223 lines
5.5 KiB
Go
223 lines
5.5 KiB
Go
/* Vuls - Vulnerability Scanner
|
|
Copyright (C) 2016 Future Architect, Inc. Japan.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package scan
|
|
|
|
import (
|
|
"fmt"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/cveapi"
|
|
"github.com/future-architect/vuls/models"
|
|
)
|
|
|
|
type linux struct {
|
|
ServerInfo config.ServerInfo
|
|
|
|
Family string
|
|
Release string
|
|
osPackages
|
|
log *logrus.Entry
|
|
|
|
errs []error
|
|
}
|
|
|
|
func (l *linux) ssh(cmd string, sudo bool) sshResult {
|
|
return sshExec(l.ServerInfo, cmd, sudo, l.log)
|
|
}
|
|
|
|
func (l *linux) setServerInfo(c config.ServerInfo) {
|
|
l.ServerInfo = c
|
|
}
|
|
|
|
func (l linux) getServerInfo() config.ServerInfo {
|
|
return l.ServerInfo
|
|
}
|
|
|
|
func (l *linux) setDistributionInfo(fam, rel string) {
|
|
l.Family = fam
|
|
l.Release = rel
|
|
}
|
|
|
|
func (l *linux) getDistributionInfo() string {
|
|
return fmt.Sprintf("%s %s", l.Family, l.Release)
|
|
}
|
|
|
|
func (l linux) allContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("-a --format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *linux) runningContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("--format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *linux) exitedContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("--filter 'status=exited' --format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *linux) dockerPs(option string) (string, error) {
|
|
cmd := fmt.Sprintf("docker ps %s", option)
|
|
r := l.ssh(cmd, noSudo)
|
|
if !r.isSuccess() {
|
|
return "", fmt.Errorf(
|
|
"Failed to %s. status: %d, stdout: %s, stderr: %s",
|
|
cmd, r.ExitStatus, r.Stdout, r.Stderr)
|
|
}
|
|
return r.Stdout, nil
|
|
}
|
|
|
|
func (l *linux) parseDockerPs(stdout string) (containers []config.Container, err error) {
|
|
lines := strings.Split(stdout, "\n")
|
|
for _, line := range lines {
|
|
fields := strings.Fields(line)
|
|
if len(fields) == 0 {
|
|
break
|
|
}
|
|
if len(fields) != 2 {
|
|
return containers, fmt.Errorf("Unknown format: %s", line)
|
|
}
|
|
containers = append(containers, config.Container{
|
|
ContainerID: fields[0],
|
|
Name: fields[1],
|
|
})
|
|
}
|
|
return
|
|
}
|
|
|
|
func (l *linux) convertToModel() (models.ScanResult, error) {
|
|
var cves, unknownScoreCves []models.CveInfo
|
|
for _, p := range l.UnsecurePackages {
|
|
if p.CveDetail.CvssScore(config.Conf.Lang) < 0 {
|
|
unknownScoreCves = append(unknownScoreCves, models.CveInfo{
|
|
CveDetail: p.CveDetail,
|
|
Packages: p.Packs,
|
|
DistroAdvisories: p.DistroAdvisories, // only Amazon Linux
|
|
})
|
|
continue
|
|
}
|
|
|
|
cpenames := []models.CpeName{}
|
|
for _, cpename := range p.CpeNames {
|
|
cpenames = append(cpenames,
|
|
models.CpeName{Name: cpename})
|
|
}
|
|
|
|
cve := models.CveInfo{
|
|
CveDetail: p.CveDetail,
|
|
Packages: p.Packs,
|
|
DistroAdvisories: p.DistroAdvisories, // only Amazon Linux
|
|
CpeNames: cpenames,
|
|
}
|
|
cves = append(cves, cve)
|
|
}
|
|
|
|
container := models.Container{
|
|
ContainerID: l.ServerInfo.Container.ContainerID,
|
|
Name: l.ServerInfo.Container.Name,
|
|
}
|
|
|
|
return models.ScanResult{
|
|
ServerName: l.ServerInfo.ServerName,
|
|
Family: l.Family,
|
|
Release: l.Release,
|
|
Container: container,
|
|
KnownCves: cves,
|
|
UnknownCves: unknownScoreCves,
|
|
}, nil
|
|
}
|
|
|
|
// scanVulnByCpeName search vulnerabilities that specified in config file.
|
|
func (l *linux) scanVulnByCpeName() error {
|
|
unsecurePacks := CvePacksList{}
|
|
|
|
serverInfo := l.getServerInfo()
|
|
cpeNames := serverInfo.CpeNames
|
|
|
|
// remove duplicate
|
|
set := map[string]CvePacksInfo{}
|
|
|
|
for _, name := range cpeNames {
|
|
details, err := cveapi.CveClient.FetchCveDetailsByCpeName(name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, detail := range details {
|
|
if val, ok := set[detail.CveID]; ok {
|
|
names := val.CpeNames
|
|
names = append(names, name)
|
|
val.CpeNames = names
|
|
set[detail.CveID] = val
|
|
} else {
|
|
set[detail.CveID] = CvePacksInfo{
|
|
CveID: detail.CveID,
|
|
CveDetail: detail,
|
|
CpeNames: []string{name},
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
for key := range set {
|
|
unsecurePacks = append(unsecurePacks, set[key])
|
|
}
|
|
unsecurePacks = append(unsecurePacks, l.UnsecurePackages...)
|
|
sort.Sort(CvePacksList(unsecurePacks))
|
|
l.setUnsecurePackages(unsecurePacks)
|
|
return nil
|
|
}
|
|
|
|
func (l *linux) setErrs(errs []error) {
|
|
l.errs = errs
|
|
}
|
|
|
|
func (l linux) getErrs() []error {
|
|
return l.errs
|
|
}
|