dradis-ntospider 4.2.0 → 4.3.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.gitignore +4 -0
- data/.rspec +2 -0
- data/CHANGELOG.md +3 -0
- data/README.md +5 -0
- data/dradis-ntospider.gemspec +5 -2
- data/lib/dradis/plugins/ntospider/field_processor.rb +5 -1
- data/lib/dradis/plugins/ntospider/gem_version.rb +1 -1
- data/lib/dradis/plugins/ntospider/importer.rb +10 -7
- data/lib/dradis-ntospider.rb +1 -0
- data/lib/ntospider/attack.rb +75 -0
- data/lib/ntospider/vuln.rb +24 -9
- data/spec/fixtures/files/VulnerabilitiesSummary.xml +484 -379
- data/spec/ntospider_import_spec.rb +87 -0
- data/spec/spec_helper.rb +10 -0
- data/templates/evidence.fields +13 -4
- data/templates/evidence.sample +28 -198
- data/templates/evidence.template +11 -8
- data/templates/vuln.fields +14 -0
- data/templates/vuln.sample +134 -197
- data/templates/vuln.template +3 -3
- metadata +58 -10
data/templates/vuln.sample
CHANGED
@@ -1,200 +1,137 @@
|
|
1
1
|
<Vuln>
|
2
|
-
<DbId>
|
3
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
4
|
-
<ScanName>
|
5
|
-
<WebSite>
|
6
|
-
<
|
7
|
-
<
|
8
|
-
<
|
9
|
-
<
|
10
|
-
<
|
11
|
-
<
|
12
|
-
<
|
13
|
-
<
|
14
|
-
<
|
15
|
-
<
|
16
|
-
<
|
17
|
-
<
|
18
|
-
<
|
19
|
-
<
|
20
|
-
<
|
2
|
+
<DbId>12F3E8EB183249F6B99039D2E0F6AB1B</DbId>
|
3
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
4
|
+
<ScanName>Example</ScanName>
|
5
|
+
<WebSite>https://test.t.example.com:443</WebSite>
|
6
|
+
<WebSiteIP>10.11.10.8</WebSiteIP>
|
7
|
+
<VulnType>Privilege Escalation</VulnType>
|
8
|
+
<VulnUrl>https://test.t.example.com/en/help</VulnUrl>
|
9
|
+
<NormalizedUrl>https://test.t.example.com/en/help</NormalizedUrl>
|
10
|
+
<MatchedString>OK</MatchedString>
|
11
|
+
<NormalizedPostParams></NormalizedPostParams>
|
12
|
+
<VulnParam></VulnParam>
|
13
|
+
<ParameterName>N/A</ParameterName>
|
14
|
+
<HtmlEntityAttacked>URL</HtmlEntityAttacked>
|
15
|
+
<ModuleId>433C43A54C714F08B822B7932D410A78</ModuleId>
|
16
|
+
<AttackType>Privilege Escalation</AttackType>
|
17
|
+
<AttackScore>2-Low</AttackScore>
|
18
|
+
<AttackValue>N/A</AttackValue>
|
19
|
+
<OriginalValue>N/A</OriginalValue>
|
20
|
+
<Method>N/A</Method>
|
21
|
+
<RootCauseId>27E938574D526F62DE4FD063F81159FF</RootCauseId>
|
22
|
+
<LuxorRootCauseId>9B1FF1FBC10827468899ACDF4EDF865E</LuxorRootCauseId>
|
23
|
+
<FindingDbId>9CFD9BA94ADD4E5C9715277A37F7822C</FindingDbId>
|
24
|
+
<Description>
|
25
|
+
<![CDATA[<p>Privilege escalation occurs when a user gets access to more resources or functionality than they are normally allowed,
|
26
|
+
and such elevation/changes should have been prevented by the application. This is usually caused by a flaw in the application.
|
27
|
+
The result is that the application performs actions with more privileges than those intended by the developer or system administrator</p>]]></Description>
|
28
|
+
<Recommendation>
|
29
|
+
<![CDATA[<p>The most important step is to think through an application’s access control requirements and capture it in a web application security policy.
|
30
|
+
We strongly recommend the use of an access control matrix to define the access control rules. Without documenting the security policy,
|
31
|
+
there is no definition of what it means to be secure for that site. The policy should document what types of users can access the system,
|
32
|
+
and what functions and content each of these types of users should be allowed to access. The access control mechanism should be extensively
|
33
|
+
tested to be sure that there is no way to bypass it. This testing requires a variety of accounts and extensive attempts to access unauthorized
|
34
|
+
content or functions.
|
21
35
|
|
22
|
-
|
23
|
-
|
24
|
-
|
25
|
-
|
26
|
-
|
27
|
-
|
28
|
-
|
29
|
-
|
30
|
-
|
31
|
-
<
|
32
|
-
<
|
33
|
-
<
|
34
|
-
<
|
35
|
-
<
|
36
|
-
<
|
37
|
-
<
|
38
|
-
<
|
39
|
-
<
|
40
|
-
<
|
41
|
-
<
|
42
|
-
<
|
43
|
-
<
|
44
|
-
<
|
45
|
-
<
|
46
|
-
<
|
47
|
-
<
|
48
|
-
<
|
49
|
-
<
|
50
|
-
<
|
51
|
-
<
|
52
|
-
|
53
|
-
|
54
|
-
<
|
55
|
-
<
|
56
|
-
<
|
57
|
-
<
|
58
|
-
<
|
59
|
-
<
|
60
|
-
|
61
|
-
|
62
|
-
<
|
63
|
-
<
|
64
|
-
<
|
65
|
-
<
|
66
|
-
<AttackValue
|
67
|
-
<AttackVulnUrl>
|
68
|
-
<AttackPostParams></AttackPostParams>
|
69
|
-
<AttackMatchedString>
|
70
|
-
<
|
71
|
-
<
|
72
|
-
<
|
73
|
-
<
|
74
|
-
<
|
75
|
-
<
|
76
|
-
<
|
77
|
-
</
|
78
|
-
</
|
79
|
-
|
80
|
-
<
|
81
|
-
<
|
82
|
-
|
83
|
-
<
|
84
|
-
<
|
85
|
-
<
|
86
|
-
<
|
87
|
-
<
|
88
|
-
<
|
89
|
-
|
90
|
-
|
91
|
-
|
92
|
-
<
|
93
|
-
<
|
94
|
-
</
|
95
|
-
</
|
96
|
-
|
97
|
-
<
|
98
|
-
<
|
99
|
-
<
|
100
|
-
<
|
101
|
-
<
|
102
|
-
<
|
103
|
-
<
|
104
|
-
<
|
105
|
-
<
|
106
|
-
<
|
107
|
-
<
|
108
|
-
<
|
109
|
-
<Request>
|
110
|
-
<
|
111
|
-
</
|
112
|
-
</
|
113
|
-
|
114
|
-
<
|
115
|
-
<
|
116
|
-
<
|
117
|
-
<
|
118
|
-
<
|
119
|
-
|
120
|
-
|
121
|
-
|
122
|
-
|
123
|
-
<DbId>81362DB814024D8899B83D4A4FF7DE3A</DbId>
|
124
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
125
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
126
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
127
|
-
<Benign>0</Benign>
|
128
|
-
</AttackRequest>
|
129
|
-
</AttackRequestList>
|
130
|
-
</Attack>
|
131
|
-
<Attack>
|
132
|
-
<DbId>96A0331A38FF47AFA13C547518721E08</DbId>
|
133
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
134
|
-
<AttackValue><![CDATA[<img """><script>alert("x9khdxei")</script>">]]></AttackValue>
|
135
|
-
<AttackVulnUrl>http://www.hackthissite.org/</AttackVulnUrl>
|
136
|
-
<AttackPostParams></AttackPostParams>
|
137
|
-
<AttackMatchedString>x9khdxei</AttackMatchedString>
|
138
|
-
<AttackRequestList>
|
139
|
-
<AttackRequest>
|
140
|
-
<DbId>49A7844AA3884CE19078E68B4F12E04B</DbId>
|
141
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
142
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
143
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
144
|
-
<Benign>0</Benign>
|
145
|
-
</AttackRequest>
|
146
|
-
</AttackRequestList>
|
147
|
-
</Attack>
|
148
|
-
<Attack>
|
149
|
-
<DbId>23E5FDE97F5E42628FC74477F8513B8D</DbId>
|
150
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
151
|
-
<AttackValue>');alert('x9krdis7');//</AttackValue>
|
152
|
-
<AttackVulnUrl>http://www.hackthissite.org/</AttackVulnUrl>
|
153
|
-
<AttackPostParams></AttackPostParams>
|
154
|
-
<AttackMatchedString>x9krdis7</AttackMatchedString>
|
155
|
-
<AttackRequestList>
|
156
|
-
<AttackRequest>
|
157
|
-
<DbId>E982E7BCB4F64A56AC6AC1B8C697E284</DbId>
|
158
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
159
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
160
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
161
|
-
<Benign>0</Benign>
|
162
|
-
</AttackRequest>
|
163
|
-
</AttackRequestList>
|
164
|
-
</Attack>
|
165
|
-
<Attack>
|
166
|
-
<DbId>B87C5202F4A74BEBA06936F6BD186076</DbId>
|
167
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
168
|
-
<AttackValue>'-alert(15189768)-'</AttackValue>
|
169
|
-
<AttackVulnUrl>http://www.hackthissite.org/</AttackVulnUrl>
|
170
|
-
<AttackPostParams></AttackPostParams>
|
171
|
-
<AttackMatchedString>15189768</AttackMatchedString>
|
172
|
-
<AttackRequestList>
|
173
|
-
<AttackRequest>
|
174
|
-
<DbId>E3F212EBD7134B958D3EB7D4369FE1A9</DbId>
|
175
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
176
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
177
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
178
|
-
<Benign>0</Benign>
|
179
|
-
</AttackRequest>
|
180
|
-
</AttackRequestList>
|
181
|
-
</Attack>
|
182
|
-
<Attack>
|
183
|
-
<DbId>ED858AB85A2C46C9953BA5E86C412BEE</DbId>
|
184
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
185
|
-
<AttackValue>';alert('x9lj3cup');//</AttackValue>
|
186
|
-
<AttackVulnUrl>http://www.hackthissite.org/</AttackVulnUrl>
|
187
|
-
<AttackPostParams></AttackPostParams>
|
188
|
-
<AttackMatchedString>x9lj3cup</AttackMatchedString>
|
189
|
-
<AttackRequestList>
|
190
|
-
<AttackRequest>
|
191
|
-
<DbId>2F292FE91CD64B86B98B536D9BA66FE7</DbId>
|
192
|
-
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
193
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
194
|
-
<Request>R0VUIC8/Jy1hbGVydCg2NzU5MDAxKS0nIEhUVFAvMS4xDQpBY2NlcHQ6IHRleHQvaHRtbCxhcHBsaWNhdGlvbi94aHRtbCt4bWwsYXBwbGljYXRpb24veG1sO3E9MC45LCovKjtxPTAuOA0KQWNjZXB0LUNoYXJzZXQ6ICoNCkFjY2VwdC1FbmNvZGluZzogZ3ppcCwgZGVmbGF0ZQ0KVXNlci1BZ2VudDogTW96aWxsYS81LjAgKGNvbXBhdGlibGU7IE1TSUUgOS4wOyBXaW5kb3dzIE5UIDYuMTsgV09XNjQ7IFRyaWRlbnQvNS4wKQ0KSG9zdDogd3d3LmhhY2t0aGlzc2l0ZS5vcmcNCkNvb2tpZTogUEhQU0VTU0lEPTlodm5sZnM1MWpzajJpaWVmbWg3NHVzdGEwOw0KDQo=</Request>
|
195
|
-
<Benign>0</Benign>
|
196
|
-
</AttackRequest>
|
197
|
-
</AttackRequestList>
|
198
|
-
</Attack>
|
199
|
-
</AttackList>
|
36
|
+
<br/>
|
37
|
+
Forced Browsing Past Access Control Checks – many sites require users to pass certain checks before being granted access to certain URLs
|
38
|
+
that are typically ‘deeper’ down in the site. These checks must not be bypassable by a user that simply skips over the page with the security check</p>]]></Recommendation>
|
39
|
+
<Page>https://test.t.example.com/en/help</Page>
|
40
|
+
<Url>https://test.t.example.com/en/help</Url>
|
41
|
+
<VulnParamType>unknown</VulnParamType>
|
42
|
+
<CrawlTraffic>R0VUIC9lbi9oZWxwP3N1YmplY3Q.....MGNiOTEwDQoNCg==</CrawlTraffic>
|
43
|
+
<CrawlTrafficTemplate>R0VUIC9lbi9oZWxwP3N1YmplY3.....GNiOTEwDQoNCg==</CrawlTrafficTemplate>
|
44
|
+
<CrawlTrafficResponse>SFRUUC8xLjEgMjAwIE9LDQpDYWNoZS1Db250.....aXB0PgoKPC9ib2R5Pgo8L2h0bWw+Cg==</CrawlTrafficResponse>
|
45
|
+
<AttackClass>Application Developer</AttackClass>
|
46
|
+
<CweId>264</CweId>
|
47
|
+
<CAPEC>0</CAPEC>
|
48
|
+
<DISSA_ASC>3500</DISSA_ASC>
|
49
|
+
<OWASP2007>7</OWASP2007>
|
50
|
+
<OWASP2010>3</OWASP2010>
|
51
|
+
<OWASP2013>2</OWASP2013>
|
52
|
+
<OWASP2017>2</OWASP2017>
|
53
|
+
<OVAL>0</OVAL>
|
54
|
+
<WASC>0</WASC>
|
55
|
+
<ScanDate>2018-03-19 16:30:53</ScanDate>
|
56
|
+
<ScanEnd>2018-03-19 16:48:09</ScanEnd>
|
57
|
+
<StatisticallyPrevalentOriginalResponseCode>200</StatisticallyPrevalentOriginalResponseCode>
|
58
|
+
<Confidence>Medium</Confidence>
|
59
|
+
<DefenseBL>
|
60
|
+
<DbId>F82B40D423864661A41C9F1323CAB60B</DbId>
|
61
|
+
<ParentDbId>613A47F32E334362AABEC26B51312380</ParentDbId>
|
62
|
+
<PcreRegex></PcreRegex>
|
63
|
+
<ModSecurity></ModSecurity>
|
64
|
+
<Snort></Snort>
|
65
|
+
<Imperva></Imperva>
|
66
|
+
</DefenseBL>
|
67
|
+
<DefenseWL>
|
68
|
+
<DbId>230A37C28D764DF5A1E7D1B66C154659</DbId>
|
69
|
+
<ParentDbId>613A47F32E334362AABEC26B51312380</ParentDbId>
|
70
|
+
<PcreRegex></PcreRegex>
|
71
|
+
<ModSecurity></ModSecurity>
|
72
|
+
<Snort></Snort>
|
73
|
+
<Imperva></Imperva>
|
74
|
+
</DefenseWL>
|
75
|
+
<AttackList>
|
76
|
+
<Attack>
|
77
|
+
<DbId>F3CE345BAF3442B48B2668809722032D</DbId>
|
78
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
79
|
+
<AttackId>PE_01</AttackId>
|
80
|
+
<AttackValue></AttackValue>
|
81
|
+
<AttackVulnUrl>https://test.t.example.com/en/help</AttackVulnUrl>
|
82
|
+
<AttackPostParams></AttackPostParams>
|
83
|
+
<AttackMatchedString>OK</AttackMatchedString>
|
84
|
+
<AttackDescription>Server allowed access to the resource without valid session</AttackDescription>
|
85
|
+
<AttackConfigDescription>Privilege Escalation</AttackConfigDescription>
|
86
|
+
<AttackUserNotes></AttackUserNotes>
|
87
|
+
<OriginalValue></OriginalValue>
|
88
|
+
<OriginalResponseCode>200</OriginalResponseCode>
|
89
|
+
<AttackRequestList>
|
90
|
+
<AttackRequest>
|
91
|
+
<DbId>0D9D750204F742E3B0FC513BFA1EABC9</DbId>
|
92
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
93
|
+
<Request>R0VUIC9lbi9oZWxwP3N1.....mlvDQoNCg==</Request>
|
94
|
+
<Response>SFRUUC8xLjEgMjAwIE9LDQpDYWNoZ.....ib2R5Pgo8L2h0bWw+Cg==</Response>
|
95
|
+
<Benign>0</Benign>
|
96
|
+
</AttackRequest>
|
97
|
+
<AttackRequest>
|
98
|
+
<DbId>D12FBA19C7AD4279A0D698D14D6480BE</DbId>
|
99
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
100
|
+
<Request>R0VUIC9lbi9oZWxwIEhUVFA.....N0LnQuZ2FiLmlvL2VuLw0KDQo=</Request>
|
101
|
+
<Response>SFRUUC8xLjEgMjAwIE9LDQpD.....PC9ib2R5Pgo8L2h0bWw+Cg==</Response>
|
102
|
+
<Benign>0</Benign>
|
103
|
+
</AttackRequest>
|
104
|
+
</AttackRequestList>
|
105
|
+
</Attack>
|
106
|
+
<Attack>
|
107
|
+
<DbId>24E4628D02CB4EF88C6DD5A4CC3A9649</DbId>
|
108
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
109
|
+
<AttackId>PE_01</AttackId>
|
110
|
+
<AttackValue></AttackValue>
|
111
|
+
<AttackVulnUrl>https://test.t.example.com/en/help</AttackVulnUrl>
|
112
|
+
<AttackPostParams></AttackPostParams>
|
113
|
+
<AttackMatchedString>OK</AttackMatchedString>
|
114
|
+
<AttackDescription>Server allowed access to the resource without valid session</AttackDescription>
|
115
|
+
<AttackConfigDescription>Privilege Escalation</AttackConfigDescription>
|
116
|
+
<AttackUserNotes></AttackUserNotes>
|
117
|
+
<OriginalValue></OriginalValue>
|
118
|
+
<OriginalResponseCode>200</OriginalResponseCode>
|
119
|
+
<AttackRequestList>
|
120
|
+
<AttackRequest>
|
121
|
+
<DbId>658B7A8BA3414DF38F98E55CF3C6A531</DbId>
|
122
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
123
|
+
<Request>R0VUIC9lbi9oZWxwP3N.....YWIuaW8NCg0K</Request>
|
124
|
+
<Response>SFRUUC8xLjEgMjAwIE9LD.....2R5Pgo8L2h0bWw+Cg==</Response>
|
125
|
+
<Benign>0</Benign>
|
126
|
+
</AttackRequest>
|
127
|
+
<AttackRequest>
|
128
|
+
<DbId>90B1D05DE89E4276A5BF156DD037773C</DbId>
|
129
|
+
<ParentDbId>00000000000000000000000000000000</ParentDbId>
|
130
|
+
<Request>R0VUIC9lbi9oZWxw.....Z2FiLmlvL2VuLw0KDQo=</Request>
|
131
|
+
<Response>SFRUUC8xLjEgMjAwI.....9ib2R5Pgo8L2h0bWw+Cg==</Response>
|
132
|
+
<Benign>0</Benign>
|
133
|
+
</AttackRequest>
|
134
|
+
</AttackRequestList>
|
135
|
+
</Attack>
|
136
|
+
</AttackList>
|
200
137
|
</Vuln>
|
data/templates/vuln.template
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: dradis-ntospider
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 4.
|
4
|
+
version: 4.3.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Daniel Martin
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2022-
|
11
|
+
date: 2022-04-29 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: dradis-plugins
|
@@ -28,30 +28,72 @@ dependencies:
|
|
28
28
|
name: bundler
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
30
30
|
requirements:
|
31
|
-
- - "
|
31
|
+
- - ">="
|
32
32
|
- !ruby/object:Gem::Version
|
33
|
-
version: '
|
33
|
+
version: '0'
|
34
34
|
type: :development
|
35
35
|
prerelease: false
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
37
37
|
requirements:
|
38
|
-
- - "
|
38
|
+
- - ">="
|
39
|
+
- !ruby/object:Gem::Version
|
40
|
+
version: '0'
|
41
|
+
- !ruby/object:Gem::Dependency
|
42
|
+
name: byebug
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
44
|
+
requirements:
|
45
|
+
- - ">="
|
46
|
+
- !ruby/object:Gem::Version
|
47
|
+
version: '0'
|
48
|
+
type: :development
|
49
|
+
prerelease: false
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
51
|
+
requirements:
|
52
|
+
- - ">="
|
39
53
|
- !ruby/object:Gem::Version
|
40
|
-
version: '
|
54
|
+
version: '0'
|
41
55
|
- !ruby/object:Gem::Dependency
|
42
56
|
name: rake
|
43
57
|
requirement: !ruby/object:Gem::Requirement
|
44
58
|
requirements:
|
45
|
-
- - "
|
59
|
+
- - ">="
|
46
60
|
- !ruby/object:Gem::Version
|
47
|
-
version: '
|
61
|
+
version: '0'
|
48
62
|
type: :development
|
49
63
|
prerelease: false
|
50
64
|
version_requirements: !ruby/object:Gem::Requirement
|
51
65
|
requirements:
|
52
|
-
- - "
|
66
|
+
- - ">="
|
67
|
+
- !ruby/object:Gem::Version
|
68
|
+
version: '0'
|
69
|
+
- !ruby/object:Gem::Dependency
|
70
|
+
name: rspec-rails
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
72
|
+
requirements:
|
73
|
+
- - ">="
|
74
|
+
- !ruby/object:Gem::Version
|
75
|
+
version: '0'
|
76
|
+
type: :development
|
77
|
+
prerelease: false
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
79
|
+
requirements:
|
80
|
+
- - ">="
|
81
|
+
- !ruby/object:Gem::Version
|
82
|
+
version: '0'
|
83
|
+
- !ruby/object:Gem::Dependency
|
84
|
+
name: combustion
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
86
|
+
requirements:
|
87
|
+
- - ">="
|
88
|
+
- !ruby/object:Gem::Version
|
89
|
+
version: '0'
|
90
|
+
type: :development
|
91
|
+
prerelease: false
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
93
|
+
requirements:
|
94
|
+
- - ">="
|
53
95
|
- !ruby/object:Gem::Version
|
54
|
-
version: '
|
96
|
+
version: '0'
|
55
97
|
description: This add-on allows you to upload and parse output produced from NTOSpider
|
56
98
|
Web Vulnerability Scanner into Dradis.
|
57
99
|
email:
|
@@ -63,6 +105,7 @@ files:
|
|
63
105
|
- ".github/issue_template.md"
|
64
106
|
- ".github/pull_request_template.md"
|
65
107
|
- ".gitignore"
|
108
|
+
- ".rspec"
|
66
109
|
- CHANGELOG.md
|
67
110
|
- CHANGELOG.template
|
68
111
|
- CONTRIBUTING.md
|
@@ -78,9 +121,12 @@ files:
|
|
78
121
|
- lib/dradis/plugins/ntospider/gem_version.rb
|
79
122
|
- lib/dradis/plugins/ntospider/importer.rb
|
80
123
|
- lib/dradis/plugins/ntospider/version.rb
|
124
|
+
- lib/ntospider/attack.rb
|
81
125
|
- lib/ntospider/vuln.rb
|
82
126
|
- lib/tasks/thorfile.rb
|
83
127
|
- spec/fixtures/files/VulnerabilitiesSummary.xml
|
128
|
+
- spec/ntospider_import_spec.rb
|
129
|
+
- spec/spec_helper.rb
|
84
130
|
- templates/evidence.fields
|
85
131
|
- templates/evidence.sample
|
86
132
|
- templates/evidence.template
|
@@ -112,3 +158,5 @@ specification_version: 4
|
|
112
158
|
summary: NTOSpider add-on for the Dradis Framework.
|
113
159
|
test_files:
|
114
160
|
- spec/fixtures/files/VulnerabilitiesSummary.xml
|
161
|
+
- spec/ntospider_import_spec.rb
|
162
|
+
- spec/spec_helper.rb
|