regscale-cli 6.20.0.0__py3-none-any.whl → 6.20.1.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of regscale-cli might be problematic. Click here for more details.

regscale/__init__.py CHANGED
@@ -1 +1 @@
1
- __version__ = "6.20.0.0"
1
+ __version__ = "6.20.1.1"
@@ -23,6 +23,22 @@ def sync_armis_centrix(regscale_ssp_id: int) -> None:
23
23
  assets_armis_centrix.run_sync(regscale_ssp_id=regscale_ssp_id)
24
24
 
25
25
 
26
+ @assets.command(name="sync_crowdstrike")
27
+ @regscale_ssp_id()
28
+ @click.option(
29
+ "--url",
30
+ type=click.STRING,
31
+ help="The root domain where your CrowdStrike Falcon tenant is located.",
32
+ required=False,
33
+ )
34
+ def sync_crowdstrike(regscale_ssp_id: int, url: str) -> None:
35
+ """Sync Assets from Crowdstrike to RegScale."""
36
+ from regscale.models.integration_models.synqly_models.connectors import Assets
37
+
38
+ assets_crowdstrike = Assets("crowdstrike")
39
+ assets_crowdstrike.run_sync(regscale_ssp_id=regscale_ssp_id, url=url)
40
+
41
+
26
42
  @assets.command(name="sync_nozomi_vantage")
27
43
  @regscale_ssp_id()
28
44
  def sync_nozomi_vantage(regscale_ssp_id: int) -> None:
@@ -57,12 +57,18 @@ def sync_malwarebytes(regscale_ssp_id: int, url: str) -> None:
57
57
 
58
58
  @edr.command(name="sync_sentinelone")
59
59
  @regscale_ssp_id()
60
- def sync_sentinelone(regscale_ssp_id: int) -> None:
60
+ @click.option(
61
+ "--edr_events_url",
62
+ type=click.STRING,
63
+ help="Base URL for the SentinelOne Singularity Data Lake API. This URL is required if you plan to use the EDR Events API.",
64
+ required=False,
65
+ )
66
+ def sync_sentinelone(regscale_ssp_id: int, edr_events_url: str) -> None:
61
67
  """Sync Edr from Sentinelone to RegScale."""
62
68
  from regscale.models.integration_models.synqly_models.connectors import Edr
63
69
 
64
70
  edr_sentinelone = Edr("sentinelone")
65
- edr_sentinelone.run_sync(regscale_ssp_id=regscale_ssp_id)
71
+ edr_sentinelone.run_sync(regscale_ssp_id=regscale_ssp_id, edr_events_url=edr_events_url)
66
72
 
67
73
 
68
74
  @edr.command(name="sync_sophos")
@@ -24,6 +24,31 @@ def sync_autotask(regscale_id: int, regscale_module: str) -> None:
24
24
  ticketing_autotask.run_sync(regscale_id=regscale_id, regscale_module=regscale_module)
25
25
 
26
26
 
27
+ @ticketing.command(name="sync_freshdesk")
28
+ @regscale_id()
29
+ @regscale_module()
30
+ @click.option(
31
+ "--name",
32
+ type=click.STRING,
33
+ help="freshdesk name",
34
+ required=True,
35
+ prompt="freshdesk name",
36
+ )
37
+ @click.option(
38
+ "--subject",
39
+ type=click.STRING,
40
+ help="freshdesk subject",
41
+ required=True,
42
+ prompt="freshdesk subject",
43
+ )
44
+ def sync_freshdesk(regscale_id: int, regscale_module: str, name: str, subject: str) -> None:
45
+ """Sync Ticketing data between Freshdesk and RegScale."""
46
+ from regscale.models.integration_models.synqly_models.connectors import Ticketing
47
+
48
+ ticketing_freshdesk = Ticketing("freshdesk")
49
+ ticketing_freshdesk.run_sync(regscale_id=regscale_id, regscale_module=regscale_module, name=name, subject=subject)
50
+
51
+
27
52
  @ticketing.command(name="sync_jira")
28
53
  @regscale_id()
29
54
  @regscale_module()
@@ -360,13 +360,15 @@ def update_imp_objective(
360
360
  )
361
361
  existing_pairs = {(obj.objectiveId, obj.implementationId) for obj in existing_imp_obj}
362
362
  responsibility = responsibility_map.get(responsibility, responsibility)
363
+ logger.debug(f"CRM Record: {crm_record}")
364
+ can_be_inherited_from_csp: str = crm_record.get("can_be_inherited_from_csp") or ""
363
365
  for objective in objectives:
364
366
  current_pair = (objective.id, imp.id)
365
367
  if current_pair not in existing_pairs:
366
368
  imp_obj = ImplementationObjective(
367
369
  id=0,
368
370
  uuid="",
369
- inherited=crm_record.get("can_be_inherited_from_csp") in ["Yes", "Partial"],
371
+ inherited=can_be_inherited_from_csp in ["Yes", "Partial"],
370
372
  implementationId=imp.id,
371
373
  status=status_map.get(cis_record.get("implementation_status", NOT_IMPLEMENTED), NOT_IMPLEMENTED),
372
374
  objectiveId=objective.id,
@@ -374,8 +376,8 @@ def update_imp_objective(
374
376
  securityControlId=objective.securityControlId,
375
377
  securityPlanId=REGSCALE_SSP_ID,
376
378
  responsibility=responsibility,
377
- cloudResponsibility=customer_responsibility,
378
- customerResponsibility=customer_responsibility,
379
+ cloudResponsibility=customer_responsibility if can_be_inherited_from_csp.lower() == "yes" else "",
380
+ customerResponsibility=(customer_responsibility if can_be_inherited_from_csp.lower() != "yes" else ""),
379
381
  authorizationId=leverage_auth_id,
380
382
  parentObjectiveId=objective.parentObjectiveId,
381
383
  )
@@ -1,9 +1,114 @@
1
1
  {
2
2
  "title": "CISA Catalog of Known Exploited Vulnerabilities",
3
- "catalogVersion": "2025.05.15",
4
- "dateReleased": "2025-05-15T17:04:05.6633Z",
5
- "count": 1345,
3
+ "catalogVersion": "2025.05.29",
4
+ "dateReleased": "2025-05-29T11:25:31.4802Z",
5
+ "count": 1352,
6
6
  "vulnerabilities": [
7
+ {
8
+ "cveID": "CVE-2025-4632",
9
+ "vendorProject": "Samsung",
10
+ "product": "MagicINFO 9 Server",
11
+ "vulnerabilityName": "Samsung MagicINFO 9 Server Path Traversal Vulnerability",
12
+ "dateAdded": "2025-05-22",
13
+ "shortDescription": "Samsung MagicINFO 9 Server contains a path traversal vulnerability that allows an attacker to write arbitrary file as system authority.",
14
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
15
+ "dueDate": "2025-06-12",
16
+ "knownRansomwareCampaignUse": "Unknown",
17
+ "notes": "https:\/\/security.samsungtv.com\/securityUpdates#SVP-MAY-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4632",
18
+ "cwes": [
19
+ "CWE-22"
20
+ ]
21
+ },
22
+ {
23
+ "cveID": "CVE-2023-38950",
24
+ "vendorProject": "ZKTeco",
25
+ "product": "BioTime",
26
+ "vulnerabilityName": "ZKTeco BioTime Path Traversal Vulnerability",
27
+ "dateAdded": "2025-05-19",
28
+ "shortDescription": "ZKTeco BioTime contains a path traversal vulnerability in the iclock API that allows an unauthenticated attacker to read arbitrary files via supplying a crafted payload.",
29
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
30
+ "dueDate": "2025-06-09",
31
+ "knownRansomwareCampaignUse": "Unknown",
32
+ "notes": "https:\/\/www.zkteco.com\/en\/Security_Bulletinsibs ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2023-38950",
33
+ "cwes": [
34
+ "CWE-22"
35
+ ]
36
+ },
37
+ {
38
+ "cveID": "CVE-2024-27443",
39
+ "vendorProject": "Synacor",
40
+ "product": "Zimbra Collaboration Suite (ZCS)",
41
+ "vulnerabilityName": "Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability",
42
+ "dateAdded": "2025-05-19",
43
+ "shortDescription": "Zimbra Collaboration contains a cross-site scripting (XSS) vulnerability in the CalendarInvite feature of the Zimbra webmail classic user interface. An attacker can exploit this vulnerability via an email message containing a crafted calendar header, leading to the execution of arbitrary JavaScript code.",
44
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
45
+ "dueDate": "2025-06-09",
46
+ "knownRansomwareCampaignUse": "Unknown",
47
+ "notes": "https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/8.8.15\/P46#Security_Fixes ; https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/9.0.0\/P39#Security_Fixes ; https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/10.0.7#Security_Fixes ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-27443",
48
+ "cwes": [
49
+ "CWE-79"
50
+ ]
51
+ },
52
+ {
53
+ "cveID": "CVE-2025-27920",
54
+ "vendorProject": "Srimax",
55
+ "product": "Output Messenger",
56
+ "vulnerabilityName": "Srimax Output Messenger Directory Traversal Vulnerability",
57
+ "dateAdded": "2025-05-19",
58
+ "shortDescription": "Srimax Output Messenger contains a directory traversal vulnerability that allows an attacker to access sensitive files outside the intended directory, potentially leading to configuration leakage or arbitrary file access.",
59
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
60
+ "dueDate": "2025-06-09",
61
+ "knownRansomwareCampaignUse": "Unknown",
62
+ "notes": "https:\/\/www.outputmessenger.com\/cve-2025-27920\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-27920",
63
+ "cwes": [
64
+ "CWE-22"
65
+ ]
66
+ },
67
+ {
68
+ "cveID": "CVE-2024-11182",
69
+ "vendorProject": "MDaemon",
70
+ "product": "Email Server",
71
+ "vulnerabilityName": "MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability",
72
+ "dateAdded": "2025-05-19",
73
+ "shortDescription": "MDaemon Email Server contains a cross-site scripting (XSS) vulnerability that allows a remote attacker to load arbitrary JavaScript code via an HTML e-mail message.",
74
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
75
+ "dueDate": "2025-06-09",
76
+ "knownRansomwareCampaignUse": "Unknown",
77
+ "notes": "https:\/\/files.mdaemon.com\/mdaemon\/beta\/RelNotes_en.html ; https:\/\/mdaemon.com\/pages\/downloads-critical-updates ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-11182",
78
+ "cwes": [
79
+ "CWE-79"
80
+ ]
81
+ },
82
+ {
83
+ "cveID": "CVE-2025-4428",
84
+ "vendorProject": "Ivanti",
85
+ "product": "Endpoint Manager Mobile (EPMM)",
86
+ "vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability",
87
+ "dateAdded": "2025-05-19",
88
+ "shortDescription": "Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability in the API component that allows an authenticated attacker to remotely execute arbitrary code via crafted API requests. This vulnerability results from an insecure implementation of the Hibernate Validator open-source library.",
89
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
90
+ "dueDate": "2025-06-09",
91
+ "knownRansomwareCampaignUse": "Unknown",
92
+ "notes": "https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4428",
93
+ "cwes": [
94
+ "CWE-94"
95
+ ]
96
+ },
97
+ {
98
+ "cveID": "CVE-2025-4427",
99
+ "vendorProject": "Ivanti",
100
+ "product": "Endpoint Manager Mobile (EPMM)",
101
+ "vulnerabilityName": "Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability",
102
+ "dateAdded": "2025-05-19",
103
+ "shortDescription": "Ivanti Endpoint Manager Mobile (EPMM) contains an authentication bypass vulnerability in the API component that allows an attacker to access protected resources without proper credentials via crafted API requests. This vulnerability results from an insecure implementation of the Spring Framework open-source library.",
104
+ "requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
105
+ "dueDate": "2025-06-09",
106
+ "knownRansomwareCampaignUse": "Unknown",
107
+ "notes": "https:\/\/forums.ivanti.com\/s\/article\/Security-Advisory-Ivanti-Endpoint-Manager-Mobile-EPMM ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4427",
108
+ "cwes": [
109
+ "CWE-288"
110
+ ]
111
+ },
7
112
  {
8
113
  "cveID": "CVE-2025-42999",
9
114
  "vendorProject": "SAP",
@@ -1117,7 +1222,7 @@
1117
1222
  "shortDescription": "SimpleHelp remote support software contains multiple path traversal vulnerabilities that allow unauthenticated remote attackers to download arbitrary files from the SimpleHelp host via crafted HTTP requests. These files may include server configuration files and hashed user passwords.",
1118
1223
  "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
1119
1224
  "dueDate": "2025-03-06",
1120
- "knownRansomwareCampaignUse": "Unknown",
1225
+ "knownRansomwareCampaignUse": "Known",
1121
1226
  "notes": "https:\/\/simple-help.com\/kb---security-vulnerabilities-01-2025 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2024-57727",
1122
1227
  "cwes": [
1123
1228
  "CWE-22"
@@ -8280,7 +8385,7 @@
8280
8385
  "shortDescription": "RARLAB UnRAR on Linux and UNIX contains a directory traversal vulnerability, allowing an attacker to write to files during an extract (unpack) operation.",
8281
8386
  "requiredAction": "Apply updates per vendor instructions.",
8282
8387
  "dueDate": "2022-08-30",
8283
- "knownRansomwareCampaignUse": "Unknown",
8388
+ "knownRansomwareCampaignUse": "Known",
8284
8389
  "notes": "Vulnerability updated with version 6.12. Accessing link will download update information: https:\/\/www.rarlab.com\/rar\/rarlinux-x32-612.tar.gz; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-30333",
8285
8390
  "cwes": [
8286
8391
  "CWE-22",
@@ -8296,7 +8401,7 @@
8296
8401
  "shortDescription": "Synacor Zimbra Collaboration Suite (ZCS) allows an attacker to inject memcache commands into a targeted instance which causes an overwrite of arbitrary cached entries.",
8297
8402
  "requiredAction": "Apply updates per vendor instructions.",
8298
8403
  "dueDate": "2022-08-25",
8299
- "knownRansomwareCampaignUse": "Unknown",
8404
+ "knownRansomwareCampaignUse": "Known",
8300
8405
  "notes": "https:\/\/wiki.zimbra.com\/wiki\/Zimbra_Releases\/9.0.0\/P24.1#Security_Fixes; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-27924",
8301
8406
  "cwes": [
8302
8407
  "CWE-93"
@@ -9510,7 +9615,7 @@
9510
9615
  "shortDescription": "Unspecified vulnerability in the Oracle WebCenter Forms Recognition component in Oracle Fusion Middleware allows remote attackers to affect confidentiality, integrity, and availability via Unknown vectors related to Designer.",
9511
9616
  "requiredAction": "Apply updates per vendor instructions.",
9512
9617
  "dueDate": "2022-06-15",
9513
- "knownRansomwareCampaignUse": "Unknown",
9618
+ "knownRansomwareCampaignUse": "Known",
9514
9619
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-1710",
9515
9620
  "cwes": []
9516
9621
  },
@@ -14048,7 +14153,7 @@
14048
14153
  "shortDescription": "The Java Runtime Environment (JRE) component in Oracle Java SE allow for remote code execution.",
14049
14154
  "requiredAction": "Apply updates per vendor instructions.",
14050
14155
  "dueDate": "2022-03-24",
14051
- "knownRansomwareCampaignUse": "Unknown",
14156
+ "knownRansomwareCampaignUse": "Known",
14052
14157
  "notes": "https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2012-4681",
14053
14158
  "cwes": []
14054
14159
  },