* fix(report): fix cvedb-url, add -cvedb-type=http * feat(report): support go-exploitdb server mode * update deps * implement tui * fix server mode * fix(tui): default value of cvedb-type to "" * update deps
136 lines
3.8 KiB
Go
136 lines
3.8 KiB
Go
/* Vuls - Vulnerability Scanner
|
|
Copyright (C) 2016 Future Architect, Inc. Japan.
|
|
|
|
This program is free software: you can redistribute it and/or modify
|
|
it under the terms of the GNU General Public License as published by
|
|
the Free Software Foundation, either version 3 of the License, or
|
|
(at your option) any later version.
|
|
|
|
This program is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
GNU General Public License for more details.
|
|
|
|
You should have received a copy of the GNU General Public License
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
*/
|
|
|
|
package exploit
|
|
|
|
import (
|
|
"encoding/json"
|
|
"fmt"
|
|
"net/http"
|
|
|
|
cnf "github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/models"
|
|
"github.com/future-architect/vuls/util"
|
|
"github.com/mozqnet/go-exploitdb/db"
|
|
exploitmodels "github.com/mozqnet/go-exploitdb/models"
|
|
"github.com/parnurzeal/gorequest"
|
|
)
|
|
|
|
// FillWithExploit fills exploit information that has in Exploit
|
|
func FillWithExploit(driver db.DB, r *models.ScanResult) (nExploitCve int, err error) {
|
|
if cnf.Conf.Exploit.IsFetchViaHTTP() {
|
|
var cveIDs []string
|
|
for cveID := range r.ScannedCves {
|
|
cveIDs = append(cveIDs, cveID)
|
|
}
|
|
prefix, _ := util.URLPathJoin(cnf.Conf.Exploit.URL, "cves")
|
|
responses, err := getCvesViaHTTP(cveIDs, prefix)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
for _, res := range responses {
|
|
exps := []*exploitmodels.Exploit{}
|
|
if err := json.Unmarshal([]byte(res.json), &exps); err != nil {
|
|
return 0, err
|
|
}
|
|
exploits := convertToModels(exps)
|
|
v, ok := r.ScannedCves[res.request.cveID]
|
|
if ok {
|
|
v.Exploits = exploits
|
|
}
|
|
r.ScannedCves[res.request.cveID] = v
|
|
nExploitCve++
|
|
}
|
|
} else {
|
|
if driver == nil {
|
|
return 0, nil
|
|
}
|
|
for cveID, vuln := range r.ScannedCves {
|
|
es := driver.GetExploitByCveID(cveID)
|
|
if len(es) == 0 {
|
|
continue
|
|
}
|
|
exploits := convertToModels(es)
|
|
vuln.Exploits = exploits
|
|
r.ScannedCves[cveID] = vuln
|
|
nExploitCve++
|
|
}
|
|
}
|
|
return nExploitCve, nil
|
|
}
|
|
|
|
// convertToModels converts gost model to vuls model
|
|
func convertToModels(es []*exploitmodels.Exploit) (exploits []models.Exploit) {
|
|
for _, e := range es {
|
|
var documentURL, paperURL, shellURL *string
|
|
if e.OffensiveSecurity != nil {
|
|
os := e.OffensiveSecurity
|
|
if os.Document != nil {
|
|
documentURL = &os.Document.DocumentURL
|
|
}
|
|
if os.ShellCode != nil {
|
|
shellURL = &os.ShellCode.ShellCodeURL
|
|
}
|
|
if os.Paper != nil {
|
|
paperURL = &os.Paper.PaperURL
|
|
}
|
|
}
|
|
exploit := models.Exploit{
|
|
ExploitType: e.ExploitType,
|
|
ID: e.ExploitUniqueID,
|
|
URL: e.URL,
|
|
Description: e.Description,
|
|
DocumentURL: documentURL,
|
|
ShellCodeURL: shellURL,
|
|
PaperURL: paperURL,
|
|
}
|
|
exploits = append(exploits, exploit)
|
|
}
|
|
return exploits
|
|
}
|
|
|
|
// CheckHTTPHealth do health check
|
|
func CheckHTTPHealth() error {
|
|
if !cnf.Conf.Exploit.IsFetchViaHTTP() {
|
|
return nil
|
|
}
|
|
|
|
url := fmt.Sprintf("%s/health", cnf.Conf.Exploit.URL)
|
|
var errs []error
|
|
var resp *http.Response
|
|
resp, _, errs = gorequest.New().Get(url).End()
|
|
// resp, _, errs = gorequest.New().SetDebug(config.Conf.Debug).Get(url).End()
|
|
// resp, _, errs = gorequest.New().Proxy(api.httpProxy).Get(url).End()
|
|
if 0 < len(errs) || resp == nil || resp.StatusCode != 200 {
|
|
return fmt.Errorf("Failed to connect to exploit server. url: %s, errs: %v",
|
|
url, errs)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// CheckIfExploitFetched checks if oval entries are in DB by family, release.
|
|
func CheckIfExploitFetched(driver db.DB, osFamily string) (fetched bool, err error) {
|
|
//TODO
|
|
return true, nil
|
|
}
|
|
|
|
// CheckIfExploitFresh checks if oval entries are fresh enough
|
|
func CheckIfExploitFresh(driver db.DB, osFamily string) (ok bool, err error) {
|
|
//TODO
|
|
return true, nil
|
|
}
|