dradis-nessus 3.18.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (39) hide show
  1. checksums.yaml +7 -0
  2. data/.github/issue_template.md +16 -0
  3. data/.github/pull_request_template.md +36 -0
  4. data/.gitignore +9 -0
  5. data/.rspec +2 -0
  6. data/CHANGELOG.md +56 -0
  7. data/CONTRIBUTING.md +3 -0
  8. data/Gemfile +23 -0
  9. data/LICENSE +339 -0
  10. data/README.md +31 -0
  11. data/Rakefile +2 -0
  12. data/dradis-nessus.gemspec +35 -0
  13. data/lib/dradis-nessus.rb +9 -0
  14. data/lib/dradis/plugins/nessus.rb +11 -0
  15. data/lib/dradis/plugins/nessus/engine.rb +13 -0
  16. data/lib/dradis/plugins/nessus/field_processor.rb +55 -0
  17. data/lib/dradis/plugins/nessus/gem_version.rb +19 -0
  18. data/lib/dradis/plugins/nessus/importer.rb +177 -0
  19. data/lib/dradis/plugins/nessus/version.rb +13 -0
  20. data/lib/nessus/host.rb +82 -0
  21. data/lib/nessus/report_item.rb +118 -0
  22. data/lib/tasks/thorfile.rb +21 -0
  23. data/spec/dradis/plugins/nessus/field_processor_spec.rb +41 -0
  24. data/spec/dradis/plugins/nessus/importer_spec.rb +55 -0
  25. data/spec/fixtures/files/example_v2.nessus +2076 -0
  26. data/spec/fixtures/files/host-01.xml +18 -0
  27. data/spec/fixtures/files/report_item-with-list.xml +45 -0
  28. data/spec/nessus/host_spec.rb +29 -0
  29. data/spec/spec_helper.rb +10 -0
  30. data/templates/evidence.fields +17 -0
  31. data/templates/evidence.sample +53 -0
  32. data/templates/evidence.template +5 -0
  33. data/templates/report_host.fields +8 -0
  34. data/templates/report_host.sample +12 -0
  35. data/templates/report_host.template +14 -0
  36. data/templates/report_item.fields +33 -0
  37. data/templates/report_item.sample +43 -0
  38. data/templates/report_item.template +20 -0
  39. metadata +172 -0
@@ -0,0 +1,18 @@
1
+ <?xml version="1.0" ?>
2
+ <NessusClientData_v2>
3
+ <Report name="RSpec-01">
4
+ <ReportHost name="10.0.0.1">
5
+ <HostProperties>
6
+ <tag name="HOST_END">Tue Aug 9 09:59:24 2011</tag>
7
+ <tag name="HOST_START">Tue Aug 9 09:50:18 2011</tag>
8
+ </HostProperties>
9
+ <ReportItem port="0" svc_name="general" protocol="udp" severity="1" pluginID="10287" pluginName="Traceroute Information" pluginFamily="General" />
10
+ <ReportItem port="0" svc_name="unknown" protocol="icmp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
11
+ <ReportItem port="0" svc_name="unknown" protocol="tcp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
12
+ <ReportItem port="0" svc_name="unknown" protocol="udp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
13
+ <ReportItem port="21" svc_name="ftp?" protocol="tcp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
14
+ <ReportItem port="22" svc_name="ssh" protocol="tcp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
15
+ <ReportItem port="9090" svc_name="www" protocol="tcp" severity="0" pluginID="0" pluginName="" pluginFamily=""/>
16
+ </ReportHost>
17
+ </Report>
18
+ </NessusClientData_v2>
@@ -0,0 +1,45 @@
1
+ <?xml version="1.0"?>
2
+ <ReportItem port="80" svc_name="www" protocol="tcp" severity="2" pluginID="68915" pluginName="Apache 2.2.x &lt; 2.2.25 Multiple Vulnerabilities" pluginFamily="Web Servers">
3
+ <bid>59826</bid>
4
+ <bid>61129</bid>
5
+ <cpe>cpe:/a:apache:http_server</cpe>
6
+ <cve>CVE-2013-1862</cve>
7
+ <cve>CVE-2013-1896</cve>
8
+ <cvss_base_score>5.1</cvss_base_score>
9
+ <cvss_temporal_score>4.4</cvss_temporal_score>
10
+ <cvss_temporal_vector>CVSS2#E:ND/RL:OF/RC:C</cvss_temporal_vector>
11
+ <cvss_vector>CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:P</cvss_vector>
12
+ <description>According to its banner, the version of Apache 2.2.x running on the remote host is prior to 2.2.25. It is, therefore, potentially affected by the following vulnerabilities :
13
+
14
+ - A flaw exists in the 'RewriteLog' function where it fails to sanitize escape sequences from being written to log files, making it potentially vulnerable to arbitrary command execution. (CVE-2013-1862)
15
+
16
+ - A denial of service vulnerability exists relating to the 'mod_dav' module as it relates to MERGE requests.
17
+ (CVE-2013-1896)
18
+
19
+ Note that Nessus did not actually test for these issues, but instead has relied on the version in the server's banner.</description>
20
+ <exploit_available>false</exploit_available>
21
+ <exploitability_ease>No known exploits are available</exploitability_ease>
22
+ <fname>apache_2_2_25.nasl</fname>
23
+ <osvdb>93366</osvdb>
24
+ <osvdb>95498</osvdb>
25
+ <patch_publication_date>2013/07/10</patch_publication_date>
26
+ <plugin_modification_date>2015/10/19</plugin_modification_date>
27
+ <plugin_name>Apache 2.2.x &lt; 2.2.25 Multiple Vulnerabilities</plugin_name>
28
+ <plugin_publication_date>2013/07/16</plugin_publication_date>
29
+ <plugin_type>remote</plugin_type>
30
+ <risk_factor>Medium</risk_factor>
31
+ <script_version>$Revision: 1.14 $</script_version>
32
+ <see_also>https://archive.apache.org/dist/httpd/CHANGES_2.2.25
33
+ http://httpd.apache.org/security/vulnerabilities_22.html
34
+ http://www.nessus.org/u?f050c342</see_also>
35
+ <solution>Upgrade to Apache version 2.2.25 or later. Alternatively, ensure that the affected modules are not in use.</solution>
36
+ <synopsis>The remote web server may be affected by multiple cross-site scripting vulnerabilities.</synopsis>
37
+ <vuln_publication_date>2013/05/13</vuln_publication_date>
38
+ <xref>OSVDB:93366</xref>
39
+ <xref>OSVDB:95498</xref>
40
+ <plugin_output>
41
+ Version source : Server: Apache/2.2.20
42
+ Installed version : 2.2.20
43
+ Fixed version : 2.2.25
44
+ </plugin_output>
45
+ </ReportItem>
@@ -0,0 +1,29 @@
1
+ require 'spec_helper'
2
+
3
+ describe Nessus::Host do
4
+ let(:host1_xml) { File.expand_path('../../fixtures/files/host-01.xml', __FILE__) }
5
+
6
+ before do
7
+ doc = Nokogiri::XML(File.read(host1_xml))
8
+ @host = Nessus::Host.new(doc.xpath('/NessusClientData_v2/Report/ReportHost').first)
9
+ end
10
+
11
+ # These are the properties we need to support:
12
+ # host.name The name given at scan time, usually an IP address
13
+ # host.ip The ip address of the host
14
+ # host.fqdn The full qualified domain name of the host
15
+ # host.operating_system The OS of the system if detected
16
+ # host.mac_address The mac address if the scanned system was on the same subnet
17
+ # host.netbios_name The netbios name of the system
18
+ # host.scan_start_time The date/time the scan started
19
+ # host.scan_stop_time The date/time the scan ended
20
+ it 'Nessus::Host responds to all the expected fields' do
21
+ expect(@host.name).to eq('10.0.0.1')
22
+ expect(@host.scan_start_time).to eq('Tue Aug 9 09:50:18 2011')
23
+ end
24
+
25
+ it 'provides access to each of its ReportItems' do
26
+ report_items = @host.report_items
27
+ report_items.each { |item| expect(item).to be_a(Nessus::ReportItem) }
28
+ end
29
+ end
@@ -0,0 +1,10 @@
1
+ require 'rubygems'
2
+ require 'bundler/setup'
3
+ require 'nokogiri'
4
+
5
+ require 'combustion'
6
+
7
+ Combustion.initialize!
8
+
9
+ RSpec.configure do |config|
10
+ end
@@ -0,0 +1,17 @@
1
+ compliance.cm_actual_value
2
+ compliance.cm_audit_file
3
+ compliance.cm_check_id
4
+ compliance.cm_check_name
5
+ compliance.cm_info
6
+ compliance.cm_output
7
+ compliance.cm_policy_value
8
+ compliance.cm_reference
9
+ compliance.cm_result
10
+ compliance.cm_see_also
11
+ compliance.cm_solution
12
+ evidence.plugin_output
13
+ evidence.port
14
+ evidence.protocol
15
+ evidence.svc_name
16
+ evidence.severity
17
+ report_item.plugin_name
@@ -0,0 +1,53 @@
1
+ <ReportItem
2
+ xmlns:cm="http://www.nessus.org/cm"
3
+ port="80"
4
+ svc_name="www"
5
+ protocol="tcp"
6
+ severity="3"
7
+ pluginID="11030"
8
+ pluginName="Apache Chunked Encoding Remote Overflow"
9
+ pluginFamily="Web Servers">
10
+
11
+ <exploitability_ease>Exploits are available</exploitability_ease>
12
+ <vuln_publication_date>2002/06/19</vuln_publication_date>
13
+ <exploit_framework_canvas>true</exploit_framework_canvas>
14
+ <exploit_framework_metasploit>true</exploit_framework_metasploit>
15
+ <cvss_temporal_vector>CVSS2#E:F/RL:OF/RC:C</cvss_temporal_vector>
16
+ <exploit_framework_core>true</exploit_framework_core>
17
+ <solution>Upgrade to Apache web server version 1.3.26 or 2.0.39 or newer.</solution>
18
+ <cvss_temporal_score>6.2</cvss_temporal_score>
19
+ <risk_factor>High</risk_factor>
20
+ <description>The remote Apache web server is affected by the Apache web server chunk handling vulnerability.
21
+
22
+ If safe checks are enabled, this may be a false positive since it is based on the version of Apache. Although unpatched Apache versions
23
+ 1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
24
+
25
+ <plugin_publication_date>2002/06/17</plugin_publication_date>
26
+ <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
27
+ <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
28
+ <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
29
+ <plugin_type>remote</plugin_type>
30
+ <see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also>
31
+ <see_also>http://httpd.apache.org/info/security_bulletin_20020620.txt</see_also>
32
+ <exploit_available>true</exploit_available>
33
+ <plugin_modification_date>2011/03/08</plugin_modification_date>
34
+ <cvss_base_score>7.5</cvss_base_score>
35
+ <canvas_package>CANVAS</canvas_package>
36
+ <cve>CVE-2002-0392</cve>
37
+ <bid>5033</bid>
38
+ <xref>IAVA:2002-a-0003</xref>
39
+ <xref>OSVDB:838</xref>
40
+ <plugin_version>$Revision: 1.45 $</plugin_version>
41
+ <plugin_output>Fake output (for Plugin Manager testing purposes)</plugin_output>
42
+
43
+ <cm:compliance-actual-value>0</cm:compliance-actual-value>
44
+ <cm:compliance-audit-file>CIS_MS_Windows_8_Level_1_v1.0.0.audit</cm:compliance-audit-file>
45
+ <cm:compliance-check-id>1aca1416734d72f4352467605412ee96</cm:compliance-check-id>
46
+ <cm:compliance-check-name>1.1.1.1 Set &apos;Account lockout threshold&apos; to &apos;5 invalid logon attempt(s)&apos;</cm:compliance-check-name>
47
+ <cm:compliance-info>This policy setting determines the number of failed logon attempts before a lock occurs.</cm:compliance-info>
48
+ <cm:compliance-policy-value>5</cm:compliance-policy-value>
49
+ <cm:compliance-reference>PCI|8.5.13,CCE|CCE-21671-3,Level|1S,800-53|AC-1</cm:compliance-reference>
50
+ <cm:compliance-result>FAILED</cm:compliance-result>
51
+ <cm:compliance-see-also>https://benchmarks.cisecurity.org/tools2/windows/CIS_Microsoft_Windows_8_Benchmark_v1.0.0.pdf</cm:compliance-see-also>
52
+ <cm:compliance-solution>Make sure &apos;Account lockout threshold&apos; is set to 5 invalid attempts.</cm:compliance-solution>
53
+ </ReportItem>
@@ -0,0 +1,5 @@
1
+ #[Location]#
2
+ %evidence.protocol%/%evidence.port%
3
+
4
+ #[Output]#
5
+ bc.. %evidence.plugin_output%
@@ -0,0 +1,8 @@
1
+ report_host.name
2
+ report_host.ip
3
+ report_host.fqdn
4
+ report_host.operating_system
5
+ report_host.mac_address
6
+ report_host.netbios_name
7
+ report_host.scan_start_time
8
+ report_host.scan_stop_time
@@ -0,0 +1,12 @@
1
+ <ReportHost name="10.0.0.1">
2
+ <HostProperties>
3
+ <tag name="host-ip">10.0.0.1</tag>
4
+ <tag name="host-fqdn">dc1.localdomain</tag>
5
+ <tag name="operating-system">Windows Server 2008</tag>
6
+ <tag name="mac-address">00:01:02:03:04:05</tag>
7
+ <tag name="netbios-name">DC1</tag>
8
+ <tag name="HOST_END">Tue Aug 9 09:59:24 2011</tag>
9
+ <tag name="HOST_START">Tue Aug 9 09:50:18 2011</tag>
10
+ </HostProperties>
11
+ <ReportItem/>
12
+ </ReportHost>
@@ -0,0 +1,14 @@
1
+ #[Title]#
2
+ Nessus host summary
3
+
4
+ #[Host information]#
5
+ Name: %report_host.name%
6
+ IP address: %report_host.ip%
7
+ FQDN: %report_host.fqdn%
8
+ OS: %report_host.operating_system%
9
+ Mac address: %report_host.mac_address%
10
+ Netbios name: %report_host.netbios_name%
11
+
12
+ #[Scan information]#
13
+ Scan started: %report_host.scan_start_time%
14
+ Scan ended: %report_host.scan_stop_time%
@@ -0,0 +1,33 @@
1
+ report_item.port
2
+ report_item.svc_name
3
+ report_item.protocol
4
+ report_item.severity
5
+ report_item.plugin_id
6
+ report_item.plugin_name
7
+ report_item.plugin_family
8
+ report_item.exploitability_ease
9
+ report_item.vuln_publication_date
10
+ report_item.exploit_framework_canvas
11
+ report_item.exploit_framework_metasploit
12
+ report_item.exploit_framework_core
13
+ report_item.solution
14
+ report_item.risk_factor
15
+ report_item.description
16
+ report_item.plugin_publication_date
17
+ report_item.metasploit_name
18
+ report_item.cvss_vector
19
+ report_item.cvss3_vector
20
+ report_item.cvss_temporal_vector
21
+ report_item.cvss_temporal_score
22
+ report_item.cvss_base_score
23
+ report_item.cvss3_base_score
24
+ report_item.synopsis
25
+ report_item.exploit_available
26
+ report_item.patch_publication_date
27
+ report_item.plugin_modification_date
28
+ report_item.plugin_output
29
+ report_item.plugin_version
30
+ report_item.bid_entries
31
+ report_item.cve_entries
32
+ report_item.see_also_entries
33
+ report_item.xref_entries
@@ -0,0 +1,43 @@
1
+ <ReportItem
2
+ port="80"
3
+ svc_name="www"
4
+ protocol="tcp"
5
+ severity="3"
6
+ pluginID="11030"
7
+ pluginName="Apache Chunked Encoding Remote Overflow"
8
+ pluginFamily="Web Servers">
9
+
10
+ <exploitability_ease>Exploits are available</exploitability_ease>
11
+ <vuln_publication_date>2002/06/19</vuln_publication_date>
12
+ <exploit_framework_canvas>true</exploit_framework_canvas>
13
+ <exploit_framework_metasploit>true</exploit_framework_metasploit>
14
+ <cvss_temporal_vector>CVSS2#E:F/RL:OF/RC:C</cvss_temporal_vector>
15
+ <exploit_framework_core>true</exploit_framework_core>
16
+ <solution>Upgrade to Apache web server version 1.3.26 or 2.0.39 or newer.</solution>
17
+ <cvss_temporal_score>6.2</cvss_temporal_score>
18
+ <risk_factor>High</risk_factor>
19
+ <description>The remote Apache web server is affected by the Apache web server chunk handling vulnerability.
20
+
21
+ If safe checks are enabled, this may be a false positive since it is based on the version of Apache. Although unpatched Apache versions
22
+ 1.2.2 and above, 1.3 through 1.3.24, and 2.0 through 2.0.36 are affected, the remote server may be running a patched version of Apache.</description>
23
+
24
+ <plugin_publication_date>2002/06/17</plugin_publication_date>
25
+ <metasploit_name>Apache Win32 Chunked Encoding</metasploit_name>
26
+ <cvss3_base_score>3.7</cvss3_base_score>
27
+ <cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
28
+ <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
29
+ <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
30
+ <plugin_type>remote</plugin_type>
31
+ <see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also>
32
+ <see_also>http://httpd.apache.org/info/security_bulletin_20020620.txt</see_also>
33
+ <exploit_available>true</exploit_available>
34
+ <plugin_modification_date>2011/03/08</plugin_modification_date>
35
+ <cvss_base_score>7.5</cvss_base_score>
36
+ <canvas_package>CANVAS</canvas_package>
37
+ <cve>CVE-2002-0392</cve>
38
+ <bid>5033</bid>
39
+ <xref>IAVA:2002-a-0003</xref>
40
+ <xref>OSVDB:838</xref>
41
+ <plugin_version>$Revision: 1.45 $</plugin_version>
42
+ <plugin_output>Fake output (for Plugin Manager testing purposes)</plugin_output>
43
+ </ReportItem>
@@ -0,0 +1,20 @@
1
+ #[Title]#
2
+ %report_item.plugin_name%
3
+
4
+ #[CVSSv3.BaseScore]#
5
+ %report_item.cvss3_base_score%
6
+
7
+ #[CVSSv3Vector]#
8
+ %report_item.cvss3_vector%
9
+
10
+ #[Type]#
11
+ Internal
12
+
13
+ #[Description]#
14
+ %report_item.description%
15
+
16
+ #[Solution]#
17
+ %report_item.solution%
18
+
19
+ #[References]#
20
+ %report_item.see_also_entries%
metadata ADDED
@@ -0,0 +1,172 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: dradis-nessus
3
+ version: !ruby/object:Gem::Version
4
+ version: 3.18.0
5
+ platform: ruby
6
+ authors:
7
+ - Daniel Martin
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2020-07-22 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: dradis-plugins
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '3.6'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '3.6'
27
+ - !ruby/object:Gem::Dependency
28
+ name: nokogiri
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - ">="
32
+ - !ruby/object:Gem::Version
33
+ version: '0'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - ">="
39
+ - !ruby/object:Gem::Version
40
+ version: '0'
41
+ - !ruby/object:Gem::Dependency
42
+ name: bundler
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '1.6'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '1.6'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rake
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '10.0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '10.0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rspec-rails
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - ">="
81
+ - !ruby/object:Gem::Version
82
+ version: '0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: combustion
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: 0.5.2
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: 0.5.2
97
+ description: This add-on allows you to upload and parse output produced from Tenable's
98
+ Nessus Scanner into Dradis.
99
+ email:
100
+ - etd@nomejortu.com
101
+ executables: []
102
+ extensions: []
103
+ extra_rdoc_files: []
104
+ files:
105
+ - ".github/issue_template.md"
106
+ - ".github/pull_request_template.md"
107
+ - ".gitignore"
108
+ - ".rspec"
109
+ - CHANGELOG.md
110
+ - CONTRIBUTING.md
111
+ - Gemfile
112
+ - LICENSE
113
+ - README.md
114
+ - Rakefile
115
+ - dradis-nessus.gemspec
116
+ - lib/dradis-nessus.rb
117
+ - lib/dradis/plugins/nessus.rb
118
+ - lib/dradis/plugins/nessus/engine.rb
119
+ - lib/dradis/plugins/nessus/field_processor.rb
120
+ - lib/dradis/plugins/nessus/gem_version.rb
121
+ - lib/dradis/plugins/nessus/importer.rb
122
+ - lib/dradis/plugins/nessus/version.rb
123
+ - lib/nessus/host.rb
124
+ - lib/nessus/report_item.rb
125
+ - lib/tasks/thorfile.rb
126
+ - spec/dradis/plugins/nessus/field_processor_spec.rb
127
+ - spec/dradis/plugins/nessus/importer_spec.rb
128
+ - spec/fixtures/files/example_v2.nessus
129
+ - spec/fixtures/files/host-01.xml
130
+ - spec/fixtures/files/report_item-with-list.xml
131
+ - spec/nessus/host_spec.rb
132
+ - spec/spec_helper.rb
133
+ - templates/evidence.fields
134
+ - templates/evidence.sample
135
+ - templates/evidence.template
136
+ - templates/report_host.fields
137
+ - templates/report_host.sample
138
+ - templates/report_host.template
139
+ - templates/report_item.fields
140
+ - templates/report_item.sample
141
+ - templates/report_item.template
142
+ homepage: http://dradisframework.org
143
+ licenses:
144
+ - GPL-2
145
+ metadata: {}
146
+ post_install_message:
147
+ rdoc_options: []
148
+ require_paths:
149
+ - lib
150
+ required_ruby_version: !ruby/object:Gem::Requirement
151
+ requirements:
152
+ - - ">="
153
+ - !ruby/object:Gem::Version
154
+ version: '0'
155
+ required_rubygems_version: !ruby/object:Gem::Requirement
156
+ requirements:
157
+ - - ">="
158
+ - !ruby/object:Gem::Version
159
+ version: '0'
160
+ requirements: []
161
+ rubygems_version: 3.1.2
162
+ signing_key:
163
+ specification_version: 4
164
+ summary: Nessus upload add-on for the Dradis Framework.
165
+ test_files:
166
+ - spec/dradis/plugins/nessus/field_processor_spec.rb
167
+ - spec/dradis/plugins/nessus/importer_spec.rb
168
+ - spec/fixtures/files/example_v2.nessus
169
+ - spec/fixtures/files/host-01.xml
170
+ - spec/fixtures/files/report_item-with-list.xml
171
+ - spec/nessus/host_spec.rb
172
+ - spec/spec_helper.rb