerability with a merge request
To resolve the vulnerability with a merge request:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability's description.
- From the Resolve with merge request dropdown list, select Resolve with merge request.
A merge request is created which applies the patch required to resolve the vulnerability. Process the merge request according to your standard workflow.
Resolve a vulnerability manually
To manually apply the patch that GitLab generated for a vulnerability:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability's description.
- From the Resolve with merge request dropdown list, select Download patch to resolve.
- Ensure your local project has the same commit checked out that was used to generate the patch.
- Run
git apply remediation.patch
. - Verify and commit the changes to your branch.
- Create a merge request to apply the changes to your main branch.
- Process the merge request according to your standard workflow.
Enable security training for vulnerabilities
Introduced in GitLab 14.9.
NOTE: Security training is not available in an offline environment because it uses content from third-party vendors.
Security training helps your developers learn how to fix vulnerabilities. Developers can view security training from selected educational providers, relevant to the detected vulnerability.
To enable security training for vulnerabilities in your project:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Security configuration.
- On the tab bar, select Vulnerability Management.
- To enable a security training provider, turn on the toggle.
View security training for a vulnerability
Introduced in GitLab 14.9.
The vulnerability page may include a training link relevant to the detected vulnerability if security training is enabled. The availability of training depends on whether the enabled training vendor has content matching the particular vulnerability. Training content is requested based on the vulnerability identifiers. The identifier given to a vulnerability varies from one vulnerability to the next. The available training content varies between vendors. This means some vulnerabilities do not display training content. Vulnerabilities with a CWE are most likely to return a training result.
To view the security training for a vulnerability:
- On the top bar, select Main menu > Projects and find your project.
- On the left sidebar, select Security and Compliance > Vulnerability report.
- Select the vulnerability for which you want to view security training.
- Select View training.