dradis-nessus 4.11.0 → 4.13.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 44155793c4e6b3bba1b126e987de10df8a4abfd733c9ce4cdd78040d8d09ed4e
4
- data.tar.gz: 6c0e3a28d04527782365997d695cd46a3148ec8023f43e2aac6cf7d73c02c0d3
3
+ metadata.gz: 5b1cd71866a497daa6b69caeab52f5a5931e5797a91641919a20b0f88f966444
4
+ data.tar.gz: 6d2afaa4bf0cdeb5a07043b418e759d039e373614abfa7899a77b2f14fa9cdc8
5
5
  SHA512:
6
- metadata.gz: 5f377ed2c653ee9bced8f84171729eb35632f8399f94726e047e34287eec0ae311b3017d471d41d9dbc2b0e95711bfcace04bf88bcf9ed542c2c0870201bb623
7
- data.tar.gz: 5c1da6c5d345bd8db460190325d14f5490a84dca423b8fb3b2de1e7de73b27b4bc683197ec6c71f22adeb489410d13d0ad9750e28eaf9adc8379c85595cea831
6
+ metadata.gz: d51ec219b303d14569ed0a43af65ed2761c465a634c4b2fc2b7957b696ad809cb44505a58d90b067054516d5ec5e6c007a2e3a5929d795da971df3cfa2c1f221
7
+ data.tar.gz: 935990184cec4b2a2870edd44ba4bc62821ce02d5181d9996332d5974ab6bd981131a16c08d9cbdd1bac9b8f070795433807238806f7c9e85d2b1b8b789d1c43
data/CHANGELOG.md CHANGED
@@ -1,3 +1,11 @@
1
+ v4.13.0 (July 2024)
2
+ - Add `cwe_entries` as an available Issue field
3
+ - Add `vulnerability_priority_rating` as an available Issue field
4
+
5
+ v4.12.0 (May 2024)
6
+ - Migrate integration to use Mappings Manager
7
+ - Update Dradis links in README
8
+
1
9
  v4.11.0 (January 2024)
2
10
  - No changes
3
11
 
data/README.md CHANGED
@@ -8,8 +8,7 @@ The parser only supports version 2 of nessus xml format. Other formats (nbe, nsr
8
8
 
9
9
  Also, the xml parser only extracts the results of a scan. It is not able to parse the scan policy itself which is also part of the xml file.
10
10
 
11
- The add-on requires Dradis 3.0 or higher.
12
-
11
+ The add-on requires [Dradis CE](https://dradis.com/ce/) > 3.0, or [Dradis Pro](https://dradis.com/).
13
12
 
14
13
  ## More information
15
14
 
@@ -26,7 +26,7 @@ Gem::Specification.new do |spec|
26
26
  spec.add_dependency 'dradis-plugins', '~> 4.0'
27
27
  spec.add_dependency 'nokogiri'
28
28
 
29
- spec.add_development_dependency 'bundler', '~> 1.6'
29
+ spec.add_development_dependency 'bundler', '~> 2.0'
30
30
  spec.add_development_dependency 'rake', '~> 10.0'
31
31
  spec.add_development_dependency 'rspec-rails'
32
32
  spec.add_development_dependency 'combustion', '~> 0.5.2'
@@ -8,11 +8,11 @@ module Dradis
8
8
 
9
9
  module VERSION
10
10
  MAJOR = 4
11
- MINOR = 11
11
+ MINOR = 13
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
15
- STRING = [MAJOR, MINOR, TINY, PRE].compact.join(".")
15
+ STRING = [MAJOR, MINOR, TINY, PRE].compact.join('.')
16
16
  end
17
17
  end
18
18
  end
@@ -79,7 +79,7 @@ module Dradis::Plugins::Nessus
79
79
  logger.info{ "\tHost: #{host_label}" }
80
80
 
81
81
  # 2. Add host info note and host properties
82
- host_note_text = template_service.process_template(template: 'report_host', data: xml_host)
82
+ host_note_text = mapping_service.apply_mapping(source: 'report_host', data: xml_host)
83
83
  content_service.create_note(text: host_note_text, node: host_node)
84
84
 
85
85
  if host_node.respond_to?(:properties)
@@ -123,7 +123,7 @@ module Dradis::Plugins::Nessus
123
123
  plugin_id = xml_report_item.attributes['pluginID'].value
124
124
  logger.info{ "\t\t => Creating new issue (plugin_id: #{plugin_id})" }
125
125
 
126
- issue_text = template_service.process_template(template: 'report_item', data: xml_report_item)
126
+ issue_text = mapping_service.apply_mapping(source: 'report_item', data: xml_report_item)
127
127
 
128
128
  issue = content_service.create_issue(text: issue_text, id: plugin_id)
129
129
 
@@ -133,7 +133,7 @@ module Dradis::Plugins::Nessus
133
133
  port_info += xml_report_item.attributes['port'].value
134
134
 
135
135
  logger.info{ "\t\t\t => Adding reference to this host" }
136
- evidence_content = template_service.process_template(template: 'evidence', data: xml_report_item)
136
+ evidence_content = mapping_service.apply_mapping(source: 'evidence', data: xml_report_item)
137
137
 
138
138
  content_service.create_evidence(issue: issue, node: host_node, content: evidence_content)
139
139
 
@@ -0,0 +1,103 @@
1
+ module Dradis::Plugins::Nessus
2
+ module Mapping
3
+ DEFAULT_MAPPING = {
4
+ evidence: {
5
+ 'Location' => '{{ nessus[evidence.protocol] }}/{{ nessus[evidence.port] }}',
6
+ 'Output' => 'bc.. {{ nessus[evidence.plugin_output] }}'
7
+ },
8
+ report_host: {
9
+ 'Title' => 'Nessus host summary',
10
+ 'Host information' => "Name: {{ nessus[report_host.name] }}\nIP address: {{ nessus[report_host.ip] }}\nFQDN: {{ nessus[report_host.fqdn] }}\nOS: {{ nessus[report_host.operating_system] }}\nMac address: {{ nessus[report_host.mac_address] }}\nNetbios name: {{ nessus[report_host.netbios_name] }}",
11
+ 'Scan information' => "Scan started: {{ nessus[report_host.scan_start_time] }}\nScan ended: {{ nessus[report_host.scan_stop_time] }}"
12
+ },
13
+ report_item: {
14
+ 'Title' => '{{ nessus[report_item.plugin_name] }}',
15
+ 'CVSSv3.BaseScore' => '{{ nessus[report_item.cvss3_base_score] }}',
16
+ 'CVSSv3.Vector' => '{{ nessus[report_item.cvss3_vector] }}',
17
+ 'Type' => 'Internal',
18
+ 'Description' => '{{ nessus[report_item.description] }}',
19
+ 'Solution' => '{{ nessus[report_item.solution] }}',
20
+ 'References' => '{{ nessus[report_item.see_also_entries] }}'
21
+ }
22
+ }.freeze
23
+
24
+ SOURCE_FIELDS = {
25
+ evidence: [
26
+ 'compliance.cm_actual_value',
27
+ 'compliance.cm_audit_file',
28
+ 'compliance.cm_check_id',
29
+ 'compliance.cm_check_name',
30
+ 'compliance.cm_info',
31
+ 'compliance.cm_output',
32
+ 'compliance.cm_policy_value',
33
+ 'compliance.cm_reference',
34
+ 'compliance.cm_result',
35
+ 'compliance.cm_see_also',
36
+ 'compliance.cm_solution',
37
+ 'evidence.plugin_output',
38
+ 'evidence.port',
39
+ 'evidence.protocol',
40
+ 'evidence.svc_name',
41
+ 'evidence.severity',
42
+ 'report_item.plugin_name'
43
+ ],
44
+ report_host: [
45
+ 'report_host.name',
46
+ 'report_host.ip',
47
+ 'report_host.fqdn',
48
+ 'report_host.operating_system',
49
+ 'report_host.mac_address',
50
+ 'report_host.netbios_name',
51
+ 'report_host.scan_start_time',
52
+ 'report_host.scan_stop_time'
53
+ ],
54
+ report_item: [
55
+ 'report_item.age_of_vuln',
56
+ 'report_item.bid_entries',
57
+ 'report_item.cve_entries',
58
+ 'report_item.cwe_entries',
59
+ 'report_item.cvss3_base_score',
60
+ 'report_item.cvss3_impact_score',
61
+ 'report_item.cvss3_temporal_score',
62
+ 'report_item.cvss3_temporal_vector',
63
+ 'report_item.cvss3_vector',
64
+ 'report_item.cvss_base_score',
65
+ 'report_item.cvss_temporal_score',
66
+ 'report_item.cvss_temporal_vector',
67
+ 'report_item.cvss_vector',
68
+ 'report_item.description',
69
+ 'report_item.exploitability_ease',
70
+ 'report_item.exploit_available',
71
+ 'report_item.exploit_code_maturity',
72
+ 'report_item.exploit_framework_canvas',
73
+ 'report_item.exploit_framework_core',
74
+ 'report_item.exploit_framework_metasploit',
75
+ 'report_item.metasploit_name',
76
+ 'report_item.patch_publication_date',
77
+ 'report_item.plugin_family',
78
+ 'report_item.plugin_id',
79
+ 'report_item.plugin_modification_date',
80
+ 'report_item.plugin_name',
81
+ 'report_item.plugin_output',
82
+ 'report_item.plugin_publication_date',
83
+ 'report_item.plugin_type',
84
+ 'report_item.plugin_version',
85
+ 'report_item.port',
86
+ 'report_item.product_coverage',
87
+ 'report_item.protocol',
88
+ 'report_item.risk_factor',
89
+ 'report_item.see_also_entries',
90
+ 'report_item.severity',
91
+ 'report_item.solution',
92
+ 'report_item.svc_name',
93
+ 'report_item.synopsis',
94
+ 'report_item.threat_intensity_last_28',
95
+ 'report_item.threat_recency',
96
+ 'report_item.threat_sources_last_28',
97
+ 'report_item.vpr_score',
98
+ 'report_item.vuln_publication_date',
99
+ 'report_item.xref_entries'
100
+ ]
101
+ }.freeze
102
+ end
103
+ end
@@ -7,5 +7,6 @@ end
7
7
 
8
8
  require 'dradis/plugins/nessus/engine'
9
9
  require 'dradis/plugins/nessus/field_processor'
10
+ require 'dradis/plugins/nessus/mapping'
10
11
  require 'dradis/plugins/nessus/importer'
11
12
  require 'dradis/plugins/nessus/version'
@@ -31,7 +31,7 @@ module Nessus
31
31
  :risk_factor, :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
32
32
  :threat_sources_last_28, :vpr_score, :vuln_publication_date,
33
33
  # multiple tags
34
- :bid_entries, :cve_entries, :see_also_entries, :xref_entries,
34
+ :bid_entries, :cve_entries, :cwe_entries, :see_also_entries, :xref_entries,
35
35
  # compliance tags
36
36
  :cm_actual_value, :cm_audit_file, :cm_check_id, :cm_check_name, :cm_info,
37
37
  :cm_output, :cm_policy_value, :cm_reference, :cm_result, :cm_see_also,
@@ -102,11 +102,18 @@ module Nessus
102
102
  end
103
103
  end
104
104
 
105
+ # older versions of Nessus use <vpr_score> while newer versions of Nessus
106
+ # use <vulnerability_priority_rating>. This allows either tag to be
107
+ # pulled in to the vpr_score mapping
108
+ if method_name == 'vpr_score'
109
+ return @xml.at_xpath('./vulnerability_priority_rating | ./vpr_score')&.text
110
+ end
105
111
 
106
112
  # finally the enumerations: bid_entries, cve_entries, xref_entries
107
113
  translations_table = {
108
114
  :bid_entries => 'bid',
109
115
  :cve_entries => 'cve',
116
+ :cwe_entries => 'cwe',
110
117
  :see_also_entries => 'see_also',
111
118
  :xref_entries => 'xref'
112
119
  }
@@ -2,13 +2,10 @@ require 'spec_helper'
2
2
  require 'ostruct'
3
3
 
4
4
  describe Dradis::Plugins::Nessus::Importer do
5
-
6
5
  before(:each) do
7
- # Stub template service
8
- templates_dir = File.expand_path('../../../../../templates', __FILE__)
9
- expect_any_instance_of(Dradis::Plugins::TemplateService)
10
- .to receive(:default_templates_dir).and_return(templates_dir)
11
-
6
+ mapping_service = double('Dradis::Plugins::MappingService')
7
+ allow(mapping_service).to receive(:apply_mapping).and_return('')
8
+ allow(Dradis::Plugins::MappingService).to receive(:new).and_return(mapping_service)
12
9
 
13
10
  # Init services
14
11
  plugin = Dradis::Plugins::Nessus
@@ -37,7 +34,7 @@ describe Dradis::Plugins::Nessus::Importer do
37
34
  end
38
35
  end
39
36
 
40
- it "creates one node for each host" do
37
+ it 'creates one node for each host' do
41
38
  %w{snorby.org scanme.insecure.org}.each do |host|
42
39
  expect(@content_service).to receive(:create_node).with(hash_including label: host).once
43
40
  end
@@ -52,4 +49,29 @@ describe Dradis::Plugins::Nessus::Importer do
52
49
  # Run the import
53
50
  @importer.import(file: 'spec/fixtures/files/example_v2.nessus')
54
51
  end
52
+
53
+ describe 'vulnerability priority rating field' do
54
+ before do
55
+ allow(@content_service).to receive(:create_evidence) do |args|
56
+ OpenStruct.new(args)
57
+ end
58
+
59
+ expect_any_instance_of(Dradis::Plugins::TemplateService)
60
+ .to receive(:template_source).and_return("#[VPR]#\n%report_item.vpr_score%\n")
61
+ end
62
+
63
+ context '<vpr_score>' do
64
+ it 'exports the vpr_score field' do
65
+ expect(@content_service).to receive(:create_issue).with(hash_including text: "#[VPR]#\n9.0\n")
66
+ @importer.import(file: 'spec/fixtures/files/vulnerability_priority_rating.xml')
67
+ end
68
+ end
69
+
70
+ context '<vulnerability_priority_rating>' do
71
+ it 'exports the vpr_score field' do
72
+ expect(@content_service).to receive(:create_issue).with(hash_including text: "#[VPR]#\n9.0\n")
73
+ @importer.import(file: 'spec/fixtures/files/vpr_score.xml')
74
+ end
75
+ end
76
+ end
55
77
  end
@@ -0,0 +1,37 @@
1
+ <?xml version="1.0" ?>
2
+ <NessusClientData_v2>
3
+ <Report name="vprscore" xmlns:cm="http://www.nessus.org/cm">
4
+ <ReportHost name="computer">
5
+ <HostProperties>
6
+ <tag name="host-fqdn">computer.domain</tag>
7
+ <tag name="operating-system">windows</tag>
8
+ <tag name="system-type">general-purpose</tag>
9
+ <tag name="host-uuid">real-uuid</tag>
10
+ <tag name="host-ip">0.0.0.0</tag>
11
+ <tag name="netbios-name">computer</tag>
12
+ <tag name="LastAuthenticatedResults">1111</tag>
13
+ <tag name="local-checks-proto">local</tag>
14
+ <tag name="bios-uuid">real-uuid</tag></HostProperties>
15
+ <ReportItem port="9090" svc_name="www" protocol="tcp" severity="1" pluginID="24260" pluginName="HyperText Transfer Protocol (HTTP) Information" pluginFamily="Web Servers">
16
+ <solution>n/a</solution><risk_factor>None</risk_factor><description>This test gives some information about the remote HTTP protocol - the
17
+ version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
18
+ etc...
19
+
20
+ This test is informational only and does not denote any security
21
+ problem.</description><synopsis>Some information about the remote HTTP configuration can be extracted.</synopsis><plugin_output>
22
+ Protocol version : HTTP/1.1
23
+ SSL : no
24
+ Keep-Alive : no
25
+ Options allowed : (Not implemented)
26
+ Headers :
27
+
28
+ Content-length: 1001
29
+ Server: TwistedWeb/8.1.0
30
+ Last-modified: Mon, 10 Aug 2009 07:16:33 GMT
31
+ Connection: close
32
+ Date: Fri, 11 Dec 2009 09:03:32 GMT
33
+ Content-type: text/html
34
+
35
+ </plugin_output>
36
+ <vpr_score>9.0</vpr_score>
37
+ <plugin_version>$Revision: 1.9 $</plugin_version></ReportItem></ReportHost></Report></NessusClientData_v2>
@@ -0,0 +1,37 @@
1
+ <?xml version="1.0" ?>
2
+ <NessusClientData_v2>
3
+ <Report name="vulnerability_priority_rating" xmlns:cm="http://www.nessus.org/cm">
4
+ <ReportHost name="computer">
5
+ <HostProperties>
6
+ <tag name="host-fqdn">computer.domain</tag>
7
+ <tag name="operating-system">windows</tag>
8
+ <tag name="system-type">general-purpose</tag>
9
+ <tag name="host-uuid">real-uuid</tag>
10
+ <tag name="host-ip">0.0.0.0</tag>
11
+ <tag name="netbios-name">computer</tag>
12
+ <tag name="LastAuthenticatedResults">111111</tag>
13
+ <tag name="local-checks-proto">local</tag>
14
+ <tag name="bios-uuid">real-uuid</tag></HostProperties>
15
+ <ReportItem port="9090" svc_name="www" protocol="tcp" severity="1" pluginID="24260" pluginName="HyperText Transfer Protocol (HTTP) Information" pluginFamily="Web Servers">
16
+ <solution>n/a</solution><risk_factor>None</risk_factor><description>This test gives some information about the remote HTTP protocol - the
17
+ version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
18
+ etc...
19
+
20
+ This test is informational only and does not denote any security
21
+ problem.</description><synopsis>Some information about the remote HTTP configuration can be extracted.</synopsis><plugin_output>
22
+ Protocol version : HTTP/1.1
23
+ SSL : no
24
+ Keep-Alive : no
25
+ Options allowed : (Not implemented)
26
+ Headers :
27
+
28
+ Content-length: 1001
29
+ Server: TwistedWeb/8.1.0
30
+ Last-modified: Mon, 10 Aug 2009 07:16:33 GMT
31
+ Connection: close
32
+ Date: Fri, 11 Dec 2009 09:03:32 GMT
33
+ Content-type: text/html
34
+
35
+ </plugin_output>
36
+ <vulnerability_priority_rating>9.0</vulnerability_priority_rating>
37
+ <plugin_version>$Revision: 1.9 $</plugin_version></ReportItem></ReportHost></Report></NessusClientData_v2>
@@ -42,10 +42,11 @@ If safe checks are enabled, this may be a false positive since it is based on th
42
42
  <exploit_code_maturity>Unproven</exploit_code_maturity>
43
43
  <plugin_modification_date>2011/03/08</plugin_modification_date>
44
44
  <cvss_base_score>7.5</cvss_base_score>
45
- <vpr_score>6.7</vpr_score>
45
+ <vulnerability_priority_rating>6.7</vulnerability_priority_rating>
46
46
  <product_coverage>Low</product_coverage>
47
47
  <canvas_package>CANVAS</canvas_package>
48
48
  <cve>CVE-2002-0392</cve>
49
+ <cwe>123</cwe>
49
50
  <bid>5033</bid>
50
51
  <xref>IAVA:2002-a-0003</xref>
51
52
  <xref>OSVDB:838</xref>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 4.11.0
4
+ version: 4.13.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-01-17 00:00:00.000000000 Z
11
+ date: 2024-08-07 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins
@@ -44,14 +44,14 @@ dependencies:
44
44
  requirements:
45
45
  - - "~>"
46
46
  - !ruby/object:Gem::Version
47
- version: '1.6'
47
+ version: '2.0'
48
48
  type: :development
49
49
  prerelease: false
50
50
  version_requirements: !ruby/object:Gem::Requirement
51
51
  requirements:
52
52
  - - "~>"
53
53
  - !ruby/object:Gem::Version
54
- version: '1.6'
54
+ version: '2.0'
55
55
  - !ruby/object:Gem::Dependency
56
56
  name: rake
57
57
  requirement: !ruby/object:Gem::Requirement
@@ -119,6 +119,7 @@ files:
119
119
  - lib/dradis/plugins/nessus/field_processor.rb
120
120
  - lib/dradis/plugins/nessus/gem_version.rb
121
121
  - lib/dradis/plugins/nessus/importer.rb
122
+ - lib/dradis/plugins/nessus/mapping.rb
122
123
  - lib/dradis/plugins/nessus/version.rb
123
124
  - lib/nessus/host.rb
124
125
  - lib/nessus/report_item.rb
@@ -128,17 +129,13 @@ files:
128
129
  - spec/fixtures/files/example_v2.nessus
129
130
  - spec/fixtures/files/host-01.xml
130
131
  - spec/fixtures/files/report_item-with-list.xml
132
+ - spec/fixtures/files/vpr_score.xml
133
+ - spec/fixtures/files/vulnerability_priority_rating.xml
131
134
  - spec/nessus/host_spec.rb
132
135
  - spec/spec_helper.rb
133
- - templates/evidence.fields
134
136
  - templates/evidence.sample
135
- - templates/evidence.template
136
- - templates/report_host.fields
137
137
  - templates/report_host.sample
138
- - templates/report_host.template
139
- - templates/report_item.fields
140
138
  - templates/report_item.sample
141
- - templates/report_item.template
142
139
  homepage: https://dradis.com/integrations/nessus.html
143
140
  licenses:
144
141
  - GPL-2
@@ -158,7 +155,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
158
155
  - !ruby/object:Gem::Version
159
156
  version: '0'
160
157
  requirements: []
161
- rubygems_version: 3.3.7
158
+ rubygems_version: 3.5.6
162
159
  signing_key:
163
160
  specification_version: 4
164
161
  summary: Nessus upload add-on for the Dradis Framework.
@@ -168,5 +165,7 @@ test_files:
168
165
  - spec/fixtures/files/example_v2.nessus
169
166
  - spec/fixtures/files/host-01.xml
170
167
  - spec/fixtures/files/report_item-with-list.xml
168
+ - spec/fixtures/files/vpr_score.xml
169
+ - spec/fixtures/files/vulnerability_priority_rating.xml
171
170
  - spec/nessus/host_spec.rb
172
171
  - spec/spec_helper.rb
@@ -1,17 +0,0 @@
1
- compliance.cm_actual_value
2
- compliance.cm_audit_file
3
- compliance.cm_check_id
4
- compliance.cm_check_name
5
- compliance.cm_info
6
- compliance.cm_output
7
- compliance.cm_policy_value
8
- compliance.cm_reference
9
- compliance.cm_result
10
- compliance.cm_see_also
11
- compliance.cm_solution
12
- evidence.plugin_output
13
- evidence.port
14
- evidence.protocol
15
- evidence.svc_name
16
- evidence.severity
17
- report_item.plugin_name
@@ -1,5 +0,0 @@
1
- #[Location]#
2
- %evidence.protocol%/%evidence.port%
3
-
4
- #[Output]#
5
- bc.. %evidence.plugin_output%
@@ -1,8 +0,0 @@
1
- report_host.name
2
- report_host.ip
3
- report_host.fqdn
4
- report_host.operating_system
5
- report_host.mac_address
6
- report_host.netbios_name
7
- report_host.scan_start_time
8
- report_host.scan_stop_time
@@ -1,14 +0,0 @@
1
- #[Title]#
2
- Nessus host summary
3
-
4
- #[Host information]#
5
- Name: %report_host.name%
6
- IP address: %report_host.ip%
7
- FQDN: %report_host.fqdn%
8
- OS: %report_host.operating_system%
9
- Mac address: %report_host.mac_address%
10
- Netbios name: %report_host.netbios_name%
11
-
12
- #[Scan information]#
13
- Scan started: %report_host.scan_start_time%
14
- Scan ended: %report_host.scan_stop_time%
@@ -1,44 +0,0 @@
1
- report_item.age_of_vuln
2
- report_item.bid_entries
3
- report_item.cve_entries
4
- report_item.cvss3_base_score
5
- report_item.cvss3_impact_score
6
- report_item.cvss3_temporal_score
7
- report_item.cvss3_temporal_vector
8
- report_item.cvss3_vector
9
- report_item.cvss_base_score
10
- report_item.cvss_temporal_score
11
- report_item.cvss_temporal_vector
12
- report_item.cvss_vector
13
- report_item.description
14
- report_item.exploitability_ease
15
- report_item.exploit_available
16
- report_item.exploit_code_maturity
17
- report_item.exploit_framework_canvas
18
- report_item.exploit_framework_core
19
- report_item.exploit_framework_metasploit
20
- report_item.metasploit_name
21
- report_item.patch_publication_date
22
- report_item.plugin_family
23
- report_item.plugin_id
24
- report_item.plugin_modification_date
25
- report_item.plugin_name
26
- report_item.plugin_output
27
- report_item.plugin_publication_date
28
- report_item.plugin_type
29
- report_item.plugin_version
30
- report_item.port
31
- report_item.product_coverage
32
- report_item.protocol
33
- report_item.risk_factor
34
- report_item.see_also_entries
35
- report_item.severity
36
- report_item.solution
37
- report_item.svc_name
38
- report_item.synopsis
39
- report_item.threat_intensity_last_28
40
- report_item.threat_recency
41
- report_item.threat_sources_last_28
42
- report_item.vpr_score
43
- report_item.vuln_publication_date
44
- report_item.xref_entries
@@ -1,20 +0,0 @@
1
- #[Title]#
2
- %report_item.plugin_name%
3
-
4
- #[CVSSv3.BaseScore]#
5
- %report_item.cvss3_base_score%
6
-
7
- #[CVSSv3Vector]#
8
- %report_item.cvss3_vector%
9
-
10
- #[Type]#
11
- Internal
12
-
13
- #[Description]#
14
- %report_item.description%
15
-
16
- #[Solution]#
17
- %report_item.solution%
18
-
19
- #[References]#
20
- %report_item.see_also_entries%