Codebase list faraday-plugins / 73546ee
New upstream release. Kali Janitor 2 years ago
6 changed file(s) with 48 addition(s) and 10 deletion(s). Raw diff Collapse all Expand all
0 support cve,cwe,cvss and metadata
0 Jan 13th, 2022
0 1.5.10 [Jan 13th, 2022]:
1 ---
2 * support cve,cwe,cvss and metadata
3
04 1.5.9 [Dec 27th, 2021]:
15 ---
2 * ADD cve in faraday_csv plugin
6 * Add cve in faraday_csv plugin
37 * ADD Grype plugin
48
59 1.5.8 [Dec 13th, 2021]:
0 faraday-plugins (1.5.10-0kali1) UNRELEASED; urgency=low
1
2 * New upstream release.
3
4 -- Kali Janitor <[email protected]> Sun, 23 Jan 2022 03:35:10 -0000
5
06 faraday-plugins (1.5.9-0kali1) kali-dev; urgency=medium
17
28 [ Ben Wilson ]
0 __version__ = '1.5.9'
0 __version__ = '1.5.10'
3232 super().__init__(*arg, **kwargs)
3333 self.id = "nuclei"
3434 self.name = "Nuclei"
35 self.plugin_version = "1.0.2"
36 self.version = "2.5.3"
35 self.plugin_version = "1.0.3"
36 self.version = "2.5.5"
3737 self.json_keys = {"matched-at", "template-id", "host"}
3838 self._command_regex = re.compile(r'^(sudo nuclei|nuclei|\.\/nuclei|^.*?nuclei)\s+.*?')
3939 self.xml_arg_re = re.compile(r"^.*(-o\s*[^\s]+).*$")
8787 references = [references]
8888 else:
8989 references = []
90 cwe = vuln_dict['info'].get('cwe', [])
91 capec = vuln_dict['info'].get('capec', [])
92 refs = sorted(list(set(reference + references + cwe + capec)))
90
91 cve = vuln_dict['info'].get('classification', {}).get('cve-id', [])
92 cve = [x.upper() for x in cve]
93
94 # TODO CVSSv2, CVSSv3, CWE and CAPEC
95 #cvssv2 = vuln_dict['info'].get('classification', {}).get('cvss-score')
96 #cvssv3 = vuln_dict['info'].get('classification', {}).get('cvss-metrics')
97 #cwe = vuln_dict['info'].get('classification', {}).get('cwe-id', [])
98 #cwe = [x.upper() for x in cwe]
99 #capec = vuln_dict['info'].get('metadata', {}).get('capec', [])
100 #if isinstance(capec, str):
101 # capec = capec.upper().split(',')
102
103 refs = sorted(list(set(reference + references)))
104 refs = list(filter(None, refs))
105
93106 tags = vuln_dict['info'].get('tags', [])
94107 if isinstance(tags, str):
95108 tags = tags.split(',')
96 impact = vuln_dict['info'].get('impact')
97 resolution = vuln_dict['info'].get('resolution', '')
98 easeofresolution = vuln_dict['info'].get('easeofresolution')
109
110 impact = {}
111 impacted = vuln_dict['info'].get('metadata', {}).get('impact')
112 if isinstance(impacted, str):
113 for x in impacted.split(','):
114 impact[x] = True
115
116 resolution = vuln_dict['info'].get('metadata', {}).get('resolution', '')
117 easeofresolution = vuln_dict['info'].get('metadata', {}).get('easeofresolution', None)
118
99119 request = vuln_dict.get('request', '')
100120 if request:
101121 method = request.split(" ")[0]
121141 impact=impact,
122142 resolution=resolution,
123143 easeofresolution=easeofresolution,
144 cve=cve,
145 # TODO CVSSv2, CVSSv3, CWE and CAPEC
146 #cvssv2=cvssv2,
147 #cvssv3=cvssv3,
148 #cwe=cwe,
149 #capec=capec,
124150 website=host,
125151 request=request,
126152 response=vuln_dict.get('response', ''),