1289 lines
34 KiB
Go
1289 lines
34 KiB
Go
package scanner
|
||
|
||
import (
|
||
"bufio"
|
||
"bytes"
|
||
"context"
|
||
"encoding/json"
|
||
"fmt"
|
||
"io/ioutil"
|
||
"net"
|
||
"os"
|
||
"path/filepath"
|
||
"regexp"
|
||
"strconv"
|
||
"strings"
|
||
"sync"
|
||
"time"
|
||
|
||
"github.com/aquasecurity/fanal/analyzer"
|
||
dio "github.com/aquasecurity/go-dep-parser/pkg/io"
|
||
|
||
"github.com/future-architect/vuls/config"
|
||
"github.com/future-architect/vuls/constant"
|
||
"github.com/future-architect/vuls/logging"
|
||
"github.com/future-architect/vuls/models"
|
||
"github.com/future-architect/vuls/util"
|
||
"golang.org/x/sync/semaphore"
|
||
"golang.org/x/xerrors"
|
||
|
||
// Import library scanner
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/dotnet/nuget"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/golang/binary"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/golang/mod"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/java/jar"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/java/pom"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/nodejs/npm"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/nodejs/yarn"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/php/composer"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/python/pip"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/python/pipenv"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/python/poetry"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/ruby/bundler"
|
||
_ "github.com/aquasecurity/fanal/analyzer/language/rust/cargo"
|
||
|
||
// _ "github.com/aquasecurity/fanal/analyzer/language/ruby/gemspec"
|
||
// _ "github.com/aquasecurity/fanal/analyzer/language/nodejs/pkg"
|
||
// _ "github.com/aquasecurity/fanal/analyzer/language/python/packaging"
|
||
|
||
nmap "github.com/Ullaakut/nmap/v2"
|
||
)
|
||
|
||
type base struct {
|
||
ServerInfo config.ServerInfo
|
||
Distro config.Distro
|
||
Platform models.Platform
|
||
osPackages
|
||
LibraryScanners []models.LibraryScanner
|
||
WordPress models.WordPressPackages
|
||
|
||
log logging.Logger
|
||
errs []error
|
||
warns []error
|
||
}
|
||
|
||
// osPackages is included by base struct
|
||
type osPackages struct {
|
||
// installed packages
|
||
Packages models.Packages
|
||
|
||
// installed source packages (Debian based only)
|
||
SrcPackages models.SrcPackages
|
||
|
||
// enabled dnf modules or packages
|
||
EnabledDnfModules []string
|
||
|
||
// Detected Vulnerabilities Key: CVE-ID
|
||
VulnInfos models.VulnInfos
|
||
|
||
// kernel information
|
||
Kernel models.Kernel
|
||
}
|
||
|
||
func (l *base) exec(cmd string, sudo bool) execResult {
|
||
return exec(l.ServerInfo, cmd, sudo, l.log)
|
||
}
|
||
|
||
func (l *base) setServerInfo(c config.ServerInfo) {
|
||
l.ServerInfo = c
|
||
}
|
||
|
||
func (l *base) getServerInfo() config.ServerInfo {
|
||
return l.ServerInfo
|
||
}
|
||
|
||
func (l *base) setDistro(fam, rel string) {
|
||
d := config.Distro{
|
||
Family: fam,
|
||
Release: rel,
|
||
}
|
||
l.Distro = d
|
||
|
||
s := l.getServerInfo()
|
||
s.Distro = d
|
||
l.setServerInfo(s)
|
||
}
|
||
|
||
func (l *base) getDistro() config.Distro {
|
||
return l.Distro
|
||
}
|
||
|
||
func (l *base) setPlatform(p models.Platform) {
|
||
l.Platform = p
|
||
}
|
||
|
||
func (l *base) getPlatform() models.Platform {
|
||
return l.Platform
|
||
}
|
||
|
||
func (l *base) runningKernel() (release, version string, err error) {
|
||
r := l.exec("uname -r", noSudo)
|
||
if !r.isSuccess() {
|
||
return "", "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
release = strings.TrimSpace(r.Stdout)
|
||
|
||
switch l.Distro.Family {
|
||
case constant.Debian:
|
||
r := l.exec("uname -a", noSudo)
|
||
if !r.isSuccess() {
|
||
return "", "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
ss := strings.Fields(r.Stdout)
|
||
if 6 < len(ss) {
|
||
version = ss[6]
|
||
}
|
||
}
|
||
return
|
||
}
|
||
|
||
func (l *base) allContainers() (containers []config.Container, err error) {
|
||
switch l.ServerInfo.ContainerType {
|
||
case "", "docker":
|
||
stdout, err := l.dockerPs("-a --format '{{.ID}} {{.Names}} {{.Image}}'")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseDockerPs(stdout)
|
||
case "lxd":
|
||
stdout, err := l.lxdPs("-c n")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxdPs(stdout)
|
||
case "lxc":
|
||
stdout, err := l.lxcPs("-1")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxcPs(stdout)
|
||
default:
|
||
return containers, xerrors.Errorf(
|
||
"Not supported yet: %s", l.ServerInfo.ContainerType)
|
||
}
|
||
}
|
||
|
||
func (l *base) runningContainers() (containers []config.Container, err error) {
|
||
switch l.ServerInfo.ContainerType {
|
||
case "", "docker":
|
||
stdout, err := l.dockerPs("--format '{{.ID}} {{.Names}} {{.Image}}'")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseDockerPs(stdout)
|
||
case "lxd":
|
||
stdout, err := l.lxdPs("volatile.last_state.power=RUNNING -c n")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxdPs(stdout)
|
||
case "lxc":
|
||
stdout, err := l.lxcPs("-1 --running")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxcPs(stdout)
|
||
default:
|
||
return containers, xerrors.Errorf(
|
||
"Not supported yet: %s", l.ServerInfo.ContainerType)
|
||
}
|
||
}
|
||
|
||
func (l *base) exitedContainers() (containers []config.Container, err error) {
|
||
switch l.ServerInfo.ContainerType {
|
||
case "", "docker":
|
||
stdout, err := l.dockerPs("--filter 'status=exited' --format '{{.ID}} {{.Names}} {{.Image}}'")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseDockerPs(stdout)
|
||
case "lxd":
|
||
stdout, err := l.lxdPs("volatile.last_state.power=STOPPED -c n")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxdPs(stdout)
|
||
case "lxc":
|
||
stdout, err := l.lxcPs("-1 --stopped")
|
||
if err != nil {
|
||
return containers, err
|
||
}
|
||
return l.parseLxcPs(stdout)
|
||
default:
|
||
return containers, xerrors.Errorf(
|
||
"Not supported yet: %s", l.ServerInfo.ContainerType)
|
||
}
|
||
}
|
||
|
||
func (l *base) dockerPs(option string) (string, error) {
|
||
cmd := fmt.Sprintf("docker ps %s", option)
|
||
r := l.exec(cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) lxdPs(option string) (string, error) {
|
||
cmd := fmt.Sprintf("lxc list %s", option)
|
||
r := l.exec(cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) lxcPs(option string) (string, error) {
|
||
cmd := fmt.Sprintf("lxc-ls %s 2>/dev/null", option)
|
||
r := l.exec(cmd, sudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) parseDockerPs(stdout string) (containers []config.Container, err error) {
|
||
lines := strings.Split(stdout, "\n")
|
||
for _, line := range lines {
|
||
fields := strings.Fields(line)
|
||
if len(fields) == 0 {
|
||
break
|
||
}
|
||
if len(fields) != 3 {
|
||
return containers, xerrors.Errorf("Unknown format: %s", line)
|
||
}
|
||
containers = append(containers, config.Container{
|
||
ContainerID: fields[0],
|
||
Name: fields[1],
|
||
Image: fields[2],
|
||
})
|
||
}
|
||
return
|
||
}
|
||
|
||
func (l *base) parseLxdPs(stdout string) (containers []config.Container, err error) {
|
||
lines := strings.Split(stdout, "\n")
|
||
for i, line := range lines[3:] {
|
||
if i%2 == 1 {
|
||
continue
|
||
}
|
||
fields := strings.Fields(strings.Replace(line, "|", " ", -1))
|
||
if len(fields) == 0 {
|
||
break
|
||
}
|
||
if len(fields) != 1 {
|
||
return containers, xerrors.Errorf("Unknown format: %s", line)
|
||
}
|
||
containers = append(containers, config.Container{
|
||
ContainerID: fields[0],
|
||
Name: fields[0],
|
||
})
|
||
}
|
||
return
|
||
}
|
||
|
||
func (l *base) parseLxcPs(stdout string) (containers []config.Container, err error) {
|
||
lines := strings.Split(stdout, "\n")
|
||
for _, line := range lines {
|
||
fields := strings.Fields(line)
|
||
if len(fields) == 0 {
|
||
break
|
||
}
|
||
containers = append(containers, config.Container{
|
||
ContainerID: fields[0],
|
||
Name: fields[0],
|
||
})
|
||
}
|
||
return
|
||
}
|
||
|
||
// ip executes ip command and returns IP addresses
|
||
func (l *base) ip() ([]string, []string, error) {
|
||
// e.g.
|
||
// 2: eth0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP qlen 1000\ link/ether 52:54:00:2a:86:4c brd ff:ff:ff:ff:ff:ff
|
||
// 2: eth0 inet 10.0.2.15/24 brd 10.0.2.255 scope global eth0
|
||
// 2: eth0 inet6 fe80::5054:ff:fe2a:864c/64 scope link \ valid_lft forever preferred_lft forever
|
||
r := l.exec("/sbin/ip -o addr", noSudo)
|
||
if !r.isSuccess() {
|
||
return nil, nil, xerrors.Errorf("Failed to detect IP address: %v", r)
|
||
}
|
||
ipv4Addrs, ipv6Addrs := l.parseIP(r.Stdout)
|
||
return ipv4Addrs, ipv6Addrs, nil
|
||
}
|
||
|
||
// parseIP parses the results of ip command
|
||
func (l *base) parseIP(stdout string) (ipv4Addrs []string, ipv6Addrs []string) {
|
||
lines := strings.Split(stdout, "\n")
|
||
for _, line := range lines {
|
||
fields := strings.Fields(line)
|
||
if len(fields) < 4 {
|
||
continue
|
||
}
|
||
ip, _, err := net.ParseCIDR(fields[3])
|
||
if err != nil {
|
||
continue
|
||
}
|
||
if !ip.IsGlobalUnicast() {
|
||
continue
|
||
}
|
||
if ipv4 := ip.To4(); ipv4 != nil {
|
||
ipv4Addrs = append(ipv4Addrs, ipv4.String())
|
||
} else {
|
||
ipv6Addrs = append(ipv6Addrs, ip.String())
|
||
}
|
||
}
|
||
return
|
||
}
|
||
|
||
func (l *base) detectPlatform() {
|
||
if l.getServerInfo().Mode.IsOffline() {
|
||
l.setPlatform(models.Platform{Name: "unknown"})
|
||
return
|
||
}
|
||
ok, instanceID, err := l.detectRunningOnAws()
|
||
if err != nil {
|
||
l.setPlatform(models.Platform{Name: "other"})
|
||
return
|
||
}
|
||
if ok {
|
||
l.setPlatform(models.Platform{
|
||
Name: "aws",
|
||
InstanceID: instanceID,
|
||
})
|
||
return
|
||
}
|
||
|
||
//TODO Azure, GCP...
|
||
l.setPlatform(models.Platform{Name: "other"})
|
||
return
|
||
}
|
||
|
||
var dsFingerPrintPrefix = "AgentStatus.agentCertHash: "
|
||
|
||
func (l *base) detectDeepSecurity() (string, error) {
|
||
// only work root user
|
||
if l.getServerInfo().Mode.IsFastRoot() {
|
||
if r := l.exec("test -f /opt/ds_agent/dsa_query", sudo); r.isSuccess() {
|
||
cmd := fmt.Sprintf(`/opt/ds_agent/dsa_query -c "GetAgentStatus" | grep %q`, dsFingerPrintPrefix)
|
||
r := l.exec(cmd, sudo)
|
||
if r.isSuccess() {
|
||
line := strings.TrimSpace(r.Stdout)
|
||
return line[len(dsFingerPrintPrefix):], nil
|
||
}
|
||
l.warns = append(l.warns, xerrors.New("Fail to retrieve deepsecurity fingerprint"))
|
||
}
|
||
}
|
||
return "", xerrors.Errorf("Failed to detect deepsecurity %s", l.ServerInfo.ServerName)
|
||
}
|
||
|
||
func (l *base) detectIPS() {
|
||
ips := map[string]string{}
|
||
fingerprint, err := l.detectDeepSecurity()
|
||
if err != nil {
|
||
return
|
||
}
|
||
ips[constant.DeepSecurity] = fingerprint
|
||
l.ServerInfo.IPSIdentifiers = ips
|
||
}
|
||
|
||
func (l *base) detectRunningOnAws() (ok bool, instanceID string, err error) {
|
||
if r := l.exec("type curl", noSudo); r.isSuccess() {
|
||
cmd := "curl --max-time 1 --noproxy 169.254.169.254 http://169.254.169.254/latest/meta-data/instance-id"
|
||
r := l.exec(cmd, noSudo)
|
||
if r.isSuccess() {
|
||
id := strings.TrimSpace(r.Stdout)
|
||
if !l.isAwsInstanceID(id) {
|
||
return false, "", nil
|
||
}
|
||
return true, id, nil
|
||
}
|
||
|
||
switch r.ExitStatus {
|
||
case 28, 7:
|
||
// Not running on AWS
|
||
// 7 Failed to connect to host.
|
||
// 28 operation timeout.
|
||
return false, "", nil
|
||
}
|
||
}
|
||
|
||
if r := l.exec("type wget", noSudo); r.isSuccess() {
|
||
cmd := "wget --tries=3 --timeout=1 --no-proxy -q -O - http://169.254.169.254/latest/meta-data/instance-id"
|
||
r := l.exec(cmd, noSudo)
|
||
if r.isSuccess() {
|
||
id := strings.TrimSpace(r.Stdout)
|
||
if !l.isAwsInstanceID(id) {
|
||
return false, "", nil
|
||
}
|
||
return true, id, nil
|
||
}
|
||
|
||
switch r.ExitStatus {
|
||
case 4, 8:
|
||
// Not running on AWS
|
||
// 4 Network failure
|
||
// 8 Server issued an error response.
|
||
return false, "", nil
|
||
}
|
||
}
|
||
return false, "", xerrors.Errorf(
|
||
"Failed to curl or wget to AWS instance metadata on %s. container: %s",
|
||
l.ServerInfo.ServerName, l.ServerInfo.Container.Name)
|
||
}
|
||
|
||
// http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/resource-ids.html
|
||
var awsInstanceIDPattern = regexp.MustCompile(`^i-[0-9a-f]+$`)
|
||
|
||
func (l *base) isAwsInstanceID(str string) bool {
|
||
return awsInstanceIDPattern.MatchString(str)
|
||
}
|
||
|
||
func (l *base) convertToModel() models.ScanResult {
|
||
ctype := l.ServerInfo.ContainerType
|
||
if l.ServerInfo.Container.ContainerID != "" && ctype == "" {
|
||
ctype = "docker"
|
||
}
|
||
container := models.Container{
|
||
ContainerID: l.ServerInfo.Container.ContainerID,
|
||
Name: l.ServerInfo.Container.Name,
|
||
Image: l.ServerInfo.Container.Image,
|
||
Type: ctype,
|
||
}
|
||
|
||
errs, warns := []string{}, []string{}
|
||
for _, e := range l.errs {
|
||
errs = append(errs, fmt.Sprintf("%+v", e))
|
||
}
|
||
for _, w := range l.warns {
|
||
warns = append(warns, fmt.Sprintf("%+v", w))
|
||
}
|
||
|
||
scannedVia := scannedViaRemote
|
||
if isLocalExec(l.ServerInfo.Port, l.ServerInfo.Host) {
|
||
scannedVia = scannedViaLocal
|
||
} else if l.ServerInfo.Type == constant.ServerTypePseudo {
|
||
scannedVia = scannedViaPseudo
|
||
}
|
||
|
||
return models.ScanResult{
|
||
JSONVersion: models.JSONVersion,
|
||
ServerName: l.ServerInfo.ServerName,
|
||
ScannedAt: time.Now(),
|
||
ScanMode: l.ServerInfo.Mode.String(),
|
||
Family: l.Distro.Family,
|
||
Release: l.Distro.Release,
|
||
Container: container,
|
||
Platform: l.Platform,
|
||
IPv4Addrs: l.ServerInfo.IPv4Addrs,
|
||
IPv6Addrs: l.ServerInfo.IPv6Addrs,
|
||
IPSIdentifiers: l.ServerInfo.IPSIdentifiers,
|
||
ScannedCves: l.VulnInfos,
|
||
ScannedVia: scannedVia,
|
||
RunningKernel: l.Kernel,
|
||
Packages: l.Packages,
|
||
SrcPackages: l.SrcPackages,
|
||
EnabledDnfModules: l.EnabledDnfModules,
|
||
WordPressPackages: l.WordPress,
|
||
LibraryScanners: l.LibraryScanners,
|
||
Optional: l.ServerInfo.Optional,
|
||
Errors: errs,
|
||
Warnings: warns,
|
||
}
|
||
}
|
||
|
||
func (l *base) setErrs(errs []error) {
|
||
l.errs = errs
|
||
}
|
||
|
||
func (l *base) getErrs() []error {
|
||
return l.errs
|
||
}
|
||
|
||
func (l *base) setLogger(logger logging.Logger) {
|
||
l.log = logger
|
||
}
|
||
|
||
const (
|
||
systemd = "systemd"
|
||
upstart = "upstart"
|
||
sysVinit = "init"
|
||
)
|
||
|
||
// https://unix.stackexchange.com/questions/196166/how-to-find-out-if-a-system-uses-sysv-upstart-or-systemd-initsystem
|
||
func (l *base) detectInitSystem() (string, error) {
|
||
var f func(string) (string, error)
|
||
f = func(cmd string) (string, error) {
|
||
r := l.exec(cmd, sudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to stat %s: %s", cmd, r)
|
||
}
|
||
scanner := bufio.NewScanner(strings.NewReader(r.Stdout))
|
||
scanner.Scan()
|
||
line := strings.TrimSpace(scanner.Text())
|
||
if strings.Contains(line, "systemd") {
|
||
return systemd, nil
|
||
} else if strings.Contains(line, "upstart") {
|
||
return upstart, nil
|
||
} else if strings.Contains(line, "File: ‘/proc/1/exe’ -> ‘/sbin/init’") ||
|
||
strings.Contains(line, "File: `/proc/1/exe' -> `/sbin/init'") {
|
||
return f("stat /sbin/init")
|
||
} else if line == "File: ‘/sbin/init’" ||
|
||
line == "File: `/sbin/init'" {
|
||
r := l.exec("/sbin/init --version", noSudo)
|
||
if r.isSuccess() {
|
||
if strings.Contains(r.Stdout, "upstart") {
|
||
return upstart, nil
|
||
}
|
||
}
|
||
return sysVinit, nil
|
||
}
|
||
return "", xerrors.Errorf("Failed to detect a init system: %s", line)
|
||
}
|
||
return f("stat /proc/1/exe")
|
||
}
|
||
|
||
func (l *base) detectServiceName(pid string) (string, error) {
|
||
cmd := fmt.Sprintf("systemctl status --quiet --no-pager %s", pid)
|
||
r := l.exec(cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to stat %s: %s", cmd, r)
|
||
}
|
||
return l.parseSystemctlStatus(r.Stdout), nil
|
||
}
|
||
|
||
func (l *base) parseSystemctlStatus(stdout string) string {
|
||
scanner := bufio.NewScanner(strings.NewReader(stdout))
|
||
scanner.Scan()
|
||
line := scanner.Text()
|
||
ss := strings.Fields(line)
|
||
if len(ss) < 2 || strings.HasPrefix(line, "Failed to get unit for PID") {
|
||
return ""
|
||
}
|
||
return ss[1]
|
||
}
|
||
|
||
// LibFile : library file content
|
||
type LibFile struct {
|
||
Contents []byte
|
||
Filemode os.FileMode
|
||
}
|
||
|
||
func (l *base) scanLibraries() (err error) {
|
||
if len(l.LibraryScanners) != 0 {
|
||
return nil
|
||
}
|
||
|
||
// library scan for servers need lockfiles
|
||
if len(l.ServerInfo.Lockfiles) == 0 && !l.ServerInfo.FindLock {
|
||
return nil
|
||
}
|
||
|
||
l.log.Info("Scanning Lockfile...")
|
||
|
||
libFilemap := map[string]LibFile{}
|
||
detectFiles := l.ServerInfo.Lockfiles
|
||
|
||
// auto detect lockfile
|
||
if l.ServerInfo.FindLock {
|
||
findopt := ""
|
||
for filename := range models.LibraryMap {
|
||
findopt += fmt.Sprintf("-name %q -o ", "*"+filename)
|
||
}
|
||
|
||
// delete last "-o "
|
||
// find / -name "*package-lock.json" -o -name "*yarn.lock" ... 2>&1 | grep -v "find: "
|
||
cmd := fmt.Sprintf(`find / ` + findopt[:len(findopt)-3] + ` 2>&1 | grep -v "find: "`)
|
||
r := exec(l.ServerInfo, cmd, noSudo)
|
||
if r.ExitStatus != 0 && r.ExitStatus != 1 {
|
||
return xerrors.Errorf("Failed to find lock files")
|
||
}
|
||
detectFiles = append(detectFiles, strings.Split(r.Stdout, "\n")...)
|
||
}
|
||
|
||
for _, path := range detectFiles {
|
||
if path == "" {
|
||
continue
|
||
}
|
||
|
||
if path, err = filepath.Abs(path); err != nil {
|
||
return xerrors.Errorf("Failed to abs the lockfile. err: %w, filepath: %s", err, path)
|
||
}
|
||
|
||
// skip already exist
|
||
if _, ok := libFilemap[path]; ok {
|
||
continue
|
||
}
|
||
|
||
var f LibFile
|
||
switch l.Distro.Family {
|
||
case constant.ServerTypePseudo:
|
||
fileinfo, err := os.Stat(path)
|
||
if err != nil {
|
||
return xerrors.Errorf("Failed to get target file info. err: %w, filepath: %s", err, path)
|
||
}
|
||
f.Filemode = fileinfo.Mode().Perm()
|
||
f.Contents, err = ioutil.ReadFile(path)
|
||
if err != nil {
|
||
return xerrors.Errorf("Failed to read target file contents. err: %w, filepath: %s", err, path)
|
||
}
|
||
default:
|
||
cmd := fmt.Sprintf(`stat -c "%%a" %s`, path)
|
||
r := exec(l.ServerInfo, cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return xerrors.Errorf("Failed to get target file permission: %s, filepath: %s", r, path)
|
||
}
|
||
permStr := fmt.Sprintf("0%s", strings.ReplaceAll(r.Stdout, "\n", ""))
|
||
perm, err := strconv.ParseUint(permStr, 8, 32)
|
||
if err != nil {
|
||
return xerrors.Errorf("Failed to parse permission string. err: %w, permission string: %s", err, permStr)
|
||
}
|
||
f.Filemode = os.FileMode(perm)
|
||
|
||
cmd = fmt.Sprintf("cat %s", path)
|
||
r = exec(l.ServerInfo, cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return xerrors.Errorf("Failed to get target file contents: %s, filepath: %s", r, path)
|
||
}
|
||
f.Contents = []byte(r.Stdout)
|
||
}
|
||
libFilemap[path] = f
|
||
}
|
||
|
||
var libraryScanners []models.LibraryScanner
|
||
if libraryScanners, err = AnalyzeLibraries(context.Background(), libFilemap, l.ServerInfo.Mode.IsOffline()); err != nil {
|
||
return err
|
||
}
|
||
l.LibraryScanners = append(l.LibraryScanners, libraryScanners...)
|
||
return nil
|
||
}
|
||
|
||
// AnalyzeLibraries : detects libs defined in lockfile
|
||
func AnalyzeLibraries(ctx context.Context, libFilemap map[string]LibFile, isOffline bool) (libraryScanners []models.LibraryScanner, err error) {
|
||
disabledAnalyzers := []analyzer.Type{
|
||
analyzer.TypeAlpine,
|
||
analyzer.TypeAlma,
|
||
analyzer.TypeAmazon,
|
||
analyzer.TypeDebian,
|
||
analyzer.TypePhoton,
|
||
analyzer.TypeCentOS,
|
||
analyzer.TypeFedora,
|
||
analyzer.TypeOracle,
|
||
analyzer.TypeRedHatBase,
|
||
analyzer.TypeRocky,
|
||
analyzer.TypeSUSE,
|
||
analyzer.TypeUbuntu,
|
||
analyzer.TypeApk,
|
||
analyzer.TypeDpkg,
|
||
analyzer.TypeRpm,
|
||
analyzer.TypeApkCommand,
|
||
analyzer.TypeYaml,
|
||
analyzer.TypeTOML,
|
||
analyzer.TypeJSON,
|
||
analyzer.TypeDockerfile,
|
||
analyzer.TypeHCL,
|
||
}
|
||
anal := analyzer.NewAnalyzerGroup(analyzer.GroupBuiltin, disabledAnalyzers)
|
||
|
||
for path, f := range libFilemap {
|
||
var wg sync.WaitGroup
|
||
result := new(analyzer.AnalysisResult)
|
||
if err := anal.AnalyzeFile(
|
||
ctx,
|
||
&wg,
|
||
semaphore.NewWeighted(1),
|
||
result,
|
||
"",
|
||
path,
|
||
&DummyFileInfo{size: int64(len(f.Contents)), filemode: f.Filemode},
|
||
func() (dio.ReadSeekCloserAt, error) { return dio.NopCloser(bytes.NewReader(f.Contents)), nil },
|
||
analyzer.AnalysisOptions{Offline: isOffline},
|
||
); err != nil {
|
||
return nil, xerrors.Errorf("Failed to get libs. err: %w", err)
|
||
}
|
||
wg.Wait()
|
||
|
||
libscan, err := convertLibWithScanner(result.Applications)
|
||
if err != nil {
|
||
return nil, xerrors.Errorf("Failed to convert libs. err: %w", err)
|
||
}
|
||
libraryScanners = append(libraryScanners, libscan...)
|
||
}
|
||
return libraryScanners, nil
|
||
}
|
||
|
||
// DummyFileInfo is a dummy struct for libscan
|
||
type DummyFileInfo struct {
|
||
size int64
|
||
filemode os.FileMode
|
||
}
|
||
|
||
// Name is
|
||
func (d *DummyFileInfo) Name() string { return "dummy" }
|
||
|
||
// Size is
|
||
func (d *DummyFileInfo) Size() int64 { return d.size }
|
||
|
||
// Mode is
|
||
func (d *DummyFileInfo) Mode() os.FileMode { return d.filemode }
|
||
|
||
//ModTime is
|
||
func (d *DummyFileInfo) ModTime() time.Time { return time.Now() }
|
||
|
||
// IsDir is
|
||
func (d *DummyFileInfo) IsDir() bool { return false }
|
||
|
||
//Sys is
|
||
func (d *DummyFileInfo) Sys() interface{} { return nil }
|
||
|
||
func (l *base) scanWordPress() error {
|
||
if l.ServerInfo.WordPress.IsZero() || l.ServerInfo.Type == constant.ServerTypePseudo {
|
||
return nil
|
||
}
|
||
l.log.Info("Scanning WordPress...")
|
||
cmd := fmt.Sprintf("sudo -u %s -i -- %s cli version --allow-root",
|
||
l.ServerInfo.WordPress.OSUser,
|
||
l.ServerInfo.WordPress.CmdPath)
|
||
if r := exec(l.ServerInfo, cmd, noSudo); !r.isSuccess() {
|
||
return xerrors.Errorf("Failed to exec `%s`. Check the OS user, command path of wp-cli, DocRoot and permission: %#v", cmd, l.ServerInfo.WordPress)
|
||
}
|
||
|
||
wp, err := l.detectWordPress()
|
||
if err != nil {
|
||
return xerrors.Errorf("Failed to scan wordpress: %w", err)
|
||
}
|
||
l.WordPress = *wp
|
||
return nil
|
||
}
|
||
|
||
func (l *base) detectWordPress() (*models.WordPressPackages, error) {
|
||
ver, err := l.detectWpCore()
|
||
if err != nil {
|
||
return nil, err
|
||
}
|
||
|
||
themes, err := l.detectWpThemes()
|
||
if err != nil {
|
||
return nil, err
|
||
}
|
||
|
||
plugins, err := l.detectWpPlugins()
|
||
if err != nil {
|
||
return nil, err
|
||
}
|
||
|
||
pkgs := models.WordPressPackages{
|
||
models.WpPackage{
|
||
Name: models.WPCore,
|
||
Version: ver,
|
||
Type: models.WPCore,
|
||
},
|
||
}
|
||
pkgs = append(pkgs, themes...)
|
||
pkgs = append(pkgs, plugins...)
|
||
return &pkgs, nil
|
||
}
|
||
|
||
func (l *base) detectWpCore() (string, error) {
|
||
cmd := fmt.Sprintf("sudo -u %s -i -- %s core version --path=%s --allow-root",
|
||
l.ServerInfo.WordPress.OSUser,
|
||
l.ServerInfo.WordPress.CmdPath,
|
||
l.ServerInfo.WordPress.DocRoot)
|
||
|
||
r := exec(l.ServerInfo, cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to get wp core version: %s", r)
|
||
}
|
||
return strings.TrimSpace(r.Stdout), nil
|
||
}
|
||
|
||
func (l *base) detectWpThemes() ([]models.WpPackage, error) {
|
||
cmd := fmt.Sprintf("sudo -u %s -i -- %s theme list --path=%s --format=json --allow-root 2>/dev/null",
|
||
l.ServerInfo.WordPress.OSUser,
|
||
l.ServerInfo.WordPress.CmdPath,
|
||
l.ServerInfo.WordPress.DocRoot)
|
||
|
||
var themes []models.WpPackage
|
||
r := exec(l.ServerInfo, cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return nil, xerrors.Errorf("Failed to get a list of WordPress plugins: %s", r)
|
||
}
|
||
err := json.Unmarshal([]byte(r.Stdout), &themes)
|
||
if err != nil {
|
||
return nil, xerrors.Errorf("Failed to unmarshal wp theme list: %w", err)
|
||
}
|
||
for i := range themes {
|
||
themes[i].Type = models.WPTheme
|
||
}
|
||
return themes, nil
|
||
}
|
||
|
||
func (l *base) detectWpPlugins() ([]models.WpPackage, error) {
|
||
cmd := fmt.Sprintf("sudo -u %s -i -- %s plugin list --path=%s --format=json --allow-root 2>/dev/null",
|
||
l.ServerInfo.WordPress.OSUser,
|
||
l.ServerInfo.WordPress.CmdPath,
|
||
l.ServerInfo.WordPress.DocRoot)
|
||
|
||
var plugins []models.WpPackage
|
||
r := exec(l.ServerInfo, cmd, noSudo)
|
||
if !r.isSuccess() {
|
||
return nil, xerrors.Errorf("Failed to wp plugin list: %s", r)
|
||
}
|
||
if err := json.Unmarshal([]byte(r.Stdout), &plugins); err != nil {
|
||
return nil, err
|
||
}
|
||
for i := range plugins {
|
||
plugins[i].Type = models.WPPlugin
|
||
}
|
||
return plugins, nil
|
||
}
|
||
|
||
func (l *base) scanPorts() (err error) {
|
||
l.log.Info("Scanning listen port...")
|
||
dest := l.detectScanDest()
|
||
open, err := l.execPortsScan(dest)
|
||
if err != nil {
|
||
return err
|
||
}
|
||
l.updatePortStatus(open)
|
||
|
||
return nil
|
||
}
|
||
|
||
func (l *base) detectScanDest() map[string][]string {
|
||
scanIPPortsMap := map[string][]string{}
|
||
|
||
for _, p := range l.osPackages.Packages {
|
||
if p.AffectedProcs == nil {
|
||
continue
|
||
}
|
||
for _, proc := range p.AffectedProcs {
|
||
if proc.ListenPortStats == nil {
|
||
continue
|
||
}
|
||
for _, port := range proc.ListenPortStats {
|
||
scanIPPortsMap[port.BindAddress] = append(scanIPPortsMap[port.BindAddress], port.Port)
|
||
}
|
||
}
|
||
}
|
||
|
||
scanDestIPPorts := map[string][]string{}
|
||
for addr, ports := range scanIPPortsMap {
|
||
if addr == "*" {
|
||
for _, addr := range l.ServerInfo.IPv4Addrs {
|
||
scanDestIPPorts[addr] = append(scanDestIPPorts[addr], ports...)
|
||
}
|
||
} else {
|
||
scanDestIPPorts[addr] = append(scanDestIPPorts[addr], ports...)
|
||
}
|
||
}
|
||
|
||
uniqScanDestIPPorts := map[string][]string{}
|
||
for i, scanDest := range scanDestIPPorts {
|
||
m := map[string]bool{}
|
||
for _, e := range scanDest {
|
||
if !m[e] {
|
||
m[e] = true
|
||
uniqScanDestIPPorts[i] = append(uniqScanDestIPPorts[i], e)
|
||
}
|
||
}
|
||
}
|
||
|
||
return uniqScanDestIPPorts
|
||
}
|
||
|
||
func (l *base) execPortsScan(scanDestIPPorts map[string][]string) ([]string, error) {
|
||
if l.getServerInfo().PortScan.IsUseExternalScanner {
|
||
listenIPPorts, err := l.execExternalPortScan(scanDestIPPorts)
|
||
if err != nil {
|
||
return []string{}, err
|
||
}
|
||
return listenIPPorts, nil
|
||
}
|
||
|
||
listenIPPorts, err := l.execNativePortScan(scanDestIPPorts)
|
||
if err != nil {
|
||
return []string{}, err
|
||
}
|
||
|
||
return listenIPPorts, nil
|
||
}
|
||
|
||
func (l *base) execNativePortScan(scanDestIPPorts map[string][]string) ([]string, error) {
|
||
l.log.Info("Using Port Scanner: Vuls built-in Scanner")
|
||
|
||
listenIPPorts := []string{}
|
||
|
||
for ip, ports := range scanDestIPPorts {
|
||
if !isLocalExec(l.ServerInfo.Port, l.ServerInfo.Host) && net.ParseIP(ip).IsLoopback() {
|
||
continue
|
||
}
|
||
|
||
for _, port := range ports {
|
||
scanDest := ip + ":" + port
|
||
isOpen, err := nativeScanPort(scanDest)
|
||
if err != nil {
|
||
return []string{}, err
|
||
}
|
||
|
||
if isOpen {
|
||
listenIPPorts = append(listenIPPorts, scanDest)
|
||
}
|
||
}
|
||
}
|
||
|
||
return listenIPPorts, nil
|
||
}
|
||
|
||
func nativeScanPort(scanDest string) (bool, error) {
|
||
conn, err := net.DialTimeout("tcp", scanDest, time.Duration(1)*time.Second)
|
||
if err != nil {
|
||
if strings.Contains(err.Error(), "i/o timeout") || strings.Contains(err.Error(), "connection refused") {
|
||
return false, nil
|
||
}
|
||
if strings.Contains(err.Error(), "too many open files") {
|
||
time.Sleep(time.Duration(1) * time.Second)
|
||
return nativeScanPort(scanDest)
|
||
}
|
||
return false, err
|
||
}
|
||
conn.Close()
|
||
|
||
return true, nil
|
||
}
|
||
|
||
func (l *base) execExternalPortScan(scanDestIPPorts map[string][]string) ([]string, error) {
|
||
portScanConf := l.getServerInfo().PortScan
|
||
l.log.Infof("Using Port Scanner: External Scanner(PATH: %s)", portScanConf.ScannerBinPath)
|
||
l.log.Infof("External Scanner Apply Options: Scan Techniques: %s, HasPrivileged: %t, Source Port: %s",
|
||
strings.Join(portScanConf.ScanTechniques, ","), portScanConf.HasPrivileged, portScanConf.SourcePort)
|
||
baseCmd := formatNmapOptionsToString(portScanConf)
|
||
|
||
listenIPPorts := []string{}
|
||
|
||
for ip, ports := range scanDestIPPorts {
|
||
if !isLocalExec(l.ServerInfo.Port, l.ServerInfo.Host) && net.ParseIP(ip).IsLoopback() {
|
||
continue
|
||
}
|
||
|
||
_, cancel := context.WithTimeout(context.Background(), 5*time.Minute)
|
||
defer cancel()
|
||
|
||
scanner, err := nmap.NewScanner(nmap.WithBinaryPath(portScanConf.ScannerBinPath))
|
||
if err != nil {
|
||
return []string{}, xerrors.Errorf("unable to create nmap scanner: %w", err)
|
||
}
|
||
|
||
scanTechnique, err := l.setScanTechniques()
|
||
if err != nil {
|
||
return []string{}, err
|
||
}
|
||
scanner.AddOptions(scanTechnique)
|
||
|
||
if portScanConf.HasPrivileged {
|
||
scanner.AddOptions(nmap.WithPrivileged())
|
||
} else {
|
||
scanner.AddOptions(nmap.WithUnprivileged())
|
||
}
|
||
|
||
if portScanConf.SourcePort != "" {
|
||
port, err := strconv.ParseUint(portScanConf.SourcePort, 10, 16)
|
||
if err != nil {
|
||
return []string{}, xerrors.Errorf("failed to strconv.ParseUint(%s, 10, 16) = %w", portScanConf.SourcePort, err)
|
||
}
|
||
scanner.AddOptions(nmap.WithSourcePort(uint16(port)))
|
||
}
|
||
|
||
cmd := []string{baseCmd}
|
||
if strings.Contains(ip, ":") {
|
||
scanner.AddOptions(nmap.WithTargets(ip[1:len(ip)-1]), nmap.WithPorts(ports...), nmap.WithIPv6Scanning())
|
||
cmd = append(cmd, "-p", strings.Join(ports, ","), ip[1:len(ip)-1])
|
||
} else {
|
||
scanner.AddOptions(nmap.WithTargets(ip), nmap.WithPorts(ports...))
|
||
cmd = append(cmd, "-p", strings.Join(ports, ","), ip)
|
||
}
|
||
|
||
l.log.Debugf("Executing... %s", strings.Replace(strings.Join(cmd, " "), "\n", "", -1))
|
||
result, warnings, err := scanner.Run()
|
||
if err != nil {
|
||
return []string{}, xerrors.Errorf("unable to run nmap scan: %w", err)
|
||
}
|
||
|
||
if warnings != nil {
|
||
l.log.Warnf("nmap scan warnings: %s", warnings)
|
||
}
|
||
|
||
for _, host := range result.Hosts {
|
||
if len(host.Ports) == 0 || len(host.Addresses) == 0 {
|
||
continue
|
||
}
|
||
|
||
for _, port := range host.Ports {
|
||
if strings.Contains(string(port.Status()), string(nmap.Open)) {
|
||
scanDest := fmt.Sprintf("%s:%d", ip, port.ID)
|
||
listenIPPorts = append(listenIPPorts, scanDest)
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
return listenIPPorts, nil
|
||
}
|
||
|
||
func formatNmapOptionsToString(conf *config.PortScanConf) string {
|
||
cmd := []string{conf.ScannerBinPath}
|
||
if len(conf.ScanTechniques) != 0 {
|
||
for _, technique := range conf.ScanTechniques {
|
||
cmd = append(cmd, "-"+technique)
|
||
}
|
||
}
|
||
|
||
if conf.SourcePort != "" {
|
||
cmd = append(cmd, "--source-port "+conf.SourcePort)
|
||
}
|
||
|
||
if conf.HasPrivileged {
|
||
cmd = append(cmd, "--privileged")
|
||
}
|
||
|
||
return strings.Join(cmd, " ")
|
||
}
|
||
|
||
func (l *base) setScanTechniques() (func(*nmap.Scanner), error) {
|
||
scanTechniques := l.getServerInfo().PortScan.GetScanTechniques()
|
||
|
||
if len(scanTechniques) == 0 {
|
||
if l.getServerInfo().PortScan.HasPrivileged {
|
||
return nmap.WithSYNScan(), nil
|
||
}
|
||
return nmap.WithConnectScan(), nil
|
||
}
|
||
|
||
for _, technique := range scanTechniques {
|
||
switch technique {
|
||
case config.TCPSYN:
|
||
return nmap.WithSYNScan(), nil
|
||
case config.TCPConnect:
|
||
return nmap.WithConnectScan(), nil
|
||
case config.TCPACK:
|
||
return nmap.WithACKScan(), nil
|
||
case config.TCPWindow:
|
||
return nmap.WithWindowScan(), nil
|
||
case config.TCPMaimon:
|
||
return nmap.WithMaimonScan(), nil
|
||
case config.TCPNull:
|
||
return nmap.WithTCPNullScan(), nil
|
||
case config.TCPFIN:
|
||
return nmap.WithTCPFINScan(), nil
|
||
case config.TCPXmas:
|
||
return nmap.WithTCPXmasScan(), nil
|
||
}
|
||
}
|
||
|
||
return nil, xerrors.Errorf("Failed to setScanTechniques. There is an unsupported option in ScanTechniques.")
|
||
}
|
||
|
||
func (l *base) updatePortStatus(listenIPPorts []string) {
|
||
for name, p := range l.osPackages.Packages {
|
||
if p.AffectedProcs == nil {
|
||
continue
|
||
}
|
||
for i, proc := range p.AffectedProcs {
|
||
if proc.ListenPortStats == nil {
|
||
continue
|
||
}
|
||
for j, port := range proc.ListenPortStats {
|
||
l.osPackages.Packages[name].AffectedProcs[i].ListenPortStats[j].PortReachableTo = l.findPortTestSuccessOn(listenIPPorts, port)
|
||
}
|
||
}
|
||
}
|
||
}
|
||
|
||
func (l *base) findPortTestSuccessOn(listenIPPorts []string, searchListenPort models.PortStat) []string {
|
||
addrs := []string{}
|
||
|
||
for _, ipPort := range listenIPPorts {
|
||
ipPort, err := models.NewPortStat(ipPort)
|
||
if err != nil {
|
||
l.log.Warnf("Failed to find: %+v", err)
|
||
continue
|
||
}
|
||
if searchListenPort.BindAddress == "*" {
|
||
if searchListenPort.Port == ipPort.Port {
|
||
addrs = append(addrs, ipPort.BindAddress)
|
||
}
|
||
} else if searchListenPort.BindAddress == ipPort.BindAddress && searchListenPort.Port == ipPort.Port {
|
||
addrs = append(addrs, ipPort.BindAddress)
|
||
}
|
||
}
|
||
|
||
return addrs
|
||
}
|
||
|
||
func (l *base) ps() (string, error) {
|
||
cmd := `LANGUAGE=en_US.UTF-8 ps --no-headers --ppid 2 -p 2 --deselect -o pid,comm`
|
||
r := l.exec(util.PrependProxyEnv(cmd), noSudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) parsePs(stdout string) map[string]string {
|
||
pidNames := map[string]string{}
|
||
scanner := bufio.NewScanner(strings.NewReader(stdout))
|
||
for scanner.Scan() {
|
||
line := strings.TrimSpace(scanner.Text())
|
||
ss := strings.Fields(line)
|
||
if len(ss) < 2 {
|
||
continue
|
||
}
|
||
pidNames[ss[0]] = ss[1]
|
||
}
|
||
return pidNames
|
||
}
|
||
|
||
func (l *base) lsProcExe(pid string) (string, error) {
|
||
cmd := fmt.Sprintf("ls -l /proc/%s/exe", pid)
|
||
r := l.exec(util.PrependProxyEnv(cmd), sudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) parseLsProcExe(stdout string) (string, error) {
|
||
ss := strings.Fields(stdout)
|
||
if len(ss) < 11 {
|
||
return "", xerrors.Errorf("Unknown format: %s", stdout)
|
||
}
|
||
return ss[10], nil
|
||
}
|
||
|
||
func (l *base) grepProcMap(pid string) (string, error) {
|
||
cmd := fmt.Sprintf(`cat /proc/%s/maps 2>/dev/null | grep -v " 00:00 " | awk '{print $6}' | sort -n | uniq`, pid)
|
||
r := l.exec(util.PrependProxyEnv(cmd), sudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to SSH: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) parseGrepProcMap(stdout string) (soPaths []string) {
|
||
scanner := bufio.NewScanner(strings.NewReader(stdout))
|
||
for scanner.Scan() {
|
||
line := strings.TrimSpace(scanner.Text())
|
||
line = strings.Split(line, ";")[0]
|
||
soPaths = append(soPaths, line)
|
||
}
|
||
return soPaths
|
||
}
|
||
|
||
func (l *base) lsOfListen() (string, error) {
|
||
cmd := `lsof -i -P -n`
|
||
r := l.exec(util.PrependProxyEnv(cmd), sudo)
|
||
if !r.isSuccess() {
|
||
return "", xerrors.Errorf("Failed to lsof: %s", r)
|
||
}
|
||
return r.Stdout, nil
|
||
}
|
||
|
||
func (l *base) parseLsOf(stdout string) map[string][]string {
|
||
portPids := map[string][]string{}
|
||
scanner := bufio.NewScanner(strings.NewReader(stdout))
|
||
for scanner.Scan() {
|
||
line := scanner.Text()
|
||
if !strings.Contains(line, "LISTEN") {
|
||
continue
|
||
}
|
||
ss := strings.Fields(line)
|
||
if len(ss) < 10 {
|
||
continue
|
||
}
|
||
pid, ipPort := ss[1], ss[8]
|
||
portPids[ipPort] = util.AppendIfMissing(portPids[ipPort], pid)
|
||
}
|
||
return portPids
|
||
}
|
||
|
||
func (l *base) pkgPs(getOwnerPkgs func([]string) ([]string, error)) error {
|
||
stdout, err := l.ps()
|
||
if err != nil {
|
||
return xerrors.Errorf("Failed to pkgPs: %w", err)
|
||
}
|
||
pidNames := l.parsePs(stdout)
|
||
pidLoadedFiles := map[string][]string{}
|
||
for pid := range pidNames {
|
||
stdout := ""
|
||
stdout, err = l.lsProcExe(pid)
|
||
if err != nil {
|
||
l.log.Debugf("Failed to exec ls -l /proc/%s/exe err: %+v", pid, err)
|
||
continue
|
||
}
|
||
s, err := l.parseLsProcExe(stdout)
|
||
if err != nil {
|
||
l.log.Debugf("Failed to parse /proc/%s/exe: %+v", pid, err)
|
||
continue
|
||
}
|
||
pidLoadedFiles[pid] = append(pidLoadedFiles[pid], s)
|
||
|
||
stdout, err = l.grepProcMap(pid)
|
||
if err != nil {
|
||
l.log.Debugf("Failed to exec /proc/%s/maps: %+v", pid, err)
|
||
continue
|
||
}
|
||
ss := l.parseGrepProcMap(stdout)
|
||
pidLoadedFiles[pid] = append(pidLoadedFiles[pid], ss...)
|
||
}
|
||
|
||
pidListenPorts := map[string][]models.PortStat{}
|
||
stdout, err = l.lsOfListen()
|
||
if err != nil {
|
||
// warning only, continue scanning
|
||
l.log.Warnf("Failed to lsof: %+v", err)
|
||
}
|
||
portPids := l.parseLsOf(stdout)
|
||
for ipPort, pids := range portPids {
|
||
for _, pid := range pids {
|
||
portStat, err := models.NewPortStat(ipPort)
|
||
if err != nil {
|
||
l.log.Warnf("Failed to parse ip:port: %s, err: %+v", ipPort, err)
|
||
continue
|
||
}
|
||
pidListenPorts[pid] = append(pidListenPorts[pid], *portStat)
|
||
}
|
||
}
|
||
|
||
for pid, loadedFiles := range pidLoadedFiles {
|
||
pkgNames, err := getOwnerPkgs(loadedFiles)
|
||
if err != nil {
|
||
l.log.Warnf("Failed to get owner pkgs of: %s", loadedFiles)
|
||
continue
|
||
}
|
||
uniq := map[string]struct{}{}
|
||
for _, name := range pkgNames {
|
||
uniq[name] = struct{}{}
|
||
}
|
||
|
||
procName := ""
|
||
if _, ok := pidNames[pid]; ok {
|
||
procName = pidNames[pid]
|
||
}
|
||
proc := models.AffectedProcess{
|
||
PID: pid,
|
||
Name: procName,
|
||
ListenPortStats: pidListenPorts[pid],
|
||
}
|
||
|
||
for name := range uniq {
|
||
p, ok := l.Packages[name]
|
||
if !ok {
|
||
l.log.Warnf("Failed to find a running pkg: %s", name)
|
||
continue
|
||
}
|
||
p.AffectedProcs = append(p.AffectedProcs, proc)
|
||
l.Packages[p.Name] = p
|
||
}
|
||
}
|
||
return nil
|
||
}
|