343 lines
8.1 KiB
Go
343 lines
8.1 KiB
Go
/* Vuls - Vulnerability Scanner
|
|
Copyright (C) 2016 Future Architect, Inc. Japan.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package scan
|
|
|
|
import (
|
|
"fmt"
|
|
"regexp"
|
|
"sort"
|
|
"strings"
|
|
"time"
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/cveapi"
|
|
"github.com/future-architect/vuls/models"
|
|
)
|
|
|
|
type base struct {
|
|
ServerInfo config.ServerInfo
|
|
Distro config.Distro
|
|
Platform models.Platform
|
|
|
|
lackDependencies []string
|
|
osPackages
|
|
|
|
log *logrus.Entry
|
|
errs []error
|
|
}
|
|
|
|
func (l *base) ssh(cmd string, sudo bool) sshResult {
|
|
return sshExec(l.ServerInfo, cmd, sudo, l.log)
|
|
}
|
|
|
|
func (l *base) setServerInfo(c config.ServerInfo) {
|
|
l.ServerInfo = c
|
|
}
|
|
|
|
func (l base) getServerInfo() config.ServerInfo {
|
|
return l.ServerInfo
|
|
}
|
|
|
|
func (l *base) setDistro(fam, rel string) {
|
|
d := config.Distro{
|
|
Family: fam,
|
|
Release: rel,
|
|
}
|
|
l.Distro = d
|
|
|
|
s := l.getServerInfo()
|
|
s.Distro = d
|
|
l.setServerInfo(s)
|
|
}
|
|
|
|
func (l base) getDistro() config.Distro {
|
|
return l.Distro
|
|
}
|
|
|
|
func (l *base) setPlatform(p models.Platform) {
|
|
l.Platform = p
|
|
}
|
|
|
|
func (l base) getPlatform() models.Platform {
|
|
return l.Platform
|
|
}
|
|
|
|
func (l base) getLackDependencies() []string {
|
|
return l.lackDependencies
|
|
}
|
|
|
|
func (l base) allContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("-a --format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *base) runningContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("--format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *base) exitedContainers() (containers []config.Container, err error) {
|
|
switch l.ServerInfo.Container.Type {
|
|
case "", "docker":
|
|
stdout, err := l.dockerPs("--filter 'status=exited' --format '{{.ID}} {{.Names}}'")
|
|
if err != nil {
|
|
return containers, err
|
|
}
|
|
return l.parseDockerPs(stdout)
|
|
default:
|
|
return containers, fmt.Errorf(
|
|
"Not supported yet: %s", l.ServerInfo.Container.Type)
|
|
}
|
|
}
|
|
|
|
func (l *base) dockerPs(option string) (string, error) {
|
|
cmd := fmt.Sprintf("docker ps %s", option)
|
|
r := l.ssh(cmd, noSudo)
|
|
if !r.isSuccess() {
|
|
return "", fmt.Errorf("Failed to SSH: %s", r)
|
|
}
|
|
return r.Stdout, nil
|
|
}
|
|
|
|
func (l *base) parseDockerPs(stdout string) (containers []config.Container, err error) {
|
|
lines := strings.Split(stdout, "\n")
|
|
for _, line := range lines {
|
|
fields := strings.Fields(line)
|
|
if len(fields) == 0 {
|
|
break
|
|
}
|
|
if len(fields) != 2 {
|
|
return containers, fmt.Errorf("Unknown format: %s", line)
|
|
}
|
|
containers = append(containers, config.Container{
|
|
ContainerID: fields[0],
|
|
Name: fields[1],
|
|
})
|
|
}
|
|
return
|
|
}
|
|
|
|
func (l *base) detectPlatform() error {
|
|
ok, instanceID, err := l.detectRunningOnAws()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if ok {
|
|
l.setPlatform(models.Platform{
|
|
Name: "aws",
|
|
InstanceID: instanceID,
|
|
})
|
|
return nil
|
|
}
|
|
|
|
//TODO Azure, GCP...
|
|
l.setPlatform(models.Platform{
|
|
Name: "other",
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func (l base) detectRunningOnAws() (ok bool, instanceID string, err error) {
|
|
if r := l.ssh("type curl", noSudo); r.isSuccess() {
|
|
cmd := "curl --max-time 1 --retry 3 --noproxy 169.254.169.254 http://169.254.169.254/latest/meta-data/instance-id"
|
|
r := l.ssh(cmd, noSudo)
|
|
if r.isSuccess() {
|
|
id := strings.TrimSpace(r.Stdout)
|
|
if !l.isAwsInstanceID(id) {
|
|
return false, "", nil
|
|
}
|
|
return true, id, nil
|
|
}
|
|
|
|
switch r.ExitStatus {
|
|
case 28, 7:
|
|
// Not running on AWS
|
|
// 7 Failed to connect to host.
|
|
// 28 operation timeout.
|
|
return false, "", nil
|
|
}
|
|
}
|
|
|
|
if r := l.ssh("type wget", noSudo); r.isSuccess() {
|
|
cmd := "wget --tries=3 --timeout=1 --no-proxy -q -O - http://169.254.169.254/latest/meta-data/instance-id"
|
|
r := l.ssh(cmd, noSudo)
|
|
if r.isSuccess() {
|
|
id := strings.TrimSpace(r.Stdout)
|
|
if !l.isAwsInstanceID(id) {
|
|
return false, "", nil
|
|
}
|
|
return true, id, nil
|
|
}
|
|
|
|
switch r.ExitStatus {
|
|
case 4, 8:
|
|
// Not running on AWS
|
|
// 4 Network failure
|
|
// 8 Server issued an error response.
|
|
return false, "", nil
|
|
}
|
|
}
|
|
return false, "", fmt.Errorf(
|
|
"Failed to curl or wget to AWS instance metadata on %s. container: %s",
|
|
l.ServerInfo.ServerName, l.ServerInfo.Container.Name)
|
|
}
|
|
|
|
// http://docs.aws.amazon.com/AWSEC2/latest/UserGuide/resource-ids.html
|
|
var awsInstanceIDPattern = regexp.MustCompile(`^i-[0-9a-f]+$`)
|
|
|
|
func (l base) isAwsInstanceID(str string) bool {
|
|
return awsInstanceIDPattern.MatchString(str)
|
|
}
|
|
|
|
func (l *base) convertToModel() (models.ScanResult, error) {
|
|
var scoredCves, unscoredCves, ignoredCves models.CveInfos
|
|
for _, p := range l.UnsecurePackages {
|
|
sort.Sort(models.PackageInfosByName(p.Packs))
|
|
|
|
// ignoreCves
|
|
found := false
|
|
for _, icve := range l.getServerInfo().IgnoreCves {
|
|
if icve == p.CveDetail.CveID {
|
|
ignoredCves = append(ignoredCves, models.CveInfo{
|
|
CveDetail: p.CveDetail,
|
|
Packages: p.Packs,
|
|
DistroAdvisories: p.DistroAdvisories,
|
|
})
|
|
found = true
|
|
break
|
|
}
|
|
}
|
|
if found {
|
|
continue
|
|
}
|
|
|
|
// unscoredCves
|
|
if p.CveDetail.CvssScore(config.Conf.Lang) <= 0 {
|
|
unscoredCves = append(unscoredCves, models.CveInfo{
|
|
CveDetail: p.CveDetail,
|
|
Packages: p.Packs,
|
|
DistroAdvisories: p.DistroAdvisories,
|
|
})
|
|
continue
|
|
}
|
|
|
|
cpenames := []models.CpeName{}
|
|
for _, cpename := range p.CpeNames {
|
|
cpenames = append(cpenames,
|
|
models.CpeName{Name: cpename})
|
|
}
|
|
|
|
// scoredCves
|
|
cve := models.CveInfo{
|
|
CveDetail: p.CveDetail,
|
|
Packages: p.Packs,
|
|
DistroAdvisories: p.DistroAdvisories,
|
|
CpeNames: cpenames,
|
|
}
|
|
scoredCves = append(scoredCves, cve)
|
|
}
|
|
|
|
container := models.Container{
|
|
ContainerID: l.ServerInfo.Container.ContainerID,
|
|
Name: l.ServerInfo.Container.Name,
|
|
}
|
|
|
|
sort.Sort(scoredCves)
|
|
sort.Sort(unscoredCves)
|
|
sort.Sort(ignoredCves)
|
|
|
|
return models.ScanResult{
|
|
ServerName: l.ServerInfo.ServerName,
|
|
ScannedAt: time.Now(),
|
|
Family: l.Distro.Family,
|
|
Release: l.Distro.Release,
|
|
Container: container,
|
|
Platform: l.Platform,
|
|
KnownCves: scoredCves,
|
|
UnknownCves: unscoredCves,
|
|
IgnoredCves: ignoredCves,
|
|
Optional: l.ServerInfo.Optional,
|
|
}, nil
|
|
}
|
|
|
|
// scanVulnByCpeName search vulnerabilities that specified in config file.
|
|
func (l *base) scanVulnByCpeName() error {
|
|
unsecurePacks := CvePacksList{}
|
|
|
|
serverInfo := l.getServerInfo()
|
|
cpeNames := serverInfo.CpeNames
|
|
|
|
// remove duplicate
|
|
set := map[string]CvePacksInfo{}
|
|
|
|
for _, name := range cpeNames {
|
|
details, err := cveapi.CveClient.FetchCveDetailsByCpeName(name)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for _, detail := range details {
|
|
if val, ok := set[detail.CveID]; ok {
|
|
names := val.CpeNames
|
|
names = append(names, name)
|
|
val.CpeNames = names
|
|
set[detail.CveID] = val
|
|
} else {
|
|
set[detail.CveID] = CvePacksInfo{
|
|
CveID: detail.CveID,
|
|
CveDetail: detail,
|
|
CpeNames: []string{name},
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
for key := range set {
|
|
unsecurePacks = append(unsecurePacks, set[key])
|
|
}
|
|
unsecurePacks = append(unsecurePacks, l.UnsecurePackages...)
|
|
l.setUnsecurePackages(unsecurePacks)
|
|
return nil
|
|
}
|
|
|
|
func (l *base) setErrs(errs []error) {
|
|
l.errs = errs
|
|
}
|
|
|
|
func (l base) getErrs() []error {
|
|
return l.errs
|
|
}
|