owasp-pipeline 0.8.3
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +7 -0
- data/CHANGES +23 -0
- data/FEATURES +19 -0
- data/README.md +101 -0
- data/bin/pipeline +67 -0
- data/lib/pipeline.rb +301 -0
- data/lib/pipeline/event.rb +14 -0
- data/lib/pipeline/filters.rb +41 -0
- data/lib/pipeline/filters/base_filter.rb +19 -0
- data/lib/pipeline/filters/jira_one_time_filter.rb +57 -0
- data/lib/pipeline/filters/remove_all_filter.rb +16 -0
- data/lib/pipeline/finding.rb +52 -0
- data/lib/pipeline/mounters.rb +55 -0
- data/lib/pipeline/mounters/base_mounter.rb +31 -0
- data/lib/pipeline/mounters/docker_mounter.rb +44 -0
- data/lib/pipeline/mounters/filesystem_mounter.rb +25 -0
- data/lib/pipeline/mounters/git_mounter.rb +52 -0
- data/lib/pipeline/mounters/iso_mounter.rb +42 -0
- data/lib/pipeline/mounters/url_mounter.rb +28 -0
- data/lib/pipeline/options.rb +240 -0
- data/lib/pipeline/reporters.rb +50 -0
- data/lib/pipeline/reporters/base_reporter.rb +21 -0
- data/lib/pipeline/reporters/csv_reporter.rb +19 -0
- data/lib/pipeline/reporters/jira_reporter.rb +61 -0
- data/lib/pipeline/reporters/json_reporter.rb +20 -0
- data/lib/pipeline/reporters/text_reporter.rb +19 -0
- data/lib/pipeline/scanner.rb +28 -0
- data/lib/pipeline/tasks.rb +124 -0
- data/lib/pipeline/tasks/av.rb +43 -0
- data/lib/pipeline/tasks/base_task.rb +64 -0
- data/lib/pipeline/tasks/brakeman.rb +60 -0
- data/lib/pipeline/tasks/bundle-audit.rb +93 -0
- data/lib/pipeline/tasks/checkmarx.rb +62 -0
- data/lib/pipeline/tasks/eslint.rb +71 -0
- data/lib/pipeline/tasks/fim.rb +61 -0
- data/lib/pipeline/tasks/nsp.rb +59 -0
- data/lib/pipeline/tasks/owasp-dep-check.rb +120 -0
- data/lib/pipeline/tasks/patterns.json +394 -0
- data/lib/pipeline/tasks/retirejs.rb +106 -0
- data/lib/pipeline/tasks/scanjs-eslintrc +106 -0
- data/lib/pipeline/tasks/scanjs.rb +32 -0
- data/lib/pipeline/tasks/sfl.rb +67 -0
- data/lib/pipeline/tasks/test.rb +47 -0
- data/lib/pipeline/tasks/zap.rb +84 -0
- data/lib/pipeline/tracker.rb +47 -0
- data/lib/pipeline/util.rb +39 -0
- data/lib/pipeline/version.rb +3 -0
- data/lib/zapjson.json +0 -0
- metadata +205 -0
@@ -0,0 +1,71 @@
|
|
1
|
+
require 'pipeline/tasks/base_task'
|
2
|
+
require 'json'
|
3
|
+
require 'pipeline/util'
|
4
|
+
|
5
|
+
class Pipeline::ESLint < Pipeline::BaseTask
|
6
|
+
|
7
|
+
Pipeline::Tasks.add self
|
8
|
+
include Pipeline::Util
|
9
|
+
|
10
|
+
def initialize(trigger, tracker)
|
11
|
+
super(trigger,tracker)
|
12
|
+
@name = "ESLint/ScanJS"
|
13
|
+
@description = "Source analysis for JavaScript"
|
14
|
+
@stage = :code
|
15
|
+
@labels << "code" << "javascript"
|
16
|
+
end
|
17
|
+
|
18
|
+
def run
|
19
|
+
Pipeline.notify "#{@name}"
|
20
|
+
rootpath = @trigger.path
|
21
|
+
currentpath = File.expand_path File.dirname(__FILE__)
|
22
|
+
Pipeline.debug "ESLint Config Path: #{currentpath}"
|
23
|
+
@result = `eslint -c #{currentpath}/scanjs-eslintrc --no-color --quiet --format json #{rootpath}`
|
24
|
+
end
|
25
|
+
|
26
|
+
def analyze
|
27
|
+
# puts @result
|
28
|
+
begin
|
29
|
+
parsed = JSON.parse(@result)
|
30
|
+
parsed.each do |result|
|
31
|
+
findings = {}
|
32
|
+
prints = []
|
33
|
+
messages = []
|
34
|
+
result['messages'].each do |msg|
|
35
|
+
message = msg['message']
|
36
|
+
findings[message] = {} if findings[message].nil?
|
37
|
+
findings[message][:detail] = msg['ruleId']
|
38
|
+
if messages.include?(message)
|
39
|
+
findings[message][:source] = "#{findings[message][:source]},#{msg['line']}" unless findings[message][:source].include?(",#{msg['line']}")
|
40
|
+
else
|
41
|
+
findings[message][:source] = "#{result['filePath']} Line: #{msg['line']}"
|
42
|
+
messages << message
|
43
|
+
end
|
44
|
+
findings[message][:severity] = severity(msg['severity'].to_s)
|
45
|
+
end
|
46
|
+
findings.each do |key, value|
|
47
|
+
print = fingerprint("#{key}#{value[:detail]}#{value[:source]}#{value[:sev]}")
|
48
|
+
unless prints.include?(print)
|
49
|
+
prints << print
|
50
|
+
report key, value[:detail], value[:source], value[:severity], print
|
51
|
+
end
|
52
|
+
end
|
53
|
+
end
|
54
|
+
rescue Exception => e
|
55
|
+
Pipeline.warn e.message
|
56
|
+
Pipeline.warn e.backtrace
|
57
|
+
end
|
58
|
+
end
|
59
|
+
|
60
|
+
def supported?
|
61
|
+
supported=runsystem(true, "eslint", "-c", "~/.scanjs-eslintrc")
|
62
|
+
if supported =~ /command not found/
|
63
|
+
Pipeline.notify "Install eslint and the scanjs .eslintrc"
|
64
|
+
return false
|
65
|
+
else
|
66
|
+
return true
|
67
|
+
end
|
68
|
+
end
|
69
|
+
|
70
|
+
end
|
71
|
+
|
@@ -0,0 +1,61 @@
|
|
1
|
+
# https://github.com/jessek/hashdeep/releases/tag/release-4.4
|
2
|
+
|
3
|
+
require 'pipeline/tasks/base_task'
|
4
|
+
require 'open3'
|
5
|
+
|
6
|
+
class Pipeline::FIM < Pipeline::BaseTask
|
7
|
+
|
8
|
+
Pipeline::Tasks.add self
|
9
|
+
|
10
|
+
def initialize(trigger, tracker)
|
11
|
+
super(trigger,tracker)
|
12
|
+
@name = "FIM"
|
13
|
+
@description = "File integrity monitor"
|
14
|
+
@stage = :file
|
15
|
+
@result = ''
|
16
|
+
@labels << "filesystem"
|
17
|
+
end
|
18
|
+
|
19
|
+
def run
|
20
|
+
Pipeline.notify "#{@name}"
|
21
|
+
rootpath = @trigger.path
|
22
|
+
if File.exists?("/area81/tmp/#{rootpath}/filehash")
|
23
|
+
Pipeline.notify "File Hashes found, comparing to file system"
|
24
|
+
cmd="hashdeep -j99 -r -a -vv -k /area81/tmp/#{rootpath}/filehash #{rootpath}"
|
25
|
+
|
26
|
+
# Ugly stdout parsing
|
27
|
+
r=/(.*): No match/
|
28
|
+
Open3.popen3(cmd) do |stdin, stdout, stderr, wait_thr|
|
29
|
+
while line = stdout.gets
|
30
|
+
if line.match r
|
31
|
+
@result << line
|
32
|
+
end
|
33
|
+
end
|
34
|
+
end
|
35
|
+
else
|
36
|
+
Pipeline.notify "No existing baseline - generating initial hashes"
|
37
|
+
cmd="mkdir -p /area81/tmp/#{rootpath}; hashdeep -j99 -r #{rootpath} > /area81/tmp/#{rootpath}/filehash"
|
38
|
+
Open3.popen3(cmd) do |stdin, stdout, stderr, wait_thr|
|
39
|
+
while line = stdout.gets
|
40
|
+
puts "."
|
41
|
+
end
|
42
|
+
end
|
43
|
+
@result = ''
|
44
|
+
end
|
45
|
+
end
|
46
|
+
|
47
|
+
def analyze
|
48
|
+
list = @result.split(/\n/)
|
49
|
+
list.each do |v|
|
50
|
+
# v.slice! installdir
|
51
|
+
Pipeline.notify v
|
52
|
+
report "File changed.", v, @name, :low
|
53
|
+
end
|
54
|
+
end
|
55
|
+
|
56
|
+
def supported?
|
57
|
+
# In future, verify tool is available.
|
58
|
+
return true
|
59
|
+
end
|
60
|
+
|
61
|
+
end
|
@@ -0,0 +1,59 @@
|
|
1
|
+
require 'pipeline/tasks/base_task'
|
2
|
+
require 'pipeline/util'
|
3
|
+
|
4
|
+
class Pipeline::NodeSecurityProject < Pipeline::BaseTask
|
5
|
+
|
6
|
+
Pipeline::Tasks.add self
|
7
|
+
include Pipeline::Util
|
8
|
+
|
9
|
+
def initialize(trigger, tracker)
|
10
|
+
super(trigger, tracker)
|
11
|
+
@name = "NodeSecurityProject"
|
12
|
+
@description = "Node Security Project"
|
13
|
+
@stage = :code
|
14
|
+
@labels << "code"
|
15
|
+
end
|
16
|
+
|
17
|
+
def run
|
18
|
+
Pipeline.notify "#{@name}"
|
19
|
+
rootpath = @trigger.path
|
20
|
+
Dir.chdir("#{rootpath}") do
|
21
|
+
@results = JSON.parse `nsp check --output json 2>&1`
|
22
|
+
end
|
23
|
+
end
|
24
|
+
|
25
|
+
def analyze
|
26
|
+
begin
|
27
|
+
# This block iterates through each package name found and selects the unique nsp advisories
|
28
|
+
# regardless of version, and builds a pipeline finding hash for each unique package/advisory combo.
|
29
|
+
@results.uniq {|finding| finding['module']}.each do |package|
|
30
|
+
@results.select {|f| f['module'] == package['module']}.uniq {|m| m['advisory']}.each do |unique_finding|
|
31
|
+
description = "#{unique_finding['module']} - #{unique_finding['title']}"
|
32
|
+
detail = "Upgrade to versions: #{unique_finding['patched_versions']}\n#{unique_finding['advisory']}"
|
33
|
+
source = {
|
34
|
+
:scanner => 'NodeSecurityProject',
|
35
|
+
:file => "#{unique_finding['module']} - #{unique_finding['vulnerable_versions']}",
|
36
|
+
:line => nil,
|
37
|
+
:code => nil
|
38
|
+
}
|
39
|
+
report description, detail, source, 'medium', fingerprint("#{description}#{detail}#{source}")
|
40
|
+
end
|
41
|
+
end
|
42
|
+
rescue Exception => e
|
43
|
+
Pipeline.warn e.message
|
44
|
+
Pipeline.warn e.backtrace
|
45
|
+
end
|
46
|
+
end
|
47
|
+
|
48
|
+
def supported?
|
49
|
+
supported=runsystem(true, "nsp", "--version")
|
50
|
+
if supported =~ /command not found/
|
51
|
+
Pipeline.notify "Install nodesecurity: 'npm install -g nsp'"
|
52
|
+
return false
|
53
|
+
else
|
54
|
+
return true
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
58
|
+
end
|
59
|
+
|
@@ -0,0 +1,120 @@
|
|
1
|
+
require 'pipeline/tasks/base_task'
|
2
|
+
require 'pipeline/util'
|
3
|
+
require 'rexml/document'
|
4
|
+
require 'rexml/streamlistener'
|
5
|
+
include REXML
|
6
|
+
|
7
|
+
# SAX Like Parser for OWASP DEP CHECK XML.
|
8
|
+
class Pipeline::DepCheckListener
|
9
|
+
include StreamListener
|
10
|
+
|
11
|
+
def initialize(task)
|
12
|
+
@task = task
|
13
|
+
@count = 0
|
14
|
+
@sw = ""
|
15
|
+
@url = ""
|
16
|
+
@desc = ""
|
17
|
+
@cwe = ""
|
18
|
+
@cvss = ""
|
19
|
+
@name = ""
|
20
|
+
@fingerprint = ""
|
21
|
+
end
|
22
|
+
|
23
|
+
def tag_start(name, attrs)
|
24
|
+
case name
|
25
|
+
when "vulnerability"
|
26
|
+
@count = @count + 1
|
27
|
+
# Pipeline.debug "Grabbed #{@count} vulns."
|
28
|
+
@sw = ""
|
29
|
+
@url = ""
|
30
|
+
@desc = ""
|
31
|
+
@cwe = ""
|
32
|
+
@cvss = ""
|
33
|
+
@name = ""
|
34
|
+
@fingerprint = ""
|
35
|
+
end
|
36
|
+
end
|
37
|
+
|
38
|
+
def tag_end(name)
|
39
|
+
case name
|
40
|
+
when "name"
|
41
|
+
if @text =~ /\D/
|
42
|
+
@name = @text
|
43
|
+
end
|
44
|
+
when "cvssScore"
|
45
|
+
@cvss = @text
|
46
|
+
when "cwe"
|
47
|
+
@cwe = @text
|
48
|
+
when "description"
|
49
|
+
@desc = @text
|
50
|
+
when "vulnerableSoftware"
|
51
|
+
@sw = ""
|
52
|
+
when "software"
|
53
|
+
@sw << ", " << @text
|
54
|
+
when "url"
|
55
|
+
@url << ", " << @text
|
56
|
+
when "vulnerability"
|
57
|
+
detail = @sw + "\n"+ @url
|
58
|
+
description = @desc + "\n" + @cwe
|
59
|
+
@fingerprint = @sw+"-"+@name
|
60
|
+
puts "Fingerprint: #{@fingerprint}"
|
61
|
+
puts "Vuln: #{@name} CVSS: #{@cvss} Description #{description} Detail #{detail}"
|
62
|
+
@task.report @name, description, detail, @cvss, @fingerprint
|
63
|
+
end
|
64
|
+
end
|
65
|
+
|
66
|
+
def text(text)
|
67
|
+
@text = text
|
68
|
+
end
|
69
|
+
end
|
70
|
+
|
71
|
+
class Pipeline::OWASPDependencyCheck < Pipeline::BaseTask
|
72
|
+
|
73
|
+
Pipeline::Tasks.add self
|
74
|
+
include Pipeline::Util
|
75
|
+
|
76
|
+
def initialize(trigger,tracker)
|
77
|
+
super(trigger,tracker)
|
78
|
+
@name = "OWASP Dependency Check"
|
79
|
+
@description = "Dependency analysis for Java and .NET"
|
80
|
+
@stage = :code
|
81
|
+
@labels << "code" << "java" << ".net"
|
82
|
+
end
|
83
|
+
|
84
|
+
def run
|
85
|
+
Pipeline.notify "#{@name}"
|
86
|
+
rootpath = @trigger.path
|
87
|
+
@result= runsystem(true, "/home/pipe/line/tools/dependency-check/bin/dependency-check.sh", "-a", "pipeline", "-f", "XML", "-out", "#{rootpath}", "-s", "#{rootpath}")
|
88
|
+
end
|
89
|
+
|
90
|
+
def analyze
|
91
|
+
path = @trigger.path + "/dependency-check-report.xml"
|
92
|
+
begin
|
93
|
+
Pipeline.debug "Parsing report #{path}"
|
94
|
+
get_warnings(path)
|
95
|
+
rescue Exception => e
|
96
|
+
Pipeline.notify "Problem running OWASP Dep Check ... skipped."
|
97
|
+
Pipeline.notify e.message
|
98
|
+
raise e
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
def supported?
|
103
|
+
supported=runsystem(true, "/home/pipe/line/tools//dependency-check/bin/dependency-check.sh", "-v")
|
104
|
+
if supported =~ /command not found/
|
105
|
+
Pipeline.notify "Install dependency-check."
|
106
|
+
return false
|
107
|
+
else
|
108
|
+
return true
|
109
|
+
end
|
110
|
+
end
|
111
|
+
|
112
|
+
def get_warnings(path)
|
113
|
+
listener = Pipeline::DepCheckListener.new(self)
|
114
|
+
parser = Parsers::StreamParser.new(File.new(path), listener)
|
115
|
+
parser.parse
|
116
|
+
end
|
117
|
+
end
|
118
|
+
|
119
|
+
|
120
|
+
|
@@ -0,0 +1,394 @@
|
|
1
|
+
[
|
2
|
+
{
|
3
|
+
"part": "filename",
|
4
|
+
"type": "regex",
|
5
|
+
"pattern": "\\A.*_rsa\\z",
|
6
|
+
"caption": "Private SSH key",
|
7
|
+
"description": null
|
8
|
+
},
|
9
|
+
{
|
10
|
+
"part": "filename",
|
11
|
+
"type": "regex",
|
12
|
+
"pattern": "\\A.*_dsa\\z",
|
13
|
+
"caption": "Private SSH key",
|
14
|
+
"description": null
|
15
|
+
},
|
16
|
+
{
|
17
|
+
"part": "filename",
|
18
|
+
"type": "regex",
|
19
|
+
"pattern": "\\A.*_ed25519\\z",
|
20
|
+
"caption": "Private SSH key",
|
21
|
+
"description": null
|
22
|
+
},
|
23
|
+
{
|
24
|
+
"part": "filename",
|
25
|
+
"type": "regex",
|
26
|
+
"pattern": "\\A.*_ecdsa\\z",
|
27
|
+
"caption": "Private SSH key",
|
28
|
+
"description": null
|
29
|
+
},
|
30
|
+
{
|
31
|
+
"part": "extension",
|
32
|
+
"type": "match",
|
33
|
+
"pattern": "pem",
|
34
|
+
"caption": "Potential cryptographic private key",
|
35
|
+
"description": null
|
36
|
+
},
|
37
|
+
{
|
38
|
+
"part": "extension",
|
39
|
+
"type": "regex",
|
40
|
+
"pattern": "\\Akey(pair)?\\z",
|
41
|
+
"caption": "Potential cryptographic private key",
|
42
|
+
"description": null
|
43
|
+
},
|
44
|
+
{
|
45
|
+
"part": "extension",
|
46
|
+
"type": "match",
|
47
|
+
"pattern": "pkcs12",
|
48
|
+
"caption": "Potential cryptographic key bundle",
|
49
|
+
"description": null
|
50
|
+
},
|
51
|
+
{
|
52
|
+
"part": "extension",
|
53
|
+
"type": "match",
|
54
|
+
"pattern": "pfx",
|
55
|
+
"caption": "Potential cryptographic key bundle",
|
56
|
+
"description": null
|
57
|
+
},
|
58
|
+
{
|
59
|
+
"part": "extension",
|
60
|
+
"type": "match",
|
61
|
+
"pattern": "p12",
|
62
|
+
"caption": "Potential cryptographic key bundle",
|
63
|
+
"description": null
|
64
|
+
},
|
65
|
+
{
|
66
|
+
"part": "extension",
|
67
|
+
"type": "match",
|
68
|
+
"pattern": "asc",
|
69
|
+
"caption": "Potential cryptographic key bundle",
|
70
|
+
"description": null
|
71
|
+
},
|
72
|
+
{
|
73
|
+
"part": "filename",
|
74
|
+
"type": "match",
|
75
|
+
"pattern": "otr.private_key",
|
76
|
+
"caption": "Pidgin OTR private key",
|
77
|
+
"description": null
|
78
|
+
},
|
79
|
+
{
|
80
|
+
"part": "filename",
|
81
|
+
"type": "regex",
|
82
|
+
"pattern": "\\A\\.?(bash_|zsh_|z)?history\\z",
|
83
|
+
"caption": "Shell command history file",
|
84
|
+
"description": null
|
85
|
+
},
|
86
|
+
{
|
87
|
+
"part": "filename",
|
88
|
+
"type": "regex",
|
89
|
+
"pattern": "\\A\\.?mysql_history\\z",
|
90
|
+
"caption": "MySQL client command history file",
|
91
|
+
"description": null
|
92
|
+
},
|
93
|
+
{
|
94
|
+
"part": "filename",
|
95
|
+
"type": "regex",
|
96
|
+
"pattern": "\\A\\.?psql_history\\z",
|
97
|
+
"caption": "PostgreSQL client command history file",
|
98
|
+
"description": null
|
99
|
+
},
|
100
|
+
{
|
101
|
+
"part": "filename",
|
102
|
+
"type": "regex",
|
103
|
+
"pattern": "\\A\\.?irb_history\\z",
|
104
|
+
"caption": "Ruby IRB console history file",
|
105
|
+
"description": null
|
106
|
+
},
|
107
|
+
{
|
108
|
+
"part": "path",
|
109
|
+
"type": "regex",
|
110
|
+
"pattern": "\\.?purple\\/accounts\\.xml\\z",
|
111
|
+
"caption": "Pidgin chat client account configuration file",
|
112
|
+
"description": null
|
113
|
+
},
|
114
|
+
{
|
115
|
+
"part": "path",
|
116
|
+
"type": "regex",
|
117
|
+
"pattern": "\\.?xchat2?\\/servlist_?\\.conf\\z",
|
118
|
+
"caption": "Hexchat/XChat IRC client server list configuration file",
|
119
|
+
"description": null
|
120
|
+
},
|
121
|
+
{
|
122
|
+
"part": "path",
|
123
|
+
"type": "regex",
|
124
|
+
"pattern": "\\.?irssi\\/config\\z",
|
125
|
+
"caption": "Irssi IRC client configuration file",
|
126
|
+
"description": null
|
127
|
+
},
|
128
|
+
{
|
129
|
+
"part": "path",
|
130
|
+
"type": "regex",
|
131
|
+
"pattern": "\\.?recon-ng\\/keys\\.db\\z",
|
132
|
+
"caption": "Recon-ng web reconnaissance framework API key database",
|
133
|
+
"description": null
|
134
|
+
},
|
135
|
+
{
|
136
|
+
"part": "filename",
|
137
|
+
"type": "regex",
|
138
|
+
"pattern": "\\A\\.?dbeaver-data-sources.xml\\z",
|
139
|
+
"caption": "DBeaver SQL database manager configuration file",
|
140
|
+
"description": null
|
141
|
+
},
|
142
|
+
{
|
143
|
+
"part": "filename",
|
144
|
+
"type": "regex",
|
145
|
+
"pattern": "\\A\\.?muttrc\\z",
|
146
|
+
"caption": "Mutt e-mail client configuration file",
|
147
|
+
"description": null
|
148
|
+
},
|
149
|
+
{
|
150
|
+
"part": "filename",
|
151
|
+
"type": "regex",
|
152
|
+
"pattern": "\\A\\.?s3cfg\\z",
|
153
|
+
"caption": "S3cmd configuration file",
|
154
|
+
"description": null
|
155
|
+
},
|
156
|
+
{
|
157
|
+
"part": "filename",
|
158
|
+
"type": "regex",
|
159
|
+
"pattern": "\\A\\.?trc\\z",
|
160
|
+
"caption": "T command-line Twitter client configuration file",
|
161
|
+
"description": null
|
162
|
+
},
|
163
|
+
{
|
164
|
+
"part": "extension",
|
165
|
+
"type": "match",
|
166
|
+
"pattern": "ovpn",
|
167
|
+
"caption": "OpenVPN client configuration file",
|
168
|
+
"description": null
|
169
|
+
},
|
170
|
+
{
|
171
|
+
"part": "filename",
|
172
|
+
"type": "regex",
|
173
|
+
"pattern": "\\A\\.?gitrobrc\\z",
|
174
|
+
"caption": "Well, this is awkward... Gitrob configuration file",
|
175
|
+
"description": null
|
176
|
+
},
|
177
|
+
{
|
178
|
+
"part": "filename",
|
179
|
+
"type": "regex",
|
180
|
+
"pattern": "\\A\\.?(bash|zsh)rc\\z",
|
181
|
+
"caption": "Shell configuration file",
|
182
|
+
"description": "Shell configuration files might contain information such as server hostnames, passwords and API keys."
|
183
|
+
},
|
184
|
+
{
|
185
|
+
"part": "filename",
|
186
|
+
"type": "regex",
|
187
|
+
"pattern": "\\A\\.?(bash_|zsh_)?profile\\z",
|
188
|
+
"caption": "Shell profile configuration file",
|
189
|
+
"description": "Shell configuration files might contain information such as server hostnames, passwords and API keys."
|
190
|
+
},
|
191
|
+
{
|
192
|
+
"part": "filename",
|
193
|
+
"type": "regex",
|
194
|
+
"pattern": "\\A\\.?(bash_|zsh_)?aliases\\z",
|
195
|
+
"caption": "Shell command alias configuration file",
|
196
|
+
"description": "Shell configuration files might contain information such as server hostnames, passwords and API keys."
|
197
|
+
},
|
198
|
+
{
|
199
|
+
"part": "filename",
|
200
|
+
"type": "match",
|
201
|
+
"pattern": "secret_token.rb",
|
202
|
+
"caption": "Ruby On Rails secret token configuration file",
|
203
|
+
"description": "If the Rails secret token is known, it can allow for remote code execution. (http://www.exploit-db.com/exploits/27527/)"
|
204
|
+
},
|
205
|
+
{
|
206
|
+
"part": "filename",
|
207
|
+
"type": "match",
|
208
|
+
"pattern": "omniauth.rb",
|
209
|
+
"caption": "OmniAuth configuration file",
|
210
|
+
"description": "The OmniAuth configuration file might contain client application secrets."
|
211
|
+
},
|
212
|
+
{
|
213
|
+
"part": "filename",
|
214
|
+
"type": "match",
|
215
|
+
"pattern": "carrierwave.rb",
|
216
|
+
"caption": "Carrierwave configuration file",
|
217
|
+
"description": "Can contain credentials for online storage systems such as Amazon S3 and Google Storage."
|
218
|
+
},
|
219
|
+
{
|
220
|
+
"part": "filename",
|
221
|
+
"type": "match",
|
222
|
+
"pattern": "schema.rb",
|
223
|
+
"caption": "Ruby On Rails database schema file",
|
224
|
+
"description": "Contains information on the database schema of a Ruby On Rails application."
|
225
|
+
},
|
226
|
+
{
|
227
|
+
"part": "filename",
|
228
|
+
"type": "match",
|
229
|
+
"pattern": "database.yml",
|
230
|
+
"caption": "Potential Ruby On Rails database configuration file",
|
231
|
+
"description": "Might contain database credentials."
|
232
|
+
},
|
233
|
+
{
|
234
|
+
"part": "filename",
|
235
|
+
"type": "match",
|
236
|
+
"pattern": "settings.py",
|
237
|
+
"caption": "Django configuration file",
|
238
|
+
"description": "Might contain database credentials, online storage system credentials, secret keys, etc."
|
239
|
+
},
|
240
|
+
{
|
241
|
+
"part": "filename",
|
242
|
+
"type": "regex",
|
243
|
+
"pattern": "\\A(.*)?config(\\.inc)?\\.php\\z",
|
244
|
+
"caption": "PHP configuration file",
|
245
|
+
"description": "Might contain credentials and keys."
|
246
|
+
},
|
247
|
+
{
|
248
|
+
"part": "extension",
|
249
|
+
"type": "match",
|
250
|
+
"pattern": "kdb",
|
251
|
+
"caption": "KeePass password manager database file",
|
252
|
+
"description": null
|
253
|
+
},
|
254
|
+
{
|
255
|
+
"part": "extension",
|
256
|
+
"type": "match",
|
257
|
+
"pattern": "agilekeychain",
|
258
|
+
"caption": "1Password password manager database file",
|
259
|
+
"description": null
|
260
|
+
},
|
261
|
+
{
|
262
|
+
"part": "extension",
|
263
|
+
"type": "match",
|
264
|
+
"pattern": "keychain",
|
265
|
+
"caption": "Apple Keychain database file",
|
266
|
+
"description": null
|
267
|
+
},
|
268
|
+
{
|
269
|
+
"part": "extension",
|
270
|
+
"type": "regex",
|
271
|
+
"pattern": "\\Akey(store|ring)\\z",
|
272
|
+
"caption": "GNOME Keyring database file",
|
273
|
+
"description": null
|
274
|
+
},
|
275
|
+
{
|
276
|
+
"part": "extension",
|
277
|
+
"type": "match",
|
278
|
+
"pattern": "log",
|
279
|
+
"caption": "Log file",
|
280
|
+
"description": "Log files might contain information such as references to secret HTTP endpoints, session IDs, user information, passwords and API keys."
|
281
|
+
},
|
282
|
+
{
|
283
|
+
"part": "extension",
|
284
|
+
"type": "match",
|
285
|
+
"pattern": "pcap",
|
286
|
+
"caption": "Network traffic capture file",
|
287
|
+
"description": null
|
288
|
+
},
|
289
|
+
{
|
290
|
+
"part": "extension",
|
291
|
+
"type": "regex",
|
292
|
+
"pattern": "\\Asql(dump)?\\z",
|
293
|
+
"caption": "SQL dump file",
|
294
|
+
"description": null
|
295
|
+
},
|
296
|
+
{
|
297
|
+
"part": "extension",
|
298
|
+
"type": "match",
|
299
|
+
"pattern": "gnucash",
|
300
|
+
"caption": "GnuCash database file",
|
301
|
+
"description": null
|
302
|
+
},
|
303
|
+
{
|
304
|
+
"part": "filename",
|
305
|
+
"type": "regex",
|
306
|
+
"pattern": "backup",
|
307
|
+
"caption": "Contains word: backup",
|
308
|
+
"description": null
|
309
|
+
},
|
310
|
+
{
|
311
|
+
"part": "filename",
|
312
|
+
"type": "regex",
|
313
|
+
"pattern": "dump",
|
314
|
+
"caption": "Contains word: dump",
|
315
|
+
"description": null
|
316
|
+
},
|
317
|
+
{
|
318
|
+
"part": "filename",
|
319
|
+
"type": "regex",
|
320
|
+
"pattern": "password",
|
321
|
+
"caption": "Contains word: password",
|
322
|
+
"description": null
|
323
|
+
},
|
324
|
+
{
|
325
|
+
"part": "filename",
|
326
|
+
"type": "regex",
|
327
|
+
"pattern": "private.*key",
|
328
|
+
"caption": "Contains words: private, key",
|
329
|
+
"description": null
|
330
|
+
},
|
331
|
+
{
|
332
|
+
"part": "filename",
|
333
|
+
"type": "match",
|
334
|
+
"pattern": "jenkins.plugins.publish_over_ssh.BapSshPublisherPlugin.xml",
|
335
|
+
"caption": "Jenkins publish over SSH plugin file",
|
336
|
+
"description": null
|
337
|
+
},
|
338
|
+
{
|
339
|
+
"part": "filename",
|
340
|
+
"type": "match",
|
341
|
+
"pattern": "credentials.xml",
|
342
|
+
"caption": "Potential Jenkins credentials file",
|
343
|
+
"description": null
|
344
|
+
},
|
345
|
+
{
|
346
|
+
"part": "filename",
|
347
|
+
"type": "regex",
|
348
|
+
"pattern": "\\A\\.?htpasswd\\z",
|
349
|
+
"caption": "Apache htpasswd file",
|
350
|
+
"description": null
|
351
|
+
},
|
352
|
+
{
|
353
|
+
"part": "filename",
|
354
|
+
"type": "regex",
|
355
|
+
"pattern": "\\A\\.?netrc\\z",
|
356
|
+
"caption": "Configuration file for auto-login process",
|
357
|
+
"description": "Might contain username and password."
|
358
|
+
},
|
359
|
+
{
|
360
|
+
"part": "extension",
|
361
|
+
"type": "match",
|
362
|
+
"pattern": "kwallet",
|
363
|
+
"caption": "KDE Wallet Manager database file",
|
364
|
+
"description": null
|
365
|
+
},
|
366
|
+
{
|
367
|
+
"part": "filename",
|
368
|
+
"type": "match",
|
369
|
+
"pattern": "LocalSettings.php",
|
370
|
+
"caption": "Potential MediaWiki configuration file",
|
371
|
+
"description": null
|
372
|
+
},
|
373
|
+
{
|
374
|
+
"part": "extension",
|
375
|
+
"type": "match",
|
376
|
+
"pattern": "tblk",
|
377
|
+
"caption": "Tunnelblick VPN configuration file",
|
378
|
+
"description": null
|
379
|
+
},
|
380
|
+
{
|
381
|
+
"part": "path",
|
382
|
+
"type": "regex",
|
383
|
+
"pattern": "\\A\\.?gem/credentials\\z",
|
384
|
+
"caption": "Rubygems credentials file",
|
385
|
+
"description": "Might contain API key for a rubygems.org account."
|
386
|
+
},
|
387
|
+
{
|
388
|
+
"part": "filename",
|
389
|
+
"type": "regex",
|
390
|
+
"pattern": "\\A*\\.pubxml(\\.user)?\\z",
|
391
|
+
"caption": "Potential MSBuild publish profile",
|
392
|
+
"description": null
|
393
|
+
}
|
394
|
+
]
|