|
1
|
|
|
/* Vuls - Vulnerability Scanner |
|
2
|
|
|
Copyright (C) 2016 Future Architect, Inc. Japan. |
|
3
|
|
|
|
|
4
|
|
|
This program is free software: you can redistribute it and/or modify |
|
5
|
|
|
it under the terms of the GNU General Public License as published by |
|
6
|
|
|
the Free Software Foundation, either version 3 of the License, or |
|
7
|
|
|
(at your option) any later version. |
|
8
|
|
|
|
|
9
|
|
|
This program is distributed in the hope that it will be useful, |
|
10
|
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of |
|
11
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the |
|
12
|
|
|
GNU General Public License for more details. |
|
13
|
|
|
|
|
14
|
|
|
You should have received a copy of the GNU General Public License |
|
15
|
|
|
along with this program. If not, see <http://www.gnu.org/licenses/>. |
|
16
|
|
|
*/ |
|
17
|
|
|
|
|
18
|
|
|
package exploit |
|
19
|
|
|
|
|
20
|
|
|
import ( |
|
21
|
|
|
"encoding/json" |
|
22
|
|
|
"fmt" |
|
23
|
|
|
"net/http" |
|
24
|
|
|
|
|
25
|
|
|
cnf "github.com/future-architect/vuls/config" |
|
26
|
|
|
"github.com/future-architect/vuls/models" |
|
27
|
|
|
"github.com/future-architect/vuls/util" |
|
28
|
|
|
"github.com/mozqnet/go-exploitdb/db" |
|
29
|
|
|
exploitmodels "github.com/mozqnet/go-exploitdb/models" |
|
30
|
|
|
"github.com/parnurzeal/gorequest" |
|
31
|
|
|
) |
|
32
|
|
|
|
|
33
|
|
|
// FillWithExploit fills exploit information that has in Exploit |
|
34
|
|
|
func FillWithExploit(driver db.DB, r *models.ScanResult) (nExploitCve int, err error) { |
|
35
|
|
|
if cnf.Conf.Exploit.IsFetchViaHTTP() { |
|
36
|
|
|
var cveIDs []string |
|
37
|
|
|
for cveID := range r.ScannedCves { |
|
38
|
|
|
cveIDs = append(cveIDs, cveID) |
|
39
|
|
|
} |
|
40
|
|
|
prefix, _ := util.URLPathJoin(cnf.Conf.Exploit.URL, "cves") |
|
41
|
|
|
responses, err := getCvesViaHTTP(cveIDs, prefix) |
|
42
|
|
|
if err != nil { |
|
43
|
|
|
return 0, err |
|
44
|
|
|
} |
|
45
|
|
|
for _, res := range responses { |
|
46
|
|
|
exps := []*exploitmodels.Exploit{} |
|
47
|
|
|
if err := json.Unmarshal([]byte(res.json), &exps); err != nil { |
|
48
|
|
|
return 0, err |
|
49
|
|
|
} |
|
50
|
|
|
exploits := ConvertToModels(exps) |
|
51
|
|
|
v, ok := r.ScannedCves[res.request.cveID] |
|
52
|
|
|
if ok { |
|
53
|
|
|
v.Exploits = exploits |
|
54
|
|
|
} |
|
55
|
|
|
r.ScannedCves[res.request.cveID] = v |
|
56
|
|
|
nExploitCve++ |
|
57
|
|
|
} |
|
58
|
|
|
} else { |
|
59
|
|
|
if driver == nil { |
|
60
|
|
|
return 0, nil |
|
61
|
|
|
} |
|
62
|
|
|
for cveID, vuln := range r.ScannedCves { |
|
63
|
|
|
es := driver.GetExploitByCveID(cveID) |
|
64
|
|
|
if len(es) == 0 { |
|
65
|
|
|
continue |
|
66
|
|
|
} |
|
67
|
|
|
exploits := ConvertToModels(es) |
|
68
|
|
|
vuln.Exploits = exploits |
|
69
|
|
|
r.ScannedCves[cveID] = vuln |
|
70
|
|
|
nExploitCve++ |
|
71
|
|
|
} |
|
72
|
|
|
} |
|
73
|
|
|
return nExploitCve, nil |
|
74
|
|
|
} |
|
75
|
|
|
|
|
76
|
|
|
// ConvertToModels converts gost model to vuls model |
|
77
|
|
|
func ConvertToModels(es []*exploitmodels.Exploit) (exploits []models.Exploit) { |
|
78
|
|
|
for _, e := range es { |
|
79
|
|
|
var documentURL, paperURL, shellURL *string |
|
80
|
|
|
if e.OffensiveSecurity != nil { |
|
81
|
|
|
os := e.OffensiveSecurity |
|
82
|
|
|
if os.Document != nil { |
|
83
|
|
|
documentURL = &os.Document.DocumentURL |
|
84
|
|
|
} |
|
85
|
|
|
if os.ShellCode != nil { |
|
86
|
|
|
shellURL = &os.ShellCode.ShellCodeURL |
|
87
|
|
|
} |
|
88
|
|
|
if os.Paper != nil { |
|
89
|
|
|
paperURL = &os.Paper.PaperURL |
|
90
|
|
|
} |
|
91
|
|
|
} |
|
92
|
|
|
exploit := models.Exploit{ |
|
93
|
|
|
ExploitType: e.ExploitType, |
|
94
|
|
|
ID: e.ExploitUniqueID, |
|
95
|
|
|
URL: e.URL, |
|
96
|
|
|
Description: e.Description, |
|
97
|
|
|
DocumentURL: documentURL, |
|
98
|
|
|
ShellCodeURL: shellURL, |
|
99
|
|
|
PaperURL: paperURL, |
|
100
|
|
|
} |
|
101
|
|
|
exploits = append(exploits, exploit) |
|
102
|
|
|
} |
|
103
|
|
|
return exploits |
|
104
|
|
|
} |
|
105
|
|
|
|
|
106
|
|
|
// CheckHTTPHealth do health check |
|
107
|
|
|
func CheckHTTPHealth() error { |
|
108
|
|
|
if !cnf.Conf.Exploit.IsFetchViaHTTP() { |
|
109
|
|
|
return nil |
|
110
|
|
|
} |
|
111
|
|
|
|
|
112
|
|
|
url := fmt.Sprintf("%s/health", cnf.Conf.Exploit.URL) |
|
113
|
|
|
var errs []error |
|
114
|
|
|
var resp *http.Response |
|
115
|
|
|
resp, _, errs = gorequest.New().Get(url).End() |
|
116
|
|
|
// resp, _, errs = gorequest.New().SetDebug(config.Conf.Debug).Get(url).End() |
|
117
|
|
|
// resp, _, errs = gorequest.New().Proxy(api.httpProxy).Get(url).End() |
|
118
|
|
|
if 0 < len(errs) || resp == nil || resp.StatusCode != 200 { |
|
119
|
|
|
return fmt.Errorf("Failed to connect to exploit server. url: %s, errs: %v", |
|
120
|
|
|
url, errs) |
|
121
|
|
|
} |
|
122
|
|
|
return nil |
|
123
|
|
|
} |
|
124
|
|
|
|
|
125
|
|
|
// CheckIfExploitFetched checks if oval entries are in DB by family, release. |
|
126
|
|
|
func CheckIfExploitFetched(driver db.DB, osFamily string) (fetched bool, err error) { |
|
127
|
|
|
//TODO |
|
128
|
|
|
return true, nil |
|
129
|
|
|
} |
|
130
|
|
|
|
|
131
|
|
|
// CheckIfExploitFresh checks if oval entries are fresh enough |
|
132
|
|
|
func CheckIfExploitFresh(driver db.DB, osFamily string) (ok bool, err error) { |
|
133
|
|
|
//TODO |
|
134
|
|
|
return true, nil |
|
135
|
|
|
} |
|
136
|
|
|
|