dradis-nessus 3.22.0 → 4.0.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: ca05cc1e6b8552ce82dcc4165a30d7b2132a354a77d3cafe99a2badfdfa925a8
4
- data.tar.gz: 8974a0991b48dc28a66c1b933a46fe433fdcc4083f9ea8b98afa5cf4bbe16043
3
+ metadata.gz: 8daa3079a907770f6e96d8ed3a10201c06e38499946c4c41d67a15ecc9570952
4
+ data.tar.gz: c505dd8204f3965efbe3dd9cc516dda4085f3f5bcaaaa37281085b2884be6472
5
5
  SHA512:
6
- metadata.gz: 4d53a36906127b9be8631daeea80a17c2701a576ba843fd2913401ca0e03ccc013742ab5c7803c772e3e153d221f3bcaa5114bd78c49289aa83ac0e1ac527036
7
- data.tar.gz: 2b03091a16ed3f7bcc9759b838c551d4e7c4f89c09d60e298d587471f64b200ff183cd9b63f91ef98545034726821b5ef00cc89412014c7fe51958a7868b54cd
6
+ metadata.gz: bb1d2625988e6c72c86a2eb7d186f5d446713ff8c6cf53ef2a2fe22b294039dc59cf77a481d518b000effff4b8e390fe5d1bf8610c5a82488a33a9f6248bcbe3
7
+ data.tar.gz: 1ed3d69ab003f39d7093eef2895efe2f845efab8a799068655b676344ae7d074743b4fa376bae361407fb0dadef2528a7f1ec1d86fe205527423eae7c3e5ced7
data/CHANGELOG.md CHANGED
@@ -1,6 +1,12 @@
1
+ ## Dradis Framework 4.0.0 (July, 2021) ##
2
+
3
+ * Add age_of_vuln, exploit_code_maturity, threat_intensity_last_28
4
+ threat_recency, & threat_sources_last_28 as available Issue fields.
5
+
1
6
  ## Dradis Framework 3.22 (April, 2021) ##
2
7
 
3
8
  * Add report_item.cvss3_temporal_score & report_item.cvss3_temporal_vector as available fields.
9
+ * Add report_item.vpr_score as an available field.
4
10
 
5
11
  ## Dradis Framework 3.21 (February, 2021) ##
6
12
 
@@ -25,7 +25,7 @@ Gem::Specification.new do |spec|
25
25
  # versions of Rails (a sure recipe for disaster, I'm sure), which is needed
26
26
  # until we bump Dradis Pro to 4.1.
27
27
  # s.add_dependency 'rails', '~> 4.1.1'
28
- spec.add_dependency 'dradis-plugins', '~> 3.6'
28
+ spec.add_dependency 'dradis-plugins', '~> 4.0.0'
29
29
  spec.add_dependency 'nokogiri'
30
30
 
31
31
  spec.add_development_dependency 'bundler', '~> 1.6'
@@ -7,8 +7,8 @@ module Dradis
7
7
  end
8
8
 
9
9
  module VERSION
10
- MAJOR = 3
11
- MINOR = 22
10
+ MAJOR = 4
11
+ MINOR = 0
12
12
  TINY = 0
13
13
  PRE = nil
14
14
 
@@ -21,13 +21,14 @@ module Nessus
21
21
  # attributes
22
22
  :plugin_family, :plugin_id, :plugin_name, :port, :protocol, :svc_name, :severity,
23
23
  # simple tags
24
- :cvss3_base_score, :cvss3_temporal_score, :cvss3_temporal_vector, :cvss3_vector,
25
- :cvss_base_score, :cvss_temporal_score, :cvss_temporal_vector, :cvss_vector,
26
- :description, :exploit_available, :exploit_framework_canvas, :exploit_framework_core,
27
- :exploitability_ease, :exploit_framework_metasploit,
24
+ :age_of_vuln, :cvss3_base_score, :cvss3_temporal_score, :cvss3_temporal_vector,
25
+ :cvss3_vector, :cvss_base_score, :cvss_temporal_score, :cvss_temporal_vector, :cvss_vector,
26
+ :description, :exploit_available, :exploit_code_maturity, :exploit_framework_canvas,
27
+ :exploit_framework_core, :exploitability_ease, :exploit_framework_metasploit,
28
28
  :metasploit_name, :patch_publication_date, :plugin_modification_date, :plugin_output,
29
- :plugin_publication_date, :plugin_version, :risk_factor,
30
- :solution, :synopsis, :vuln_publication_date,
29
+ :plugin_publication_date, :plugin_version, :risk_factor, :solution, :synopsis,
30
+ :threat_intensity_last_28, :threat_recency, :threat_sources_last_28, :vpr_score,
31
+ :vuln_publication_date,
31
32
  # multiple tags
32
33
  :bid_entries, :cve_entries, :see_also_entries, :xref_entries,
33
34
  # compliance tags
@@ -1,35 +1,41 @@
1
- report_item.port
2
- report_item.svc_name
3
- report_item.protocol
4
- report_item.severity
5
- report_item.plugin_id
6
- report_item.plugin_name
7
- report_item.plugin_family
1
+ report_item.age_of_vuln
2
+ report_item.bid_entries
3
+ report_item.cve_entries
4
+ report_item.cvss3_base_score
5
+ report_item.cvss3_temporal_score
6
+ report_item.cvss3_temporal_vector
7
+ report_item.cvss3_vector
8
+ report_item.cvss_base_score
9
+ report_item.cvss_temporal_score
10
+ report_item.cvss_temporal_vector
11
+ report_item.cvss_vector
12
+ report_item.description
8
13
  report_item.exploitability_ease
9
- report_item.vuln_publication_date
14
+ report_item.exploit_available
15
+ report_item.exploit_code_maturity
10
16
  report_item.exploit_framework_canvas
11
- report_item.exploit_framework_metasploit
12
17
  report_item.exploit_framework_core
13
- report_item.solution
14
- report_item.risk_factor
15
- report_item.description
16
- report_item.plugin_publication_date
18
+ report_item.exploit_framework_metasploit
17
19
  report_item.metasploit_name
18
- report_item.cvss_vector
19
- report_item.cvss3_vector
20
- report_item.cvss_temporal_vector
21
- report_item.cvss3_temporal_vector
22
- report_item.cvss_temporal_score
23
- report_item.cvss3_temporal_score
24
- report_item.cvss_base_score
25
- report_item.cvss3_base_score
26
- report_item.synopsis
27
- report_item.exploit_available
28
20
  report_item.patch_publication_date
21
+ report_item.plugin_family
22
+ report_item.plugin_id
29
23
  report_item.plugin_modification_date
24
+ report_item.plugin_name
30
25
  report_item.plugin_output
26
+ report_item.plugin_publication_date
31
27
  report_item.plugin_version
32
- report_item.bid_entries
33
- report_item.cve_entries
28
+ report_item.port
29
+ report_item.protocol
30
+ report_item.risk_factor
34
31
  report_item.see_also_entries
35
- report_item.xref_entries
32
+ report_item.severity
33
+ report_item.solution
34
+ report_item.svc_name
35
+ report_item.synopsis
36
+ report_item.threat_intensity_last_28
37
+ report_item.threat_recency
38
+ report_item.threat_sources_last_28
39
+ report_item.vpr_score
40
+ report_item.vuln_publication_date
41
+ report_item.xref_entries
@@ -7,6 +7,7 @@
7
7
  pluginName="Apache Chunked Encoding Remote Overflow"
8
8
  pluginFamily="Web Servers">
9
9
 
10
+ <age_of_vuln>730 days +</age_of_vuln>
10
11
  <exploitability_ease>Exploits are available</exploitability_ease>
11
12
  <vuln_publication_date>2002/06/19</vuln_publication_date>
12
13
  <exploit_framework_canvas>true</exploit_framework_canvas>
@@ -29,12 +30,17 @@ If safe checks are enabled, this may be a false positive since it is based on th
29
30
  <cvss3_vector>CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N</cvss3_vector>
30
31
  <cvss_vector>CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P</cvss_vector>
31
32
  <synopsis>The remote web server is vulnerable to a remote code execution attack.</synopsis>
33
+ <threat_intensity_last_28>Very Low</threat_intensity_last_28>
34
+ <threat_recency>&gt; 365 days</threat_recency>
35
+ <threat_sources_last_28>No recorded events</threat_sources_last_28>
32
36
  <plugin_type>remote</plugin_type>
33
37
  <see_also>http://httpd.apache.org/info/security_bulletin_20020617.txt</see_also>
34
38
  <see_also>http://httpd.apache.org/info/security_bulletin_20020620.txt</see_also>
35
39
  <exploit_available>true</exploit_available>
40
+ <exploit_code_maturity>Unproven</exploit_code_maturity>
36
41
  <plugin_modification_date>2011/03/08</plugin_modification_date>
37
42
  <cvss_base_score>7.5</cvss_base_score>
43
+ <vpr_score>6.7</vpr_score>
38
44
  <canvas_package>CANVAS</canvas_package>
39
45
  <cve>CVE-2002-0392</cve>
40
46
  <bid>5033</bid>
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: dradis-nessus
3
3
  version: !ruby/object:Gem::Version
4
- version: 3.22.0
4
+ version: 4.0.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Daniel Martin
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-04-02 00:00:00.000000000 Z
11
+ date: 2021-08-03 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: dradis-plugins
@@ -16,14 +16,14 @@ dependencies:
16
16
  requirements:
17
17
  - - "~>"
18
18
  - !ruby/object:Gem::Version
19
- version: '3.6'
19
+ version: 4.0.0
20
20
  type: :runtime
21
21
  prerelease: false
22
22
  version_requirements: !ruby/object:Gem::Requirement
23
23
  requirements:
24
24
  - - "~>"
25
25
  - !ruby/object:Gem::Version
26
- version: '3.6'
26
+ version: 4.0.0
27
27
  - !ruby/object:Gem::Dependency
28
28
  name: nokogiri
29
29
  requirement: !ruby/object:Gem::Requirement
@@ -158,7 +158,7 @@ required_rubygems_version: !ruby/object:Gem::Requirement
158
158
  - !ruby/object:Gem::Version
159
159
  version: '0'
160
160
  requirements: []
161
- rubygems_version: 3.1.2
161
+ rubygems_version: 3.1.4
162
162
  signing_key:
163
163
  specification_version: 4
164
164
  summary: Nessus upload add-on for the Dradis Framework.