112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			112 lines
		
	
	
		
			3.8 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
/* Vuls - Vulnerability Scanner
 | 
						|
Copyright (C) 2018  Future Corporation , Japan.
 | 
						|
 | 
						|
This program is free software: you can redistribute it and/or modify
 | 
						|
it under the terms of the GNU General Public License as published by
 | 
						|
the Free Software Foundation, either version 3 of the License, or
 | 
						|
(at your option) any later version.
 | 
						|
 | 
						|
This program is distributed in the hope that it will be useful,
 | 
						|
but WITHOUT ANY WARRANTY; without even the implied warranty of
 | 
						|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 | 
						|
GNU General Public License for more details.
 | 
						|
 | 
						|
You should have received a copy of the GNU General Public License
 | 
						|
along with this program.  If not, see <http://www.gnu.org/licenses/>.
 | 
						|
*/
 | 
						|
 | 
						|
package report
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	syslog "github.com/RackSec/srslog"
 | 
						|
 | 
						|
	"github.com/pkg/errors"
 | 
						|
 | 
						|
	"github.com/future-architect/vuls/config"
 | 
						|
	"github.com/future-architect/vuls/models"
 | 
						|
)
 | 
						|
 | 
						|
// SyslogWriter send report to syslog
 | 
						|
type SyslogWriter struct{}
 | 
						|
 | 
						|
func (w SyslogWriter) Write(rs ...models.ScanResult) (err error) {
 | 
						|
	conf := config.Conf.Syslog
 | 
						|
	facility, _ := conf.GetFacility()
 | 
						|
	severity, _ := conf.GetSeverity()
 | 
						|
	raddr := fmt.Sprintf("%s:%s", conf.Host, conf.Port)
 | 
						|
 | 
						|
	sysLog, err := syslog.Dial(conf.Protocol, raddr, severity|facility, conf.Tag)
 | 
						|
	if err != nil {
 | 
						|
		return errors.Wrap(err, "Failed to initialize syslog client")
 | 
						|
	}
 | 
						|
 | 
						|
	for _, r := range rs {
 | 
						|
		messages := w.encodeSyslog(r)
 | 
						|
		for _, m := range messages {
 | 
						|
			if _, err = fmt.Fprintf(sysLog, m); err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func (w SyslogWriter) encodeSyslog(result models.ScanResult) (messages []string) {
 | 
						|
	ipv4Addrs := strings.Join(result.IPv4Addrs, ",")
 | 
						|
	ipv6Addrs := strings.Join(result.IPv6Addrs, ",")
 | 
						|
 | 
						|
	var commonKvPairs []string
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`scanned_at="%s"`, result.ScannedAt))
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`server_name="%s"`, result.ServerName))
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`os_family="%s"`, result.Family))
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`os_release="%s"`, result.Release))
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`ipv4_addr="%s"`, ipv4Addrs))
 | 
						|
	commonKvPairs = append(commonKvPairs, fmt.Sprintf(`ipv6_addr="%s"`, ipv6Addrs))
 | 
						|
 | 
						|
	for cveID, vinfo := range result.ScannedCves {
 | 
						|
		kvPairs := commonKvPairs
 | 
						|
 | 
						|
		var pkgNames []string
 | 
						|
		for _, pkg := range vinfo.AffectedPackages {
 | 
						|
			pkgNames = append(pkgNames, pkg.Name)
 | 
						|
		}
 | 
						|
		pkgs := strings.Join(pkgNames, ",")
 | 
						|
		kvPairs = append(kvPairs, fmt.Sprintf(`packages="%s"`, pkgs))
 | 
						|
 | 
						|
		kvPairs = append(kvPairs, fmt.Sprintf(`cve_id="%s"`, cveID))
 | 
						|
		for _, cvss := range vinfo.Cvss2Scores(result.Family) {
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`cvss_score_%s_v2="%.2f"`, cvss.Type, cvss.Value.Score))
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`cvss_vector_%s_v2="%s"`, cvss.Type, cvss.Value.Vector))
 | 
						|
		}
 | 
						|
 | 
						|
		for _, cvss := range vinfo.Cvss3Scores() {
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`cvss_score_%s_v3="%.2f"`, cvss.Type, cvss.Value.Score))
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`cvss_vector_%s_v3="%s"`, cvss.Type, cvss.Value.Vector))
 | 
						|
		}
 | 
						|
 | 
						|
		if content, ok := vinfo.CveContents[models.NvdXML]; ok {
 | 
						|
			cwes := strings.Join(content.CweIDs, ",")
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`cwe_ids="%s"`, cwes))
 | 
						|
			if config.Conf.Syslog.Verbose {
 | 
						|
				kvPairs = append(kvPairs, fmt.Sprintf(`source_link="%s"`, content.SourceLink))
 | 
						|
				kvPairs = append(kvPairs, fmt.Sprintf(`summary="%s"`, content.Summary))
 | 
						|
			}
 | 
						|
		}
 | 
						|
		if content, ok := vinfo.CveContents[models.RedHat]; ok {
 | 
						|
			kvPairs = append(kvPairs, fmt.Sprintf(`title="%s"`, content.Title))
 | 
						|
		}
 | 
						|
 | 
						|
		// message: key1="value1" key2="value2"...
 | 
						|
		messages = append(messages, strings.Join(kvPairs, " "))
 | 
						|
	}
 | 
						|
 | 
						|
	if len(messages) == 0 {
 | 
						|
		commonKvPairs = append(commonKvPairs, `message="No CVE-IDs are found"`)
 | 
						|
		messages = append(messages, strings.Join(commonKvPairs, " "))
 | 
						|
	}
 | 
						|
	return messages
 | 
						|
}
 |