Update README.md with more information (#2)
Browse files- Update README.md with more information (5aadfca25c34301fe20c2da5b1ca5980a3dc7146)
Co-authored-by: Kevin X <[email protected]>
README.md
CHANGED
@@ -50,6 +50,35 @@ The core set of information in this dataset lies in two files, `data/project_inf
|
|
50 |
We also provide other essential information such as CVE advisory, and build information for the projects.
|
51 |
We now go into the project information and fix information CSVs.
|
52 |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
53 |
### Project Info
|
54 |
|
55 |
| id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
|
@@ -120,48 +149,62 @@ An extension of this dataset can be found on the Github repository, which provid
|
|
120 |
|
121 |
<!-- Address questions around how the dataset is intended to be used. -->
|
122 |
|
123 |
-
|
|
|
|
|
|
|
|
|
|
|
|
|
124 |
|
125 |
<!-- This section describes suitable use cases for the dataset. -->
|
126 |
|
127 |
-
|
|
|
|
|
128 |
|
129 |
### Out-of-Scope Use
|
130 |
|
131 |
-
|
132 |
-
|
133 |
-
|
134 |
|
135 |
-
|
136 |
|
137 |
-
|
|
|
138 |
|
139 |
[More Information Needed]
|
140 |
|
141 |
-
## Dataset Creation
|
142 |
-
|
143 |
### Curation Rationale
|
144 |
|
145 |
-
|
146 |
-
|
147 |
-
|
148 |
|
149 |
### Source Data
|
150 |
|
151 |
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
|
|
|
|
|
|
152 |
|
153 |
#### Data Collection and Processing
|
154 |
|
155 |
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
156 |
|
|
|
|
|
|
|
|
|
|
|
|
|
157 |
[More Information Needed]
|
158 |
|
159 |
#### Who are the source data producers?
|
160 |
|
161 |
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
162 |
|
163 |
-
[More Information Needed]
|
164 |
-
|
165 |
### Annotations [optional]
|
166 |
|
167 |
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
@@ -188,7 +231,10 @@ An extension of this dataset can be found on the Github repository, which provid
|
|
188 |
|
189 |
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
190 |
|
191 |
-
|
|
|
|
|
|
|
192 |
|
193 |
### Recommendations
|
194 |
|
@@ -225,15 +271,24 @@ Consider citing our paper:
|
|
225 |
|
226 |
<!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
|
227 |
|
228 |
-
|
|
|
|
|
|
|
|
|
229 |
|
230 |
## More Information [optional]
|
231 |
|
232 |
[More Information Needed]
|
233 |
|
234 |
-
## Dataset Card Authors
|
235 |
|
236 |
-
|
|
|
|
|
|
|
|
|
|
|
237 |
|
238 |
## Dataset Card Contact
|
239 |
|
|
|
50 |
We also provide other essential information such as CVE advisory, and build information for the projects.
|
51 |
We now go into the project information and fix information CSVs.
|
52 |
|
53 |
+
### Advisory
|
54 |
+
|
55 |
+
vuln_id | schema_version | published_date | modified_date | aliases | summary | details | cvss_version | cvss_vector | cvss_score | severity_rating | cwe_ids | ecosystem | package_name | introduced_version | fixed_version | references | github_reviewed | github_reviewed_at | nvd_published_at
|
56 |
+
--------|----------------|----------------|---------------|---------|---------|---------|---------------|--------------|-------------|------------------|---------|-----------|----------------|--------------------|---------------|------------|------------------|---------------------|------------------
|
57 |
+
CVE-2022-12345 | 1.4.0 | 2022-01-01 | 2022-01-10 | GHSA-xxxx-yyyy-zzzz | Example XSS vuln | Reflected XSS in parameter `q` | CVSS:3.1 | AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N | 6.1 | MODERATE | CWE-79 | Maven | com.example:library | 1.0.0 | 1.0.1 | https://example.com/advisory | true | 2022-01-05T12:00:00Z | 2022-01-01T00:00:00Z
|
58 |
+
|
59 |
+
This data is extracted from the CWE-Mitre net database and converted to JSON format.
|
60 |
+
We now get into each field and explain what they are.
|
61 |
+
- `vuln_id`: a string like `CVE-2021-44667` or `GHSA-xxxx-yyyy-zzzz` representing the unique ID of the vulnerability.
|
62 |
+
- `schema_version`: a string indicating the schema used to encode this data (e.g., `"1.4.0"`).
|
63 |
+
- `published_date`: a date (in ISO 8601 format, e.g. `2022-03-12`) representing when the vulnerability was first disclosed.
|
64 |
+
- `modified_date`: a date representing when the record was last updated.
|
65 |
+
- `aliases`: a list of strings (e.g., `[ "CVE-2021-44667" ]`) capturing alternate identifiers.
|
66 |
+
- `summary`: a short string summarizing the vulnerability in one sentence.
|
67 |
+
- `details`: a longer string giving a full description of how the vulnerability occurs and its impact.
|
68 |
+
- `cvss_version`: a string like `CVSS:3.1` indicating the version of the CVSS specification used.
|
69 |
+
- `cvss_vector`: a CVSS vector string (e.g., `AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N`) describing the severity dimensions.
|
70 |
+
- `cvss_score`: a float between 0.0 and 10.0 quantifying the vulnerability severity.
|
71 |
+
- `severity_rating`: a string with one of `LOW`, `MODERATE`, `HIGH`, or `CRITICAL` as a qualitative severity label.
|
72 |
+
- `cwe_ids`: a list of strings like `["CWE-79"]` referring to Common Weakness Enumeration identifiers.
|
73 |
+
- `ecosystem`: a string such as `"Maven"` or `"npm"` indicating the software package manager ecosystem affected.
|
74 |
+
- `package_name`: a string like `com.alibaba.nacos:nacos-common` identifying the specific package.
|
75 |
+
- `introduced_version`: a string denoting the first version where the vulnerability was introduced (e.g., `"0"`).
|
76 |
+
- `fixed_version`: a string indicating the version where the issue was patched (e.g., `"2.0.4"`).
|
77 |
+
- `references`: a list of URLs pointing to advisory pages, commits, issue trackers, etc.
|
78 |
+
- `github_reviewed`: a boolean (`true` or `false`) showing whether GitHub has reviewed this vulnerability.
|
79 |
+
- `github_reviewed_at`: a timestamp (e.g., `2022-03-14T23:25:35Z`) of when GitHub reviewed the advisory.
|
80 |
+
- `nvd_published_at`: a timestamp of when the NVD officially published the vulnerability.
|
81 |
+
|
82 |
### Project Info
|
83 |
|
84 |
| id | project_slug | cve_id | cwe_id | cwe_name | github_username | github_repository_name | github_tag | github_url | advisory_id | buggy_commit_id | fix_commit_ids |
|
|
|
149 |
|
150 |
<!-- Address questions around how the dataset is intended to be used. -->
|
151 |
|
152 |
+
- Study patterns from previous vulnerability fixes to address current vulnerabilities effectively.
|
153 |
+
- Evaluate and compare performance of static analysis tools (e.g., CodeQL, Semgrep) on real-world vulnerabilities.
|
154 |
+
- Assess and measure accuracy, recall, precision, and false-positive rates of various security tools across different vulnerability types.
|
155 |
+
- Use detailed fix information to improve automatic patch generation and vulnerability remediation systems.
|
156 |
+
- Provide examples of code vulnerabilities and their respective fixes to educate developers, cybersecurity professionals, and students.
|
157 |
+
|
158 |
+
### Direct Use Examples
|
159 |
|
160 |
<!-- This section describes suitable use cases for the dataset. -->
|
161 |
|
162 |
+
- Analyzing past Java-based CVE fixes on CWE-022 classifications to develop guidelines for addressing file-access vulnerabilities
|
163 |
+
- Conducting controlled experiments to systematically quantify false positives and true positive detections of security tools for injection
|
164 |
+
- Developing interactive security training modules that showcase vulnerabilities alongside detailed explanations of the actual patches
|
165 |
|
166 |
### Out-of-Scope Use
|
167 |
|
168 |
+
- Because the dataset covers only specific vulnerability types and limited CVEs, it should not be treated as a complete security benchmark for evaluating the entire security posture of software projects.
|
169 |
+
- Sole reliance on the provided CVE data without additional context or tooling may lead to misinterpretations on what the vulnerability actually is.
|
170 |
+
- Tools unrelated to static analysis or vulnerability patching (e.g., antivirus software) would likely see limited benefit from this dataset.
|
171 |
|
172 |
+
### Misuse and Malicious Use
|
173 |
|
174 |
+
- Attackers could analyze vulnerable code examples to understand how to exploit similar software weaknesses
|
175 |
+
- Detailed information about vulnerabilities might aid in crafting targeted attacks against unpatched software versions.
|
176 |
|
177 |
[More Information Needed]
|
178 |
|
|
|
|
|
179 |
### Curation Rationale
|
180 |
|
181 |
+
The dataset was created to provide a high-quality benchmark for evaluating the ability of IRIS to detect and fix real-world vulnerabilities in Java code.
|
182 |
+
Existing benchmarks often lack direct links to real CVEs and actionable fixes.
|
183 |
+
This dataset bridges that gap with reproducible, well-labeled examples tied to CVEs and CWEs.
|
184 |
|
185 |
### Source Data
|
186 |
|
187 |
<!-- This section describes the source data (e.g. news text and headlines, social media posts, translated sentences, ...). -->
|
188 |
+
- GitHub Security Advisories (https://github.com/advisories): Used to extract structured CVE metadata, severity ratings, affected packages, ecosystem information.
|
189 |
+
- Github commits (https://docs.github.com/en/pull-requests/committing-changes-to-your-project/creating-and-editing-commits/about-commits): Commit logs and diffs were used to identify the buggy and fixed versions of code and determine class/method-level changes needed to fix the vulnerability.
|
190 |
+
- MITRE CWE Database (https://cwe.mitre.org): Provided the classification, naming, description, and available links related to each vulnerability type.
|
191 |
|
192 |
#### Data Collection and Processing
|
193 |
|
194 |
<!-- This section describes the data collection and processing process such as data selection criteria, filtering and normalization methods, tools and libraries used, etc. -->
|
195 |
|
196 |
+
- Projects were selected based on the availability of Java source code and documentation on how to fix the error
|
197 |
+
- Buggy and fixed code versions using git diff and commit history
|
198 |
+
- Associated advisory information from GitHub Security Advisories and NVD
|
199 |
+
- Class and method boundaries using AST analysis
|
200 |
+
- Patch validation was performed via manual review and automated testing where possible.
|
201 |
+
|
202 |
[More Information Needed]
|
203 |
|
204 |
#### Who are the source data producers?
|
205 |
|
206 |
<!-- This section describes the people or systems who originally created the data. It should also include self-reported demographic or identity information for the source data creators if this information is available. -->
|
207 |
|
|
|
|
|
208 |
### Annotations [optional]
|
209 |
|
210 |
<!-- If the dataset contains annotations which are not part of the initial data collection, use this section to describe them. -->
|
|
|
231 |
|
232 |
<!-- This section is meant to convey both technical and sociotechnical limitations. -->
|
233 |
|
234 |
+
- Biased toward Java: Only Java-based CVEs are included; generalization to other languages (e.g., C/C++, Python) should be done with caution.
|
235 |
+
- Limited in CWE scope: Covers only 4 CWEs — CWE-022, CWE-078, CWE-079, CWE-094.
|
236 |
+
- Biased toward open-source: Enterprise and closed-source vulnerabilities are excluded, limiting the scope of evaluation.
|
237 |
+
- Manually vetted, which introduces potential human error or subjective judgment in what counts as the “core fix.”
|
238 |
|
239 |
### Recommendations
|
240 |
|
|
|
271 |
|
272 |
<!-- If relevant, include terms and calculations in this section that can help readers understand the dataset or dataset card. -->
|
273 |
|
274 |
+
- CVE (Common Vulnerabilities and Exposures): A unique identifier for a known security vulnerability.
|
275 |
+
- CWE (Common Weakness Enumeration): A formalized taxonomy of software vulnerability types.
|
276 |
+
- CVSS (Common Vulnerability Scoring System): A standard for assessing the severity of security vulnerabilities.
|
277 |
+
- Static Analysis: Code analysis technique that examines source code without executing it.
|
278 |
+
- Patch: A set of changes to a program designed to fix a known issue or vulnerability
|
279 |
|
280 |
## More Information [optional]
|
281 |
|
282 |
[More Information Needed]
|
283 |
|
284 |
+
## Dataset Card Authors
|
285 |
|
286 |
+
- Ziyang Li (University of Pennsylvania)
|
287 |
+
- Saikat Dutta (University of Pennsylvania)
|
288 |
+
- Mayur Naik (University of Pennsylvania)
|
289 |
+
- Claire Wang (University of Pennsylvania)
|
290 |
+
- Kevin Xue (University of Pennsylvania)
|
291 |
+
- Amartya Das
|
292 |
|
293 |
## Dataset Card Contact
|
294 |
|