dradis-nessus 4.11.0 → 4.13.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +8 -0
- data/README.md +1 -2
- data/dradis-nessus.gemspec +1 -1
- data/lib/dradis/plugins/nessus/gem_version.rb +2 -2
- data/lib/dradis/plugins/nessus/importer.rb +3 -3
- data/lib/dradis/plugins/nessus/mapping.rb +103 -0
- data/lib/dradis/plugins/nessus.rb +1 -0
- data/lib/nessus/report_item.rb +8 -1
- data/spec/dradis/plugins/nessus/importer_spec.rb +29 -7
- data/spec/fixtures/files/vpr_score.xml +37 -0
- data/spec/fixtures/files/vulnerability_priority_rating.xml +37 -0
- data/templates/report_item.sample +2 -1
- metadata +10 -11
- data/templates/evidence.fields +0 -17
- data/templates/evidence.template +0 -5
- data/templates/report_host.fields +0 -8
- data/templates/report_host.template +0 -14
- data/templates/report_item.fields +0 -44
- data/templates/report_item.template +0 -20
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 5b1cd71866a497daa6b69caeab52f5a5931e5797a91641919a20b0f88f966444
|
4
|
+
data.tar.gz: 6d2afaa4bf0cdeb5a07043b418e759d039e373614abfa7899a77b2f14fa9cdc8
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: d51ec219b303d14569ed0a43af65ed2761c465a634c4b2fc2b7957b696ad809cb44505a58d90b067054516d5ec5e6c007a2e3a5929d795da971df3cfa2c1f221
|
7
|
+
data.tar.gz: 935990184cec4b2a2870edd44ba4bc62821ce02d5181d9996332d5974ab6bd981131a16c08d9cbdd1bac9b8f070795433807238806f7c9e85d2b1b8b789d1c43
|
data/CHANGELOG.md
CHANGED
@@ -1,3 +1,11 @@
|
|
1
|
+
v4.13.0 (July 2024)
|
2
|
+
- Add `cwe_entries` as an available Issue field
|
3
|
+
- Add `vulnerability_priority_rating` as an available Issue field
|
4
|
+
|
5
|
+
v4.12.0 (May 2024)
|
6
|
+
- Migrate integration to use Mappings Manager
|
7
|
+
- Update Dradis links in README
|
8
|
+
|
1
9
|
v4.11.0 (January 2024)
|
2
10
|
- No changes
|
3
11
|
|
data/README.md
CHANGED
@@ -8,8 +8,7 @@ The parser only supports version 2 of nessus xml format. Other formats (nbe, nsr
|
|
8
8
|
|
9
9
|
Also, the xml parser only extracts the results of a scan. It is not able to parse the scan policy itself which is also part of the xml file.
|
10
10
|
|
11
|
-
The add-on requires Dradis 3.0 or
|
12
|
-
|
11
|
+
The add-on requires [Dradis CE](https://dradis.com/ce/) > 3.0, or [Dradis Pro](https://dradis.com/).
|
13
12
|
|
14
13
|
## More information
|
15
14
|
|
data/dradis-nessus.gemspec
CHANGED
@@ -26,7 +26,7 @@ Gem::Specification.new do |spec|
|
|
26
26
|
spec.add_dependency 'dradis-plugins', '~> 4.0'
|
27
27
|
spec.add_dependency 'nokogiri'
|
28
28
|
|
29
|
-
spec.add_development_dependency 'bundler', '~>
|
29
|
+
spec.add_development_dependency 'bundler', '~> 2.0'
|
30
30
|
spec.add_development_dependency 'rake', '~> 10.0'
|
31
31
|
spec.add_development_dependency 'rspec-rails'
|
32
32
|
spec.add_development_dependency 'combustion', '~> 0.5.2'
|
@@ -79,7 +79,7 @@ module Dradis::Plugins::Nessus
|
|
79
79
|
logger.info{ "\tHost: #{host_label}" }
|
80
80
|
|
81
81
|
# 2. Add host info note and host properties
|
82
|
-
host_note_text =
|
82
|
+
host_note_text = mapping_service.apply_mapping(source: 'report_host', data: xml_host)
|
83
83
|
content_service.create_note(text: host_note_text, node: host_node)
|
84
84
|
|
85
85
|
if host_node.respond_to?(:properties)
|
@@ -123,7 +123,7 @@ module Dradis::Plugins::Nessus
|
|
123
123
|
plugin_id = xml_report_item.attributes['pluginID'].value
|
124
124
|
logger.info{ "\t\t => Creating new issue (plugin_id: #{plugin_id})" }
|
125
125
|
|
126
|
-
issue_text =
|
126
|
+
issue_text = mapping_service.apply_mapping(source: 'report_item', data: xml_report_item)
|
127
127
|
|
128
128
|
issue = content_service.create_issue(text: issue_text, id: plugin_id)
|
129
129
|
|
@@ -133,7 +133,7 @@ module Dradis::Plugins::Nessus
|
|
133
133
|
port_info += xml_report_item.attributes['port'].value
|
134
134
|
|
135
135
|
logger.info{ "\t\t\t => Adding reference to this host" }
|
136
|
-
evidence_content =
|
136
|
+
evidence_content = mapping_service.apply_mapping(source: 'evidence', data: xml_report_item)
|
137
137
|
|
138
138
|
content_service.create_evidence(issue: issue, node: host_node, content: evidence_content)
|
139
139
|
|
@@ -0,0 +1,103 @@
|
|
1
|
+
module Dradis::Plugins::Nessus
|
2
|
+
module Mapping
|
3
|
+
DEFAULT_MAPPING = {
|
4
|
+
evidence: {
|
5
|
+
'Location' => '{{ nessus[evidence.protocol] }}/{{ nessus[evidence.port] }}',
|
6
|
+
'Output' => 'bc.. {{ nessus[evidence.plugin_output] }}'
|
7
|
+
},
|
8
|
+
report_host: {
|
9
|
+
'Title' => 'Nessus host summary',
|
10
|
+
'Host information' => "Name: {{ nessus[report_host.name] }}\nIP address: {{ nessus[report_host.ip] }}\nFQDN: {{ nessus[report_host.fqdn] }}\nOS: {{ nessus[report_host.operating_system] }}\nMac address: {{ nessus[report_host.mac_address] }}\nNetbios name: {{ nessus[report_host.netbios_name] }}",
|
11
|
+
'Scan information' => "Scan started: {{ nessus[report_host.scan_start_time] }}\nScan ended: {{ nessus[report_host.scan_stop_time] }}"
|
12
|
+
},
|
13
|
+
report_item: {
|
14
|
+
'Title' => '{{ nessus[report_item.plugin_name] }}',
|
15
|
+
'CVSSv3.BaseScore' => '{{ nessus[report_item.cvss3_base_score] }}',
|
16
|
+
'CVSSv3.Vector' => '{{ nessus[report_item.cvss3_vector] }}',
|
17
|
+
'Type' => 'Internal',
|
18
|
+
'Description' => '{{ nessus[report_item.description] }}',
|
19
|
+
'Solution' => '{{ nessus[report_item.solution] }}',
|
20
|
+
'References' => '{{ nessus[report_item.see_also_entries] }}'
|
21
|
+
}
|
22
|
+
}.freeze
|
23
|
+
|
24
|
+
SOURCE_FIELDS = {
|
25
|
+
evidence: [
|
26
|
+
'compliance.cm_actual_value',
|
27
|
+
'compliance.cm_audit_file',
|
28
|
+
'compliance.cm_check_id',
|
29
|
+
'compliance.cm_check_name',
|
30
|
+
'compliance.cm_info',
|
31
|
+
'compliance.cm_output',
|
32
|
+
'compliance.cm_policy_value',
|
33
|
+
'compliance.cm_reference',
|
34
|
+
'compliance.cm_result',
|
35
|
+
'compliance.cm_see_also',
|
36
|
+
'compliance.cm_solution',
|
37
|
+
'evidence.plugin_output',
|
38
|
+
'evidence.port',
|
39
|
+
'evidence.protocol',
|
40
|
+
'evidence.svc_name',
|
41
|
+
'evidence.severity',
|
42
|
+
'report_item.plugin_name'
|
43
|
+
],
|
44
|
+
report_host: [
|
45
|
+
'report_host.name',
|
46
|
+
'report_host.ip',
|
47
|
+
'report_host.fqdn',
|
48
|
+
'report_host.operating_system',
|
49
|
+
'report_host.mac_address',
|
50
|
+
'report_host.netbios_name',
|
51
|
+
'report_host.scan_start_time',
|
52
|
+
'report_host.scan_stop_time'
|
53
|
+
],
|
54
|
+
report_item: [
|
55
|
+
'report_item.age_of_vuln',
|
56
|
+
'report_item.bid_entries',
|
57
|
+
'report_item.cve_entries',
|
58
|
+
'report_item.cwe_entries',
|
59
|
+
'report_item.cvss3_base_score',
|
60
|
+
'report_item.cvss3_impact_score',
|
61
|
+
'report_item.cvss3_temporal_score',
|
62
|
+
'report_item.cvss3_temporal_vector',
|
63
|
+
'report_item.cvss3_vector',
|
64
|
+
'report_item.cvss_base_score',
|
65
|
+
'report_item.cvss_temporal_score',
|
66
|
+
'report_item.cvss_temporal_vector',
|
67
|
+
'report_item.cvss_vector',
|
68
|
+
'report_item.description',
|
69
|
+
'report_item.exploitability_ease',
|
70
|
+
'report_item.exploit_available',
|
71
|
+
'report_item.exploit_code_maturity',
|
72
|
+
'report_item.exploit_framework_canvas',
|
73
|
+
'report_item.exploit_framework_core',
|
74
|
+
'report_item.exploit_framework_metasploit',
|
75
|
+
'report_item.metasploit_name',
|
76
|
+
'report_item.patch_publication_date',
|
77
|
+
'report_item.plugin_family',
|
78
|
+
'report_item.plugin_id',
|
79
|
+
'report_item.plugin_modification_date',
|
80
|
+
'report_item.plugin_name',
|
81
|
+
'report_item.plugin_output',
|
82
|
+
'report_item.plugin_publication_date',
|
83
|
+
'report_item.plugin_type',
|
84
|
+
'report_item.plugin_version',
|
85
|
+
'report_item.port',
|
86
|
+
'report_item.product_coverage',
|
87
|
+
'report_item.protocol',
|
88
|
+
'report_item.risk_factor',
|
89
|
+
'report_item.see_also_entries',
|
90
|
+
'report_item.severity',
|
91
|
+
'report_item.solution',
|
92
|
+
'report_item.svc_name',
|
93
|
+
'report_item.synopsis',
|
94
|
+
'report_item.threat_intensity_last_28',
|
95
|
+
'report_item.threat_recency',
|
96
|
+
'report_item.threat_sources_last_28',
|
97
|
+
'report_item.vpr_score',
|
98
|
+
'report_item.vuln_publication_date',
|
99
|
+
'report_item.xref_entries'
|
100
|
+
]
|
101
|
+
}.freeze
|
102
|
+
end
|
103
|
+
end
|
data/lib/nessus/report_item.rb
CHANGED
@@ -31,7 +31,7 @@ module Nessus
|
|
31
31
|
:risk_factor, :solution, :synopsis, :threat_intensity_last_28, :threat_recency,
|
32
32
|
:threat_sources_last_28, :vpr_score, :vuln_publication_date,
|
33
33
|
# multiple tags
|
34
|
-
:bid_entries, :cve_entries, :see_also_entries, :xref_entries,
|
34
|
+
:bid_entries, :cve_entries, :cwe_entries, :see_also_entries, :xref_entries,
|
35
35
|
# compliance tags
|
36
36
|
:cm_actual_value, :cm_audit_file, :cm_check_id, :cm_check_name, :cm_info,
|
37
37
|
:cm_output, :cm_policy_value, :cm_reference, :cm_result, :cm_see_also,
|
@@ -102,11 +102,18 @@ module Nessus
|
|
102
102
|
end
|
103
103
|
end
|
104
104
|
|
105
|
+
# older versions of Nessus use <vpr_score> while newer versions of Nessus
|
106
|
+
# use <vulnerability_priority_rating>. This allows either tag to be
|
107
|
+
# pulled in to the vpr_score mapping
|
108
|
+
if method_name == 'vpr_score'
|
109
|
+
return @xml.at_xpath('./vulnerability_priority_rating | ./vpr_score')&.text
|
110
|
+
end
|
105
111
|
|
106
112
|
# finally the enumerations: bid_entries, cve_entries, xref_entries
|
107
113
|
translations_table = {
|
108
114
|
:bid_entries => 'bid',
|
109
115
|
:cve_entries => 'cve',
|
116
|
+
:cwe_entries => 'cwe',
|
110
117
|
:see_also_entries => 'see_also',
|
111
118
|
:xref_entries => 'xref'
|
112
119
|
}
|
@@ -2,13 +2,10 @@ require 'spec_helper'
|
|
2
2
|
require 'ostruct'
|
3
3
|
|
4
4
|
describe Dradis::Plugins::Nessus::Importer do
|
5
|
-
|
6
5
|
before(:each) do
|
7
|
-
|
8
|
-
|
9
|
-
|
10
|
-
.to receive(:default_templates_dir).and_return(templates_dir)
|
11
|
-
|
6
|
+
mapping_service = double('Dradis::Plugins::MappingService')
|
7
|
+
allow(mapping_service).to receive(:apply_mapping).and_return('')
|
8
|
+
allow(Dradis::Plugins::MappingService).to receive(:new).and_return(mapping_service)
|
12
9
|
|
13
10
|
# Init services
|
14
11
|
plugin = Dradis::Plugins::Nessus
|
@@ -37,7 +34,7 @@ describe Dradis::Plugins::Nessus::Importer do
|
|
37
34
|
end
|
38
35
|
end
|
39
36
|
|
40
|
-
it
|
37
|
+
it 'creates one node for each host' do
|
41
38
|
%w{snorby.org scanme.insecure.org}.each do |host|
|
42
39
|
expect(@content_service).to receive(:create_node).with(hash_including label: host).once
|
43
40
|
end
|
@@ -52,4 +49,29 @@ describe Dradis::Plugins::Nessus::Importer do
|
|
52
49
|
# Run the import
|
53
50
|
@importer.import(file: 'spec/fixtures/files/example_v2.nessus')
|
54
51
|
end
|
52
|
+
|
53
|
+
describe 'vulnerability priority rating field' do
|
54
|
+
before do
|
55
|
+
allow(@content_service).to receive(:create_evidence) do |args|
|
56
|
+
OpenStruct.new(args)
|
57
|
+
end
|
58
|
+
|
59
|
+
expect_any_instance_of(Dradis::Plugins::TemplateService)
|
60
|
+
.to receive(:template_source).and_return("#[VPR]#\n%report_item.vpr_score%\n")
|
61
|
+
end
|
62
|
+
|
63
|
+
context '<vpr_score>' do
|
64
|
+
it 'exports the vpr_score field' do
|
65
|
+
expect(@content_service).to receive(:create_issue).with(hash_including text: "#[VPR]#\n9.0\n")
|
66
|
+
@importer.import(file: 'spec/fixtures/files/vulnerability_priority_rating.xml')
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
context '<vulnerability_priority_rating>' do
|
71
|
+
it 'exports the vpr_score field' do
|
72
|
+
expect(@content_service).to receive(:create_issue).with(hash_including text: "#[VPR]#\n9.0\n")
|
73
|
+
@importer.import(file: 'spec/fixtures/files/vpr_score.xml')
|
74
|
+
end
|
75
|
+
end
|
76
|
+
end
|
55
77
|
end
|
@@ -0,0 +1,37 @@
|
|
1
|
+
<?xml version="1.0" ?>
|
2
|
+
<NessusClientData_v2>
|
3
|
+
<Report name="vprscore" xmlns:cm="http://www.nessus.org/cm">
|
4
|
+
<ReportHost name="computer">
|
5
|
+
<HostProperties>
|
6
|
+
<tag name="host-fqdn">computer.domain</tag>
|
7
|
+
<tag name="operating-system">windows</tag>
|
8
|
+
<tag name="system-type">general-purpose</tag>
|
9
|
+
<tag name="host-uuid">real-uuid</tag>
|
10
|
+
<tag name="host-ip">0.0.0.0</tag>
|
11
|
+
<tag name="netbios-name">computer</tag>
|
12
|
+
<tag name="LastAuthenticatedResults">1111</tag>
|
13
|
+
<tag name="local-checks-proto">local</tag>
|
14
|
+
<tag name="bios-uuid">real-uuid</tag></HostProperties>
|
15
|
+
<ReportItem port="9090" svc_name="www" protocol="tcp" severity="1" pluginID="24260" pluginName="HyperText Transfer Protocol (HTTP) Information" pluginFamily="Web Servers">
|
16
|
+
<solution>n/a</solution><risk_factor>None</risk_factor><description>This test gives some information about the remote HTTP protocol - the
|
17
|
+
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
|
18
|
+
etc...
|
19
|
+
|
20
|
+
This test is informational only and does not denote any security
|
21
|
+
problem.</description><synopsis>Some information about the remote HTTP configuration can be extracted.</synopsis><plugin_output>
|
22
|
+
Protocol version : HTTP/1.1
|
23
|
+
SSL : no
|
24
|
+
Keep-Alive : no
|
25
|
+
Options allowed : (Not implemented)
|
26
|
+
Headers :
|
27
|
+
|
28
|
+
Content-length: 1001
|
29
|
+
Server: TwistedWeb/8.1.0
|
30
|
+
Last-modified: Mon, 10 Aug 2009 07:16:33 GMT
|
31
|
+
Connection: close
|
32
|
+
Date: Fri, 11 Dec 2009 09:03:32 GMT
|
33
|
+
Content-type: text/html
|
34
|
+
|
35
|
+
</plugin_output>
|
36
|
+
<vpr_score>9.0</vpr_score>
|
37
|
+
<plugin_version>$Revision: 1.9 $</plugin_version></ReportItem></ReportHost></Report></NessusClientData_v2>
|
@@ -0,0 +1,37 @@
|
|
1
|
+
<?xml version="1.0" ?>
|
2
|
+
<NessusClientData_v2>
|
3
|
+
<Report name="vulnerability_priority_rating" xmlns:cm="http://www.nessus.org/cm">
|
4
|
+
<ReportHost name="computer">
|
5
|
+
<HostProperties>
|
6
|
+
<tag name="host-fqdn">computer.domain</tag>
|
7
|
+
<tag name="operating-system">windows</tag>
|
8
|
+
<tag name="system-type">general-purpose</tag>
|
9
|
+
<tag name="host-uuid">real-uuid</tag>
|
10
|
+
<tag name="host-ip">0.0.0.0</tag>
|
11
|
+
<tag name="netbios-name">computer</tag>
|
12
|
+
<tag name="LastAuthenticatedResults">111111</tag>
|
13
|
+
<tag name="local-checks-proto">local</tag>
|
14
|
+
<tag name="bios-uuid">real-uuid</tag></HostProperties>
|
15
|
+
<ReportItem port="9090" svc_name="www" protocol="tcp" severity="1" pluginID="24260" pluginName="HyperText Transfer Protocol (HTTP) Information" pluginFamily="Web Servers">
|
16
|
+
<solution>n/a</solution><risk_factor>None</risk_factor><description>This test gives some information about the remote HTTP protocol - the
|
17
|
+
version used, whether HTTP Keep-Alive and HTTP pipelining are enabled,
|
18
|
+
etc...
|
19
|
+
|
20
|
+
This test is informational only and does not denote any security
|
21
|
+
problem.</description><synopsis>Some information about the remote HTTP configuration can be extracted.</synopsis><plugin_output>
|
22
|
+
Protocol version : HTTP/1.1
|
23
|
+
SSL : no
|
24
|
+
Keep-Alive : no
|
25
|
+
Options allowed : (Not implemented)
|
26
|
+
Headers :
|
27
|
+
|
28
|
+
Content-length: 1001
|
29
|
+
Server: TwistedWeb/8.1.0
|
30
|
+
Last-modified: Mon, 10 Aug 2009 07:16:33 GMT
|
31
|
+
Connection: close
|
32
|
+
Date: Fri, 11 Dec 2009 09:03:32 GMT
|
33
|
+
Content-type: text/html
|
34
|
+
|
35
|
+
</plugin_output>
|
36
|
+
<vulnerability_priority_rating>9.0</vulnerability_priority_rating>
|
37
|
+
<plugin_version>$Revision: 1.9 $</plugin_version></ReportItem></ReportHost></Report></NessusClientData_v2>
|
@@ -42,10 +42,11 @@ If safe checks are enabled, this may be a false positive since it is based on th
|
|
42
42
|
<exploit_code_maturity>Unproven</exploit_code_maturity>
|
43
43
|
<plugin_modification_date>2011/03/08</plugin_modification_date>
|
44
44
|
<cvss_base_score>7.5</cvss_base_score>
|
45
|
-
<
|
45
|
+
<vulnerability_priority_rating>6.7</vulnerability_priority_rating>
|
46
46
|
<product_coverage>Low</product_coverage>
|
47
47
|
<canvas_package>CANVAS</canvas_package>
|
48
48
|
<cve>CVE-2002-0392</cve>
|
49
|
+
<cwe>123</cwe>
|
49
50
|
<bid>5033</bid>
|
50
51
|
<xref>IAVA:2002-a-0003</xref>
|
51
52
|
<xref>OSVDB:838</xref>
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dradis-nessus
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.
|
4
|
+
version: 4.13.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Daniel Martin
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2024-
|
11
|
+
date: 2024-08-07 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: dradis-plugins
|
@@ -44,14 +44,14 @@ dependencies:
|
|
44
44
|
requirements:
|
45
45
|
- - "~>"
|
46
46
|
- !ruby/object:Gem::Version
|
47
|
-
version: '
|
47
|
+
version: '2.0'
|
48
48
|
type: :development
|
49
49
|
prerelease: false
|
50
50
|
version_requirements: !ruby/object:Gem::Requirement
|
51
51
|
requirements:
|
52
52
|
- - "~>"
|
53
53
|
- !ruby/object:Gem::Version
|
54
|
-
version: '
|
54
|
+
version: '2.0'
|
55
55
|
- !ruby/object:Gem::Dependency
|
56
56
|
name: rake
|
57
57
|
requirement: !ruby/object:Gem::Requirement
|
@@ -119,6 +119,7 @@ files:
|
|
119
119
|
- lib/dradis/plugins/nessus/field_processor.rb
|
120
120
|
- lib/dradis/plugins/nessus/gem_version.rb
|
121
121
|
- lib/dradis/plugins/nessus/importer.rb
|
122
|
+
- lib/dradis/plugins/nessus/mapping.rb
|
122
123
|
- lib/dradis/plugins/nessus/version.rb
|
123
124
|
- lib/nessus/host.rb
|
124
125
|
- lib/nessus/report_item.rb
|
@@ -128,17 +129,13 @@ files:
|
|
128
129
|
- spec/fixtures/files/example_v2.nessus
|
129
130
|
- spec/fixtures/files/host-01.xml
|
130
131
|
- spec/fixtures/files/report_item-with-list.xml
|
132
|
+
- spec/fixtures/files/vpr_score.xml
|
133
|
+
- spec/fixtures/files/vulnerability_priority_rating.xml
|
131
134
|
- spec/nessus/host_spec.rb
|
132
135
|
- spec/spec_helper.rb
|
133
|
-
- templates/evidence.fields
|
134
136
|
- templates/evidence.sample
|
135
|
-
- templates/evidence.template
|
136
|
-
- templates/report_host.fields
|
137
137
|
- templates/report_host.sample
|
138
|
-
- templates/report_host.template
|
139
|
-
- templates/report_item.fields
|
140
138
|
- templates/report_item.sample
|
141
|
-
- templates/report_item.template
|
142
139
|
homepage: https://dradis.com/integrations/nessus.html
|
143
140
|
licenses:
|
144
141
|
- GPL-2
|
@@ -158,7 +155,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
|
|
158
155
|
- !ruby/object:Gem::Version
|
159
156
|
version: '0'
|
160
157
|
requirements: []
|
161
|
-
rubygems_version: 3.
|
158
|
+
rubygems_version: 3.5.6
|
162
159
|
signing_key:
|
163
160
|
specification_version: 4
|
164
161
|
summary: Nessus upload add-on for the Dradis Framework.
|
@@ -168,5 +165,7 @@ test_files:
|
|
168
165
|
- spec/fixtures/files/example_v2.nessus
|
169
166
|
- spec/fixtures/files/host-01.xml
|
170
167
|
- spec/fixtures/files/report_item-with-list.xml
|
168
|
+
- spec/fixtures/files/vpr_score.xml
|
169
|
+
- spec/fixtures/files/vulnerability_priority_rating.xml
|
171
170
|
- spec/nessus/host_spec.rb
|
172
171
|
- spec/spec_helper.rb
|
data/templates/evidence.fields
DELETED
@@ -1,17 +0,0 @@
|
|
1
|
-
compliance.cm_actual_value
|
2
|
-
compliance.cm_audit_file
|
3
|
-
compliance.cm_check_id
|
4
|
-
compliance.cm_check_name
|
5
|
-
compliance.cm_info
|
6
|
-
compliance.cm_output
|
7
|
-
compliance.cm_policy_value
|
8
|
-
compliance.cm_reference
|
9
|
-
compliance.cm_result
|
10
|
-
compliance.cm_see_also
|
11
|
-
compliance.cm_solution
|
12
|
-
evidence.plugin_output
|
13
|
-
evidence.port
|
14
|
-
evidence.protocol
|
15
|
-
evidence.svc_name
|
16
|
-
evidence.severity
|
17
|
-
report_item.plugin_name
|
data/templates/evidence.template
DELETED
@@ -1,14 +0,0 @@
|
|
1
|
-
#[Title]#
|
2
|
-
Nessus host summary
|
3
|
-
|
4
|
-
#[Host information]#
|
5
|
-
Name: %report_host.name%
|
6
|
-
IP address: %report_host.ip%
|
7
|
-
FQDN: %report_host.fqdn%
|
8
|
-
OS: %report_host.operating_system%
|
9
|
-
Mac address: %report_host.mac_address%
|
10
|
-
Netbios name: %report_host.netbios_name%
|
11
|
-
|
12
|
-
#[Scan information]#
|
13
|
-
Scan started: %report_host.scan_start_time%
|
14
|
-
Scan ended: %report_host.scan_stop_time%
|
@@ -1,44 +0,0 @@
|
|
1
|
-
report_item.age_of_vuln
|
2
|
-
report_item.bid_entries
|
3
|
-
report_item.cve_entries
|
4
|
-
report_item.cvss3_base_score
|
5
|
-
report_item.cvss3_impact_score
|
6
|
-
report_item.cvss3_temporal_score
|
7
|
-
report_item.cvss3_temporal_vector
|
8
|
-
report_item.cvss3_vector
|
9
|
-
report_item.cvss_base_score
|
10
|
-
report_item.cvss_temporal_score
|
11
|
-
report_item.cvss_temporal_vector
|
12
|
-
report_item.cvss_vector
|
13
|
-
report_item.description
|
14
|
-
report_item.exploitability_ease
|
15
|
-
report_item.exploit_available
|
16
|
-
report_item.exploit_code_maturity
|
17
|
-
report_item.exploit_framework_canvas
|
18
|
-
report_item.exploit_framework_core
|
19
|
-
report_item.exploit_framework_metasploit
|
20
|
-
report_item.metasploit_name
|
21
|
-
report_item.patch_publication_date
|
22
|
-
report_item.plugin_family
|
23
|
-
report_item.plugin_id
|
24
|
-
report_item.plugin_modification_date
|
25
|
-
report_item.plugin_name
|
26
|
-
report_item.plugin_output
|
27
|
-
report_item.plugin_publication_date
|
28
|
-
report_item.plugin_type
|
29
|
-
report_item.plugin_version
|
30
|
-
report_item.port
|
31
|
-
report_item.product_coverage
|
32
|
-
report_item.protocol
|
33
|
-
report_item.risk_factor
|
34
|
-
report_item.see_also_entries
|
35
|
-
report_item.severity
|
36
|
-
report_item.solution
|
37
|
-
report_item.svc_name
|
38
|
-
report_item.synopsis
|
39
|
-
report_item.threat_intensity_last_28
|
40
|
-
report_item.threat_recency
|
41
|
-
report_item.threat_sources_last_28
|
42
|
-
report_item.vpr_score
|
43
|
-
report_item.vuln_publication_date
|
44
|
-
report_item.xref_entries
|
@@ -1,20 +0,0 @@
|
|
1
|
-
#[Title]#
|
2
|
-
%report_item.plugin_name%
|
3
|
-
|
4
|
-
#[CVSSv3.BaseScore]#
|
5
|
-
%report_item.cvss3_base_score%
|
6
|
-
|
7
|
-
#[CVSSv3Vector]#
|
8
|
-
%report_item.cvss3_vector%
|
9
|
-
|
10
|
-
#[Type]#
|
11
|
-
Internal
|
12
|
-
|
13
|
-
#[Description]#
|
14
|
-
%report_item.description%
|
15
|
-
|
16
|
-
#[Solution]#
|
17
|
-
%report_item.solution%
|
18
|
-
|
19
|
-
#[References]#
|
20
|
-
%report_item.see_also_entries%
|