CN113901477A - Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium - Google Patents

Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium Download PDF

Info

Publication number
CN113901477A
CN113901477A CN202111194350.2A CN202111194350A CN113901477A CN 113901477 A CN113901477 A CN 113901477A CN 202111194350 A CN202111194350 A CN 202111194350A CN 113901477 A CN113901477 A CN 113901477A
Authority
CN
China
Prior art keywords
vulnerability
work order
processing
jira
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111194350.2A
Other languages
Chinese (zh)
Inventor
宋剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Hubei Topsec Network Security Technology Co Ltd
Original Assignee
Beijing Topsec Technology Co Ltd
Beijing Topsec Network Security Technology Co Ltd
Beijing Topsec Software Co Ltd
Hubei Topsec Network Security Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Topsec Technology Co Ltd, Beijing Topsec Network Security Technology Co Ltd, Beijing Topsec Software Co Ltd, Hubei Topsec Network Security Technology Co Ltd filed Critical Beijing Topsec Technology Co Ltd
Priority to CN202111194350.2A priority Critical patent/CN113901477A/en
Publication of CN113901477A publication Critical patent/CN113901477A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security

Abstract

The application provides a method, a device, computer equipment and a storage medium for bug fixing based on a Jira work order system, wherein the bug fixing method based on the Jira work order system comprises the following steps: acquiring vulnerability information of at least one target vulnerability obtained by vulnerability scanning aiming at an application server; generating a vulnerability handling work order based on the Jira work order system and the vulnerability information; responding to an assignment instruction of the first user for the vulnerability handling worksheet to assign the vulnerability handling worksheet to the second user and enable the second user to process the vulnerability handling worksheet; acquiring a processing result of a second user for the vulnerability processing work order in real time; and updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order. According to the method and the device, the testing personnel can participate in vulnerability tracking processing, the vulnerability submission work order can be automatically completed based on the Jira work order system, and on the other hand, the vulnerability repairing can be automatically triggered and verified, and the vulnerability processing efficiency can be improved.

Description

Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium
Technical Field
The application relates to the technical field of computers, in particular to a method and a device for bug fixing based on a Jira work order system, computer equipment and a storage medium.
Background
At present, in a software development project, internet and IT information technology companies deliver developed products or requirements to testers from one requirement to development and then to testing, the testers perform function point testing, then submit bug tickets aiming at unsatisfied function items or defective function items, and trace and perfect the whole products or functions through the bug tickets. After the whole function test is completed, one or more loophole scans are performed, namely, the safety test in the traditional sense is performed.
However, the existing vulnerability management system has the following disadvantages: firstly, the existing vulnerability management system has low vulnerability processing efficiency, secondly, testers cannot participate in vulnerability tracking processing, for example, the testers cannot be assigned, and finally, the existing vulnerability management system cannot automatically verify whether vulnerabilities are repaired.
Disclosure of Invention
An object of the embodiments of the present application is to provide a method, an apparatus, a computer device, and a storage medium for bug fixing based on a Jira work order system, which are at least used to enable a tester to participate in bug tracking processing, on the other hand, used to automatically complete a bug submission work order based on the Jira work order system, and on the other hand, used to provide a work order to automatically trigger and verify a bug fixing mechanism and improve bug processing efficiency.
Therefore, the invention provides a vulnerability repairing method based on a Jira work order system in a first aspect, which comprises the following steps:
acquiring vulnerability information of at least one target vulnerability obtained by vulnerability scanning aiming at an application server;
generating a vulnerability handling work order based on a Jira work order system and the vulnerability information;
responding to an assignment instruction of a first user for the vulnerability handling worksheet, assigning the vulnerability handling worksheet to a second user and enabling the second user to process the vulnerability handling worksheet;
acquiring a processing result of the second user for the vulnerability processing work order in real time;
updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, re-scanning the application server and obtaining a scanning verification result;
judging whether the scanning verification result comprises the target vulnerability or not, and if the scanning verification result comprises the target vulnerability, retransmitting the vulnerability handling worksheet to the second user;
and updating the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning verification result.
In the embodiment of the application, by acquiring vulnerability information of at least one target vulnerability which can be obtained by carrying out vulnerability scanning on an application server, a vulnerability processing work order can be generated based on a Jira work order system and the vulnerability information, and then an assignment instruction of a first user for the vulnerability processing work order can be responded, so that the vulnerability processing work order is assigned to a second user and the second user processes the vulnerability processing work order, on the other hand, by acquiring a processing result of the second user for the vulnerability processing work order in real time, further updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order, and on the other hand, when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, by re-scanning the application server and obtaining a scanning verification result, whether the scanning verification result comprises the target bug can be judged, if the scanning verification result comprises the target bug, the bug processing work order is sent to the second user again, and finally the processing state information of the bug processing work order and the bug state information of the bug processing work order can be updated according to the scanning verification result.
Compared with the prior art, the vulnerability scanning and vulnerability repairing method and device can manage the whole period of vulnerability scanning and vulnerability repairing, further can automatically complete vulnerability submission work orders and achieve traceable and real-time management of vulnerabilities, and on the other hand enables testing personnel (first users) to participate in the vulnerability repairing process, so that the testing personnel can be enabled to determine processing personnel of the work orders of vulnerabilities for the work orders of vulnerabilities, and therefore the solving efficiency of the vulnerabilities is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
In the first aspect of the present application, as an optional implementation manner, the generating a vulnerability handling work order based on a Jira work order system and the vulnerability information includes:
and formatting the vulnerability information according to the data format of the Jira work order system, and obtaining the vulnerability processing work order.
In this optional embodiment, the vulnerability information can be formatted through a data format of the Jira work order system, and the vulnerability processing work order can be obtained.
In the first aspect of the present application, as an optional implementation manner, after the formatting the vulnerability information according to the data format of the Jira work order system and obtaining the vulnerability handling work order, the method further includes:
visually displaying the vulnerability handling work order based on the Jira work order system so that the first user inputs the assignment instruction aiming at the vulnerability handling work order.
In this optional embodiment, the assignment instruction can be input by the first user for the bug processing work order by visually displaying the bug processing work order in the Jira work order system.
In the first aspect of the present application, as an optional implementation manner, the vulnerability information includes: the vulnerability identification information comprises at least one of vulnerability name, vulnerability description information, vulnerability solution, threat score of the vulnerability, discovery and release date of the vulnerability, CVE number of the vulnerability, influence range of the vulnerability, CVSS score of the vulnerability and influenced assets.
In the first aspect of the present application, as an optional implementation manner, the vulnerability information further includes: priority information;
and, the method further comprises:
and generating the priority information according to the CVSS score of the vulnerability.
In this optional embodiment, the priority information is generated by the CVSS score of the bug, which may facilitate the first user to assign the work order and assign the work order according to the priority of the work order.
In the first aspect of the present application, as an optional implementation manner, after obtaining vulnerability information of at least one target vulnerability obtained by performing vulnerability scanning on an application server, the method further includes:
and judging whether the vulnerability information of the target vulnerability exists, if so, not executing the vulnerability processing work order generated based on the Jira work order system and the vulnerability information.
According to the optional implementation method, the duplicate removal processing can be performed on the vulnerability by judging whether the vulnerability information of the target vulnerability already exists, so that the processing efficiency of the vulnerability is further improved.
The second aspect of the application discloses a bug fixing device based on Jira work order system, the device includes:
the vulnerability scanning module is used for acquiring vulnerability information of at least one target vulnerability obtained by carrying out vulnerability scanning on the application server;
the vulnerability management module is used for generating a vulnerability processing work order based on the Jira work order system and the vulnerability information;
the vulnerability tracking module is used for responding to an assignment instruction of a first user for the vulnerability handling worksheet so as to assign the vulnerability handling worksheet to a second user and enable the second user to process the vulnerability handling worksheet;
the vulnerability tracking module is further used for acquiring a processing result of the second user aiming at the vulnerability processing work order in real time;
the vulnerability management module is also used for updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
the vulnerability scanning module is further used for rescanning the application server and obtaining a scanning verification result when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed;
the vulnerability management module is further used for judging whether the scanning verification result comprises the target vulnerability or not, and if the scanning verification result comprises the target vulnerability, the vulnerability processing worksheet is sent to the second user again;
and the vulnerability management module is also used for updating the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning and verifying result.
Compared with the prior art, the vulnerability scanning and vulnerability repairing method and device can manage the whole period of vulnerability scanning and vulnerability repairing, further can automatically complete vulnerability submission work orders and achieve traceable and real-time management of vulnerabilities, and on the other hand enables testing personnel (first users) to participate in the vulnerability repairing process, so that the testing personnel can be enabled to determine processing personnel of the work orders of vulnerabilities for the work orders of vulnerabilities, and therefore the solving efficiency of the vulnerabilities is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
In the second aspect of the present application, as an optional implementation manner, the vulnerability management module includes:
and the formatting sub-module is used for formatting the vulnerability information according to the data format of the Jira work order system and obtaining the vulnerability processing work order.
In the embodiment of the application, the vulnerability information can be formatted through a data format of a Jira work order system, and the vulnerability processing work order is obtained.
A third aspect of the present application discloses a computer device comprising:
a processor; and
a memory configured to store machine readable instructions that, when executed by the processor, perform the method of Jira work order system based bug fix of the first aspect of the present application.
Compared with the prior art, the computer equipment can manage the whole repair period of the scanned bug, further can automatically complete the submission of the bug work order and realize traceable and real-time management of the bug, and on the other hand, by enabling the testing personnel (the first user) to participate in the bug repair process, further can enable the testing personnel to determine the processing personnel of the bug work order for the bug work order, so that the bug solution efficiency is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
A fourth aspect of the present application discloses a storage medium, where a computer program is stored, and the computer program is executed by a processor to perform the method for bug fixing based on a Jira work order system according to the first aspect of the present application.
Compared with the prior art, the storage medium can manage the whole repair cycle of the scanned bug, further can automatically complete the submission of the bug work order and realize traceable and real-time management of the bug, and on the other hand, by enabling a tester (a first user) to participate in the bug repair process, further can enable the tester to determine the processor of the bug work order for the bug work order, so that the bug solution efficiency is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments of the present application will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and that those skilled in the art can also obtain other related drawings based on the drawings without inventive efforts.
Fig. 1 is a schematic flowchart of a vulnerability fixing method based on a Jira work order system disclosed in an embodiment of the present application;
fig. 2 is a schematic flowchart of another leak repairing method based on a Jira work order system, disclosed in an embodiment of the present application;
fig. 3 is a schematic flowchart of a process of formatting vulnerability information according to a data format of a Jira work order system, disclosed in an embodiment of the present application;
FIG. 4 is a schematic view illustrating a visualization of a bug treatment work order disclosed in an embodiment of the present application;
fig. 5 is a schematic structural diagram of a vulnerability fixing device based on a Jira work order system disclosed in an embodiment of the present application;
fig. 6 is a schematic structural diagram of a computer device disclosed in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be described below with reference to the drawings in the embodiments of the present application.
Example one
Referring to fig. 1, fig. 1 is a schematic flowchart of a vulnerability fixing method based on a Jira work order system according to an embodiment of the present application. As shown in fig. 1, the vulnerability repair method based on the Jira work order system in the embodiment of the present application includes the following steps:
101. acquiring vulnerability information of at least one target vulnerability obtained by vulnerability scanning aiming at an application server;
102. generating a vulnerability handling work order based on the Jira work order system and the vulnerability information;
103. responding to an assignment instruction of the first user for the vulnerability handling worksheet to assign the vulnerability handling worksheet to the second user and enable the second user to process the vulnerability handling worksheet;
104. acquiring a processing result of a second user for the vulnerability processing work order in real time;
105. updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
106. when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, re-scanning the application server and obtaining a scanning verification result;
107. judging whether the scanning verification result comprises a target bug, and if the scanning verification result comprises the target bug, retransmitting the bug processing worksheet to the second user;
108. and updating the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning verification result.
In the embodiment of the application, by acquiring vulnerability information of at least one target vulnerability which can be obtained by performing vulnerability scanning on an application server, generating a vulnerability processing work order based on a Jira work order system and the vulnerability information, responding to an assignment instruction of a first user for the vulnerability processing work order, assigning the vulnerability processing work order to a second user and enabling the second user to process the vulnerability processing work order, on the other hand, by acquiring a processing result of the second user for the vulnerability processing work order in real time, updating processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order, on the other hand, when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, re-scanning is performed by a corresponding application server and a scanning verification result is obtained, whether the scanning verification result comprises the target vulnerability can be judged, and if the scanning verification result comprises the target bug, the bug processing work order is sent to the second user again, and finally the processing state information of the bug processing work order and the bug state information of the bug processing work order can be updated according to the scanning verification result.
Compared with the prior art, the vulnerability scanning and vulnerability repairing method and device can manage the whole period of vulnerability scanning and vulnerability repairing, further can automatically complete vulnerability submission work orders and achieve traceable and real-time management of vulnerabilities, and on the other hand enables testing personnel (first users) to participate in the vulnerability repairing process, so that the testing personnel can be enabled to determine processing personnel of the work orders of vulnerabilities for the work orders of vulnerabilities, and therefore the solving efficiency of the vulnerabilities is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
For example, the embodiment of the present application takes scanning SQL injection vulnerabilities as an example for description. Referring to fig. 2, fig. 2 is a schematic flowchart of another vulnerability fixing method based on a Jira work order system according to an embodiment of the present application. As shown in fig. 2, the vulnerability management module can perform SQL injection scanning on the application server through the vulnerability scanner and obtain vulnerability information (vulnerability data) of the SQL injection vulnerability, and further can perform formatting processing on the vulnerability information through the vulnerability worksheet conversion device and form an SQL injection vulnerability processing worksheet, at this time, a first user, i.e. a tester, submits the SQL injection vulnerability processing worksheet to the Jira worksheet system, and then can display the SQL injection vulnerability processing worksheet and assign the SQL injection vulnerability processing worksheet to a specific developer (a second user) for processing based on the Jira worksheet system, wherein when the developer repairs the SQL injection vulnerability, the developer can click on the operation interface of the Jira worksheet system to complete the repair, and then the processing status information of the SQL injection vulnerability processing worksheet is updated to "complete", and further when the Jira worksheet system detects that the processing status information of the SQL injection vulnerability processing worksheet is updated to "complete", and synchronizing the processing state information of the SQL injection vulnerability processing work order to the vulnerability work order conversion device, then updating the vulnerability state information of the SQL injection vulnerability processing work order to be solved by the vulnerability management module through acquiring the synchronization result in real time, and utilizing the vulnerability scanner to perform SQL injection scanning on the application program server again so as to judge whether the SQL injection vulnerability still exists after being processed by the developer.
In the embodiment of the present application, as an optional implementation manner, step 102: the specific mode for generating the vulnerability handling work order based on the Jira work order system and the vulnerability information is as follows:
and formatting the vulnerability information according to the data format of the Jira work order system, and obtaining a vulnerability processing work order.
In this optional embodiment, the vulnerability information can be formatted through the data format of the Jira work order system, and a vulnerability processing work order is obtained.
In this optional manner, optionally, please refer to fig. 3, and fig. 3 is a schematic flow chart illustrating a process of formatting bug information according to a data format of a Jira work order system, which is disclosed in the embodiment of the present application. As shown in fig. 3, the specific process of formatting the vulnerability information according to the data format of the Jira work order system is as follows:
and generating a title of the work order by the vulnerability name and the affected assets, generating the priority of the work order according to the CVSS score of the vulnerability, and generating description information of the work order by vulnerability description information, a solution, a threat score, a discovery/release date, a CVE number and an influence range.
In this optional manner, optionally, as shown in fig. 3, after the vulnerability information is formatted according to the data format of the Jira work order system, a creating interface of the Jira work order system is called to create the vulnerability processing work order.
In the embodiment of the present application, as an optional implementation manner, in the step: after the vulnerability information is formatted according to the data format of the Jira work order system and the vulnerability processing work order is obtained, the method further comprises the following steps:
based on the Jira work order system, the vulnerability processing work order is visually displayed, so that the first user inputs an assignment instruction for the vulnerability processing work order.
In the optional embodiment, the first user can input the assignment instruction for the bug processing work order by visually displaying the bug processing work order in the Jira work order system.
For example, please refer to fig. 4, and fig. 4 is a schematic view illustrating a visualization of a bug processing work order disclosed in the embodiment of the present application. As shown in FIG. 4, the vulnerability handling work order may be visually presented through the Jira work order system.
In the embodiment of the present application, as an optional implementation manner, as shown in fig. 3, the vulnerability information includes: the vulnerability identification information comprises at least one of vulnerability name, vulnerability description information, vulnerability solution, threat score of the vulnerability, discovery and release date of the vulnerability, CVE number of the vulnerability, influence range of the vulnerability, CVSS score of the vulnerability and influenced assets.
In this embodiment of the present application, as an optional implementation manner, as shown in fig. 3, the vulnerability information further includes: the priority information, accordingly, the method of the embodiment of the present application further includes the steps of:
and generating priority information according to the CVSS score of the vulnerability.
In this optional embodiment, the priority information is generated by the CVSS score of the bug, which is convenient for the first user to assign the work order and assign the work order according to the priority of the work order.
In this embodiment of the present application, as an optional implementation manner, after obtaining vulnerability information of at least one target vulnerability obtained by performing vulnerability scanning on an application server, the method further includes:
and judging whether the vulnerability information of the target vulnerability already exists, if so, not executing generation of a vulnerability processing worksheet based on the Jira worksheet system and the vulnerability information.
According to the optional implementation method, the duplicate removal processing can be performed on the vulnerability by judging whether the vulnerability information of the target vulnerability already exists, so that the processing efficiency of the vulnerability is further improved.
Example two
Referring to fig. 5, fig. 5 is a schematic structural diagram of a bug fixing device based on a Jira work order system according to an embodiment of the present application. As shown in fig. 5, the vulnerability repair apparatus based on the Jira work order system according to the embodiment of the present application includes:
the vulnerability scanning module 201 is configured to obtain vulnerability information of at least one target vulnerability obtained by performing vulnerability scanning on an application server;
the vulnerability management module 202 is used for generating a vulnerability handling work order based on the Jira work order system and the vulnerability information;
the vulnerability tracking module 203 is used for responding to an assignment instruction of the first user for the vulnerability handling worksheet, assigning the vulnerability handling worksheet to the second user and enabling the second user to process the vulnerability handling worksheet;
the vulnerability tracking module 203 is further configured to obtain a processing result of the second user for the vulnerability processing work order in real time;
the vulnerability management module 202 is further configured to update the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
the vulnerability scanning module 201 is further configured to, when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, rescan the application server and obtain a scanning verification result;
the vulnerability management module 202 is further configured to determine whether the scanning verification result includes a target vulnerability, and if the scanning verification result includes the target vulnerability, resend the vulnerability handling worksheet to the second user;
the vulnerability management module 202 is further configured to update the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning verification result.
Compared with the prior art, the method can manage the whole period from the scanning of the bug to the repairing of the bug, further can automatically complete the submission of the bug work order and realize the traceable and real-time management of the bug, and on the other hand, by enabling the tester (the first user) to participate in the bug repairing process, further enables the tester to be a processing staff for the bug work order, thereby improving the solving efficiency of the bug. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
In the second aspect of the present application, as an optional implementation manner, the vulnerability management module includes:
and the formatting sub-module is used for formatting the vulnerability information according to the data format of the Jira work order system and obtaining the vulnerability processing work order.
In the embodiment of the application, the vulnerability information can be formatted through the data format of the Jira work order system, and the vulnerability processing work order is obtained.
Please refer to the first embodiment of the present application for further details of the apparatus according to the first embodiment of the present application, which are not described herein.
EXAMPLE III
Referring to fig. 6, fig. 6 is a schematic structural diagram of a computer device disclosed in the embodiment of the present application, and as shown in fig. 6, the computer device in the embodiment of the present application includes:
a processor 301; and
the memory 302 is configured to store machine-readable instructions, and when the instructions are executed by the processor 301, the method for bug fixing based on a Jira work order system according to the first embodiment of the present application is executed.
Compared with the prior art, the computer equipment of the embodiment of the application can manage the whole repair period of the scanned bug, further can automatically complete the submission of the bug work order and realize traceable and real-time management of the bug, and on the other hand, by enabling the testing personnel (the first user) to participate in the bug repair process, further enables the testing personnel to determine the processing personnel of the work order of the bug for the work order of the bug, thereby improving the solving efficiency of the bug. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
Example four
The embodiment of the application discloses a storage medium, wherein a computer program is stored in the storage medium, and the computer program is executed by a processor to execute the bug fixing method based on the Jira work order system.
Compared with the prior art, the storage medium of the embodiment of the application can manage the whole repair cycle of the scanned bug, further can automatically complete the submission of the bug work order and realize traceable and real-time management of the bug, and on the other hand, by enabling a tester (a first user) to participate in the bug repair process, further can enable the tester to determine the processor of the bug work order for the bug work order, so that the bug solution efficiency is improved. On the other hand, the vulnerability can be automatically rescanned to verify whether the prior vulnerability is repaired, so that the function of automatically triggering and verifying the vulnerability repair mechanism by the work order is provided.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a division of one logic function, and there may be other divisions when actually implemented, and for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some communication interfaces, and may be in an electrical, mechanical or other form.
In addition, units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
Furthermore, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
It should be noted that the functions, if implemented in the form of software functional modules and sold or used as independent products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
In this document, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions.
The above description is only an example of the present application and is not intended to limit the scope of the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A vulnerability repairing method based on a Jira work order system is characterized by comprising the following steps:
acquiring vulnerability information of at least one target vulnerability obtained by vulnerability scanning aiming at an application server;
generating a vulnerability handling work order based on a Jira work order system and the vulnerability information;
responding to an assignment instruction of a first user for the vulnerability handling worksheet, assigning the vulnerability handling worksheet to a second user and enabling the second user to process the vulnerability handling worksheet;
acquiring a processing result of the second user for the vulnerability processing work order in real time;
updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed, re-scanning the application server and obtaining a scanning verification result;
judging whether the scanning verification result comprises the target vulnerability or not, and if the scanning verification result comprises the target vulnerability, retransmitting the vulnerability handling worksheet to the second user;
and updating the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning verification result.
2. The method of claim 1, wherein generating a vulnerability handling work order based on a Jira work order system and the vulnerability information comprises:
and formatting the vulnerability information according to the data format of the Jira work order system, and obtaining the vulnerability processing work order.
3. The method of claim 2, wherein after the formatting the vulnerability information according to the data format of the Jira work order system and obtaining the vulnerability handling work order, the method further comprises:
visually displaying the vulnerability handling work order based on the Jira work order system so that the first user inputs the assignment instruction aiming at the vulnerability handling work order.
4. The method of claim 1, wherein the vulnerability information comprises: the vulnerability identification information comprises at least one of vulnerability name, vulnerability description information, vulnerability solution, threat score of the vulnerability, discovery and release date of the vulnerability, CVE number of the vulnerability, influence range of the vulnerability, CVSS score of the vulnerability and influenced assets.
5. The method of claim 4, wherein the vulnerability information further comprises: priority information;
and, the method further comprises:
and generating the priority information according to the CVSS score of the vulnerability.
6. The method of claim 1, wherein after the obtaining vulnerability information for at least one target vulnerability obtained from a vulnerability scan for an application server, the method further comprises:
and judging whether the vulnerability information of the target vulnerability exists, if so, not executing the vulnerability processing work order generated based on the Jira work order system and the vulnerability information.
7. A bug fixing device based on a Jira work order system is characterized in that the device comprises:
the vulnerability scanning module is used for acquiring vulnerability information of at least one target vulnerability obtained by carrying out vulnerability scanning on the application server;
the vulnerability management module is used for generating a vulnerability processing work order based on the Jira work order system and the vulnerability information;
the vulnerability tracking module is used for responding to an assignment instruction of a first user for the vulnerability handling worksheet so as to assign the vulnerability handling worksheet to a second user and enable the second user to process the vulnerability handling worksheet;
the vulnerability tracking module is further used for acquiring a processing result of the second user aiming at the vulnerability processing work order in real time;
the vulnerability management module is also used for updating the processing state information of the vulnerability processing work order according to the processing result of the vulnerability processing work order;
the vulnerability scanning module is further used for rescanning the application server and obtaining a scanning verification result when the processing state information of the vulnerability processing work order represents that the vulnerability processing work order is completed;
the vulnerability management module is further used for judging whether the scanning verification result comprises the target vulnerability or not, and if the scanning verification result comprises the target vulnerability, the vulnerability processing worksheet is sent to the second user again;
and the vulnerability management module is also used for updating the processing state information of the vulnerability processing work order and the vulnerability state information of the vulnerability processing work order according to the scanning and verifying result.
8. The apparatus of claim 7, wherein the vulnerability management module comprises:
and the formatting sub-module is used for formatting the vulnerability information according to the data format of the Jira work order system and obtaining the vulnerability processing work order.
9. A computer device, comprising:
a processor; and
a memory configured to store machine readable instructions that, when executed by the processor, perform the method of Jira work order system based bug fix of any of claims 1-6.
10. A storage medium storing a computer program for executing the method for bug fixing based on Jira work order system according to any claim 1-6 by a processor.
CN202111194350.2A 2021-10-13 2021-10-13 Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium Pending CN113901477A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111194350.2A CN113901477A (en) 2021-10-13 2021-10-13 Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111194350.2A CN113901477A (en) 2021-10-13 2021-10-13 Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113901477A true CN113901477A (en) 2022-01-07

Family

ID=79191962

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111194350.2A Pending CN113901477A (en) 2021-10-13 2021-10-13 Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113901477A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884719A (en) * 2022-04-29 2022-08-09 广州市昊恒信息科技有限公司 Network equipment security vulnerability early warning system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110069930A (en) * 2019-04-29 2019-07-30 广东电网有限责任公司 A kind of loophole restorative procedure, device and computer readable storage medium
CN111240994A (en) * 2020-01-20 2020-06-05 北京国舜科技股份有限公司 Vulnerability processing method and device, electronic equipment and readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110069930A (en) * 2019-04-29 2019-07-30 广东电网有限责任公司 A kind of loophole restorative procedure, device and computer readable storage medium
CN111240994A (en) * 2020-01-20 2020-06-05 北京国舜科技股份有限公司 Vulnerability processing method and device, electronic equipment and readable storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114884719A (en) * 2022-04-29 2022-08-09 广州市昊恒信息科技有限公司 Network equipment security vulnerability early warning system

Similar Documents

Publication Publication Date Title
US8838964B2 (en) Package audit tool
GB2493828A (en) Linking a test case error to a code segment to re-execute the test when the code segment is modified
CN109784738B (en) Approval method and approval device
CN110659206A (en) Simulation architecture establishing method, device, medium and electronic equipment based on microservice
CN109783128A (en) Code change notification method, equipment, storage medium and device
CN111679851B (en) Demand code management method, device, system and computer readable storage medium
CN112650670A (en) Application testing method, device, system, electronic equipment and storage medium
CN111597104A (en) Multi-protocol adaptive interface regression testing method, system, equipment and medium
CN113901477A (en) Vulnerability repair method and device based on Jira work order system, computer equipment and storage medium
EP4150636A1 (en) Medical device cybersecurity platform
JP4215255B2 (en) Degradation confirmation inspection method, degradation confirmation inspection system, and program therefor
CN111445265A (en) House purchasing method and device based on block chain
CN111199390A (en) Invoice reimbursement method and device, storage medium and electronic equipment
CN115774881A (en) Code auditing method, device, equipment and medium
CN113672512A (en) Code inspection rule generating method, code inspection method, device and medium
Gallina How to increase efficiency with the certification of process compliance
CN117171816B (en) Data verification method based on industrial identification and related equipment
CN112434900B (en) Information processing method and device, computer readable storage medium and equipment
Eitel Environmental Aware Vulnerability Scoring.
CN115129355B (en) Page repair method, system and computer equipment thereof
US20220108005A1 (en) Protecting software supply chain using secure log generated in a trusted build environment
CN110348548A (en) A kind of transmission method for realizing multi-mass work label point information by planar bar code technology
Kosman A two‐step methodology to reduce requirement defects
CN114218093A (en) SDLC-based software development safety testing method and system
Yi et al. Jeu de mots paronomasia a StackOverflow-driven bug discovery approach

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20220107