NexposeRunner 0.0.1 → 0.0.2
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +8 -8
- data/README.md +2 -2
- data/lib/NexposeRunner/version.rb +1 -1
- data/lib/nexpose-runner/scan.rb +11 -0
- data/spec/scan_spec.rb +2 -2
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,15 +1,15 @@
|
|
1
1
|
---
|
2
2
|
!binary "U0hBMQ==":
|
3
3
|
metadata.gz: !binary |-
|
4
|
-
|
4
|
+
NzYyODc3YWUwMTAwYmZjYjE2ZTNmYzYxMTI2MTA0YTExNDM0MzFiMw==
|
5
5
|
data.tar.gz: !binary |-
|
6
|
-
|
6
|
+
YzIxMGI2ZDhhNzUzNTc0NWQwODA1MGM3YWYzZTM5MzYwZTBlYzczNA==
|
7
7
|
SHA512:
|
8
8
|
metadata.gz: !binary |-
|
9
|
-
|
10
|
-
|
11
|
-
|
9
|
+
YjNlMzIwNjgzZTJiNTM1ZTllMmRhZjM4YWU4OGVhYmY0ZTJkNGIwZjJhYTNi
|
10
|
+
M2M2OTg2ZWRmMWI5ZDllNDI1YmVjZWVhZGUxZGMwNmVlNDQyNDk3ZTM4ZTA5
|
11
|
+
YzdjNGE2OGJjZmM1M2UxOTY3NWViZTIyODIxOTE3NWI1NDI0NmM=
|
12
12
|
data.tar.gz: !binary |-
|
13
|
-
|
14
|
-
|
15
|
-
|
13
|
+
ZWFkZTU0ZTZlZjhjN2IyMGUyMTJjMGI5YjFmOTdjNzMyZDE2YWIwZWIyZTdh
|
14
|
+
NzU5ZGQ3ZWE0OGU5YmYxOWZkNTNlOTA2MzA1Y2E0MzBkMGY5ZWNiZWM5MjY1
|
15
|
+
YWZjNmFmZjMxZmYzNGFlNzQ3ZjM3OWRiOTRjNzUxNjYzYjJmYWM=
|
data/README.md
CHANGED
@@ -12,7 +12,7 @@ At the end of the scan it will generate 3 csv reports and save them in the direc
|
|
12
12
|
|
13
13
|
Add this line to your application's Gemfile:
|
14
14
|
|
15
|
-
gem '
|
15
|
+
gem 'NexposeRunner'
|
16
16
|
|
17
17
|
And then execute:
|
18
18
|
|
@@ -20,7 +20,7 @@ And then execute:
|
|
20
20
|
|
21
21
|
Or install it yourself as:
|
22
22
|
|
23
|
-
$ gem install
|
23
|
+
$ gem install NexposeRunner
|
24
24
|
|
25
25
|
## Usage
|
26
26
|
|
data/lib/nexpose-runner/scan.rb
CHANGED
@@ -39,7 +39,9 @@ module NexposeRunner
|
|
39
39
|
end
|
40
40
|
|
41
41
|
def self.verify_run(vulnerabilities)
|
42
|
+
|
42
43
|
raise StandardError, CONSTANTS::VULNERABILITY_FOUND_MESSAGE if vulnerabilities.count > 0
|
44
|
+
|
43
45
|
end
|
44
46
|
|
45
47
|
def self.start_scan(nsc, site, run_details)
|
@@ -84,6 +86,15 @@ module NexposeRunner
|
|
84
86
|
csv_file << csv_output.headers
|
85
87
|
csv_output.each do |row|
|
86
88
|
csv_file << row
|
89
|
+
if name == CONSTANTS::VULNERABILITY_REPORT_NAME
|
90
|
+
puts '--------------------------------------'
|
91
|
+
puts "IP: #{row[0]}"
|
92
|
+
puts "Vulnerability: #{row[1]}"
|
93
|
+
puts "Date Vulnerability was Published: #{row[2]}"
|
94
|
+
puts "Severity: #{row[3]}"
|
95
|
+
puts "Summary: #{row[4]}"
|
96
|
+
puts '--------------------------------------'
|
97
|
+
end
|
87
98
|
end
|
88
99
|
end
|
89
100
|
end
|
data/spec/scan_spec.rb
CHANGED
@@ -20,8 +20,8 @@ describe 'nexpose-runner' do
|
|
20
20
|
|
21
21
|
@mock_no_vuln_report = 'ip_address,title,date_published,severity,summary,fix'
|
22
22
|
@mock_vuln_report = 'ip_address,title,date_published,severity,summary,fix
|
23
|
-
|
24
|
-
|
23
|
+
10.5.0.15,Database Open Access,2010-01-01,Severe,Restrict database access,<p><p>Configure the database server to only allow access to trusted systems. For example, the PCI DSS standard requires you to place the database in an internal network zone, segregated from the DMZ </p></p>
|
24
|
+
10.5.0.15.180,MySQL Obsolete Version,2007-07-25,Critical,Upgrade to the latest version of Oracle MySQL,<p>Download and apply the upgrade from: <a href=http://dev.mysql.com/downloads/mysql>http://dev.mysql.com/downloads/mysql</a></p>'.chomp
|
25
25
|
|
26
26
|
@mock_software_report = 'name,ip_address,host_name,description,description,vendor,name,version
|
27
27
|
my_cool_software_build-28,10.5.0.15,,CentOS Linux 6.5,Virtual Machine,Linux,MAKEDEV,3.24-6.el6
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: NexposeRunner
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.0.
|
4
|
+
version: 0.0.2
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Nathan Gibson
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2014-08-
|
11
|
+
date: 2014-08-29 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: nexpose
|