regscale-cli 6.25.0.1__py3-none-any.whl → 6.26.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/airflow/hierarchy.py +2 -2
- regscale/core/app/application.py +18 -3
- regscale/core/app/internal/login.py +0 -1
- regscale/core/app/utils/catalog_utils/common.py +1 -1
- regscale/integrations/commercial/sicura/api.py +14 -13
- regscale/integrations/commercial/sicura/commands.py +8 -2
- regscale/integrations/commercial/sicura/scanner.py +49 -39
- regscale/integrations/commercial/stigv2/ckl_parser.py +5 -5
- regscale/integrations/commercial/synqly/assets.py +17 -0
- regscale/integrations/commercial/wizv2/click.py +26 -26
- regscale/integrations/commercial/wizv2/compliance_report.py +152 -157
- regscale/integrations/commercial/wizv2/constants.py +20 -71
- regscale/integrations/commercial/wizv2/scanner.py +3 -3
- regscale/integrations/compliance_integration.py +67 -2
- regscale/integrations/control_matcher.py +358 -0
- regscale/integrations/due_date_handler.py +118 -6
- regscale/integrations/milestone_manager.py +291 -0
- regscale/integrations/public/__init__.py +1 -0
- regscale/integrations/public/cci_importer.py +37 -38
- regscale/integrations/public/fedramp/click.py +60 -2
- regscale/integrations/public/fedramp/poam_export_v5.py +888 -0
- regscale/integrations/scanner_integration.py +199 -130
- regscale/models/integration_models/cisa_kev_data.json +199 -4
- regscale/models/integration_models/nexpose.py +36 -10
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/locking.py +12 -8
- regscale/models/platform.py +1 -2
- regscale/models/regscale_models/control_implementation.py +46 -21
- regscale/models/regscale_models/issue.py +256 -94
- regscale/models/regscale_models/milestone.py +1 -1
- regscale/models/regscale_models/regscale_model.py +6 -1
- regscale/templates/__init__.py +0 -0
- regscale/utils/threading/threadhandler.py +20 -15
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/METADATA +1 -1
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/RECORD +84 -37
- tests/regscale/integrations/commercial/__init__.py +0 -0
- tests/regscale/integrations/commercial/conftest.py +28 -0
- tests/regscale/integrations/commercial/microsoft_defender/__init__.py +1 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender.py +1517 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_api.py +1748 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_constants.py +327 -0
- tests/regscale/integrations/commercial/microsoft_defender/test_defender_scanner.py +487 -0
- tests/regscale/integrations/commercial/test_aws.py +3731 -0
- tests/regscale/integrations/commercial/test_burp.py +48 -0
- tests/regscale/integrations/commercial/test_crowdstrike.py +49 -0
- tests/regscale/integrations/commercial/test_dependabot.py +341 -0
- tests/regscale/integrations/commercial/test_gcp.py +1543 -0
- tests/regscale/integrations/commercial/test_gitlab.py +549 -0
- tests/regscale/integrations/commercial/test_ip_mac_address_length.py +84 -0
- tests/regscale/integrations/commercial/test_jira.py +1814 -0
- tests/regscale/integrations/commercial/test_npm_audit.py +42 -0
- tests/regscale/integrations/commercial/test_okta.py +1228 -0
- tests/regscale/integrations/commercial/test_sarif_converter.py +251 -0
- tests/regscale/integrations/commercial/test_sicura.py +350 -0
- tests/regscale/integrations/commercial/test_snow.py +423 -0
- tests/regscale/integrations/commercial/test_sonarcloud.py +394 -0
- tests/regscale/integrations/commercial/test_sqlserver.py +186 -0
- tests/regscale/integrations/commercial/test_stig.py +33 -0
- tests/regscale/integrations/commercial/test_stig_mapper.py +153 -0
- tests/regscale/integrations/commercial/test_stigv2.py +406 -0
- tests/regscale/integrations/commercial/test_wiz.py +1469 -0
- tests/regscale/integrations/commercial/test_wiz_inventory.py +256 -0
- tests/regscale/integrations/commercial/wizv2/__init__.py +339 -0
- tests/regscale/integrations/commercial/wizv2/test_compliance_report_normalization.py +138 -0
- tests/regscale/integrations/commercial/wizv2/test_issue.py +343 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_click_client_id.py +165 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_report.py +1351 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_compliance_unit.py +341 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_control_normalization.py +138 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_policy_compliance.py +750 -0
- tests/regscale/integrations/commercial/wizv2/test_wiz_status_mapping.py +149 -0
- tests/regscale/integrations/commercial/wizv2/test_wizv2.py +264 -0
- tests/regscale/integrations/commercial/wizv2/test_wizv2_utils.py +624 -0
- tests/regscale/integrations/public/fedramp/__init__.py +1 -0
- tests/regscale/integrations/public/fedramp/test_poam_export_v5.py +1293 -0
- tests/regscale/integrations/test_control_matcher.py +1314 -0
- tests/regscale/integrations/test_control_matching.py +155 -0
- tests/regscale/integrations/test_milestone_manager.py +408 -0
- tests/regscale/models/test_issue.py +378 -1
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/LICENSE +0 -0
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/WHEEL +0 -0
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.25.0.1.dist-info → regscale_cli-6.26.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1,9 +1,204 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.
|
|
4
|
-
"dateReleased": "2025-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.10.02",
|
|
4
|
+
"dateReleased": "2025-10-02T14:59:13.7696Z",
|
|
5
|
+
"count": 1427,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2014-6278",
|
|
9
|
+
"vendorProject": "GNU",
|
|
10
|
+
"product": "GNU Bash",
|
|
11
|
+
"vulnerabilityName": "GNU Bash OS Command Injection Vulnerability",
|
|
12
|
+
"dateAdded": "2025-10-02",
|
|
13
|
+
"shortDescription": "GNU Bash contains an OS command injection vulnerability which allows remote attackers to execute arbitrary commands via a crafted environment.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable. ",
|
|
15
|
+
"dueDate": "2025-10-23",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: http:\/\/ftp.gnu.org\/gnu\/bash\/bash-4.3-patches\/bash43-027 ; https:\/\/support.broadcom.com\/web\/ecx\/support-content-notification\/-\/external\/content\/SecurityAdvisories\/0\/23467 ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-20140926-bash ; https:\/\/www.ibm.com\/support\/pages\/security-bulletin-update-vulnerabilities-bash-affect-aix-toolbox-linux-applications-cve-2014-6271-cve-2014-6277-cve-2014-6278-cve-2014-7169-cve-2014-7186-and-cve-2014-7187 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2014-6278",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-78"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2017-1000353",
|
|
24
|
+
"vendorProject": "Jenkins",
|
|
25
|
+
"product": "Jenkins",
|
|
26
|
+
"vulnerabilityName": "Jenkins Remote Code Execution Vulnerability",
|
|
27
|
+
"dateAdded": "2025-10-02",
|
|
28
|
+
"shortDescription": "Jenkins contains a remote code execution vulnerability. This vulnerability that could allowed attackers to transfer a serialized Java SignedObject object to the remoting-based Jenkins CLI, that would be deserialized using a new ObjectInputStream, bypassing the existing blocklist-based protection mechanism.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-10-23",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/www.jenkins.io\/security\/advisory\/2017-04-26\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2017-1000353",
|
|
33
|
+
"cwes": []
|
|
34
|
+
},
|
|
35
|
+
{
|
|
36
|
+
"cveID": "CVE-2015-7755",
|
|
37
|
+
"vendorProject": "Juniper",
|
|
38
|
+
"product": "ScreenOS",
|
|
39
|
+
"vulnerabilityName": "Juniper ScreenOS Improper Authentication Vulnerability",
|
|
40
|
+
"dateAdded": "2025-10-02",
|
|
41
|
+
"shortDescription": "Juniper ScreenOS contains an improper authentication vulnerability that could allow unauthorized remote administrative access to the device.",
|
|
42
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
43
|
+
"dueDate": "2025-10-23",
|
|
44
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
45
|
+
"notes": "https:\/\/supportportal.juniper.net\/s\/article\/2015-12-Out-of-Cycle-Security-Bulletin-ScreenOS-Multiple-Security-issues-with-ScreenOS-CVE-2015-7755-CVE-2015-7756 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2015-7755",
|
|
46
|
+
"cwes": [
|
|
47
|
+
"CWE-287"
|
|
48
|
+
]
|
|
49
|
+
},
|
|
50
|
+
{
|
|
51
|
+
"cveID": "CVE-2025-21043",
|
|
52
|
+
"vendorProject": "Samsung",
|
|
53
|
+
"product": "Mobile Devices",
|
|
54
|
+
"vulnerabilityName": "Samsung Mobile Devices Out-of-Bounds Write Vulnerability",
|
|
55
|
+
"dateAdded": "2025-10-02",
|
|
56
|
+
"shortDescription": "Samsung mobile devices contain an out-of-bounds write vulnerability in libimagecodec.quram.so which allows remote attackers to execute arbitrary code.",
|
|
57
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
58
|
+
"dueDate": "2025-10-23",
|
|
59
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
60
|
+
"notes": "https:\/\/security.samsungmobile.com\/securityUpdate.smsb?year=2025&month=09 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-21043",
|
|
61
|
+
"cwes": [
|
|
62
|
+
"CWE-787"
|
|
63
|
+
]
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"cveID": "CVE-2025-4008",
|
|
67
|
+
"vendorProject": "Smartbedded",
|
|
68
|
+
"product": "Meteobridge",
|
|
69
|
+
"vulnerabilityName": "Smartbedded Meteobridge Command Injection Vulnerability",
|
|
70
|
+
"dateAdded": "2025-10-02",
|
|
71
|
+
"shortDescription": "Smartbedded Meteobridge contains a command injection vulnerability that could allow remote unauthenticated attackers to gain arbitrary command execution with elevated privileges (root) on affected devices.",
|
|
72
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
73
|
+
"dueDate": "2025-10-23",
|
|
74
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
75
|
+
"notes": "https:\/\/forum.meteohub.de\/viewtopic.php?t=18687 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-4008",
|
|
76
|
+
"cwes": [
|
|
77
|
+
"CWE-306",
|
|
78
|
+
"CWE-77"
|
|
79
|
+
]
|
|
80
|
+
},
|
|
81
|
+
{
|
|
82
|
+
"cveID": "CVE-2025-32463",
|
|
83
|
+
"vendorProject": "Sudo",
|
|
84
|
+
"product": "Sudo",
|
|
85
|
+
"vulnerabilityName": "Sudo Inclusion of Functionality from Untrusted Control Sphere Vulnerability",
|
|
86
|
+
"dateAdded": "2025-09-29",
|
|
87
|
+
"shortDescription": "Sudo contains an inclusion of functionality from untrusted control sphere vulnerability. This vulnerability could allow local attacker to leverage sudo\u2019s -R (--chroot) option to run arbitrary commands as root, even if they are not listed in the sudoers file.",
|
|
88
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
89
|
+
"dueDate": "2025-10-20",
|
|
90
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
91
|
+
"notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/www.sudo.ws\/security\/advisories\/chroot_bug\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-32463",
|
|
92
|
+
"cwes": [
|
|
93
|
+
"CWE-829"
|
|
94
|
+
]
|
|
95
|
+
},
|
|
96
|
+
{
|
|
97
|
+
"cveID": "CVE-2025-59689",
|
|
98
|
+
"vendorProject": "Libraesva",
|
|
99
|
+
"product": "Email Security Gateway",
|
|
100
|
+
"vulnerabilityName": "Libraesva Email Security Gateway Command Injection Vulnerability",
|
|
101
|
+
"dateAdded": "2025-09-29",
|
|
102
|
+
"shortDescription": "Libraesva Email Security Gateway (ESG) contains a command injection vulnerability which allows command injection via a compressed e-mail attachment.",
|
|
103
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
104
|
+
"dueDate": "2025-10-20",
|
|
105
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
106
|
+
"notes": "https:\/\/docs.libraesva.com\/knowledgebase\/security-advisory-command-injection-vulnerability-cve-2025-59689\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59689",
|
|
107
|
+
"cwes": [
|
|
108
|
+
"CWE-77"
|
|
109
|
+
]
|
|
110
|
+
},
|
|
111
|
+
{
|
|
112
|
+
"cveID": "CVE-2025-10035",
|
|
113
|
+
"vendorProject": "Fortra",
|
|
114
|
+
"product": "GoAnywhere MFT",
|
|
115
|
+
"vulnerabilityName": "Fortra GoAnywhere MFT Deserialization of Untrusted Data Vulnerability",
|
|
116
|
+
"dateAdded": "2025-09-29",
|
|
117
|
+
"shortDescription": "Fortra GoAnywhere MFT contains a deserialization of untrusted data vulnerability allows an actor with a validly forged license response signature to deserialize an arbitrary actor-controlled object, possibly leading to command injection.",
|
|
118
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
119
|
+
"dueDate": "2025-10-20",
|
|
120
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
121
|
+
"notes": "https:\/\/www.fortra.com\/security\/advisories\/product-security\/fi-2025-012 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10035",
|
|
122
|
+
"cwes": [
|
|
123
|
+
"CWE-502",
|
|
124
|
+
"CWE-77"
|
|
125
|
+
]
|
|
126
|
+
},
|
|
127
|
+
{
|
|
128
|
+
"cveID": "CVE-2025-20352",
|
|
129
|
+
"vendorProject": "Cisco",
|
|
130
|
+
"product": "IOS and IOS XE",
|
|
131
|
+
"vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Denial of Service and Remote Code Execution Vulnerability",
|
|
132
|
+
"dateAdded": "2025-09-29",
|
|
133
|
+
"shortDescription": "Cisco IOS and IOS XE contains a stack-based buffer overflow vulnerability in the Simple Network Management Protocol (SNMP) subsystem that could allow for denial of service or remote code execution. A successful exploit could allow a low-privileged attacker to cause the affected system to reload, resulting in a DoS condition, or allow a high-privileged attacker to execute arbitrary code as the root user and obtain full control of the affected system.",
|
|
134
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
135
|
+
"dueDate": "2025-10-20",
|
|
136
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
137
|
+
"notes": "https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-snmp-x4LPhte ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20352",
|
|
138
|
+
"cwes": [
|
|
139
|
+
"CWE-121"
|
|
140
|
+
]
|
|
141
|
+
},
|
|
142
|
+
{
|
|
143
|
+
"cveID": "CVE-2021-21311",
|
|
144
|
+
"vendorProject": "Adminer",
|
|
145
|
+
"product": "Adminer",
|
|
146
|
+
"vulnerabilityName": "Adminer Server-Side Request Forgery Vulnerability",
|
|
147
|
+
"dateAdded": "2025-09-29",
|
|
148
|
+
"shortDescription": "Adminer contains a server-side request forgery vulnerability that, when exploited, allows a remote attacker to obtain potentially sensitive information.",
|
|
149
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
150
|
+
"dueDate": "2025-10-20",
|
|
151
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
152
|
+
"notes": "https:\/\/github.com\/vrana\/adminer\/security\/advisories\/GHSA-x5r2-hj5c-8jx6 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2021-21311",
|
|
153
|
+
"cwes": [
|
|
154
|
+
"CWE-918"
|
|
155
|
+
]
|
|
156
|
+
},
|
|
157
|
+
{
|
|
158
|
+
"cveID": "CVE-2025-20362",
|
|
159
|
+
"vendorProject": "Cisco",
|
|
160
|
+
"product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
|
|
161
|
+
"vulnerabilityName": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Missing Authorization Vulnerability",
|
|
162
|
+
"dateAdded": "2025-09-25",
|
|
163
|
+
"shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a missing authorization vulnerability. This vulnerability could be chained with CVE-2025-20333.",
|
|
164
|
+
"requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
|
|
165
|
+
"dueDate": "2025-09-26",
|
|
166
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
167
|
+
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-YROOTUW ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20362",
|
|
168
|
+
"cwes": [
|
|
169
|
+
"CWE-862"
|
|
170
|
+
]
|
|
171
|
+
},
|
|
172
|
+
{
|
|
173
|
+
"cveID": "CVE-2025-20333",
|
|
174
|
+
"vendorProject": "Cisco",
|
|
175
|
+
"product": "Secure Firewall Adaptive Security Appliance and Secure Firewall Threat Defense",
|
|
176
|
+
"vulnerabilityName": "Cisco Secure Firewall Adaptive Security Appliance (ASA) and Secure Firewall Threat Defense (FTD) Buffer Overflow Vulnerability",
|
|
177
|
+
"dateAdded": "2025-09-25",
|
|
178
|
+
"shortDescription": "Cisco Secure Firewall Adaptive Security (ASA) Appliance and Secure Firewall Threat Defense (FTD) Software VPN Web Server contain a buffer overflow vulnerability that allows for remote code execution. This vulnerability could be chained with CVE-2025-20362.",
|
|
179
|
+
"requiredAction": "The KEV due date refers to the deadline by which FCEB agencies are expected to review and begin implementing the guidance outlined in Emergency Directive (ED) 25-03 (URL listed below in Notes). Agencies must follow the mitigation steps provided by CISA (URL listed below in Notes) and vendor\u2019s instructions (URL listed below in Notes). Adhere to the applicable BOD 22-01 guidance for cloud services or discontinue use of the product if mitigations are not available.",
|
|
180
|
+
"dueDate": "2025-09-26",
|
|
181
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
182
|
+
"notes": "CISA Mitigation Instructions: https:\/\/www.cisa.gov\/news-events\/directives\/ed-25-03-identify-and-mitigate-potential-compromise-cisco-devices ; https:\/\/www.cisa.gov\/news-events\/directives\/supplemental-direction-ed-25-03-core-dump-and-hunt-instructions ; https:\/\/www.cisa.gov\/eviction-strategies-tool\/create-from-template ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/resources\/asa_ftd_continued_attacks ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/private\/resources\/asa_ftd_continued_attacks#Details ; https:\/\/sec.cloudapps.cisco.com\/security\/center\/content\/CiscoSecurityAdvisory\/cisco-sa-asaftd-webvpn-z5xP8EUB ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-20333",
|
|
183
|
+
"cwes": [
|
|
184
|
+
"CWE-120"
|
|
185
|
+
]
|
|
186
|
+
},
|
|
187
|
+
{
|
|
188
|
+
"cveID": "CVE-2025-10585",
|
|
189
|
+
"vendorProject": "Google",
|
|
190
|
+
"product": "Chromium V8",
|
|
191
|
+
"vulnerabilityName": "Google Chromium V8 Type Confusion Vulnerability",
|
|
192
|
+
"dateAdded": "2025-09-23",
|
|
193
|
+
"shortDescription": "Google Chromium contains a type confusion vulnerability in the V8 JavaScript and WebAssembly engine.",
|
|
194
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
195
|
+
"dueDate": "2025-10-14",
|
|
196
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
197
|
+
"notes": "https:\/\/chromereleases.googleblog.com\/2025\/09\/stable-channel-update-for-desktop_17.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-10585",
|
|
198
|
+
"cwes": [
|
|
199
|
+
"CWE-843"
|
|
200
|
+
]
|
|
201
|
+
},
|
|
7
202
|
{
|
|
8
203
|
"cveID": "CVE-2025-5086",
|
|
9
204
|
"vendorProject": "Dassault Syst\u00e8mes",
|
|
@@ -2444,7 +2639,7 @@
|
|
|
2444
2639
|
"requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
|
|
2445
2640
|
"dueDate": "2025-02-13",
|
|
2446
2641
|
"knownRansomwareCampaignUse": "Unknown",
|
|
2447
|
-
"notes": "https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
|
|
2642
|
+
"notes": "This vulnerability could affect an open-source component, third-party library, protocol, or proprietary implementation that could be used by different products. For more information, please see: https:\/\/github.com\/jquery\/jquery\/security\/advisories\/GHSA-jpcq-cgw6-v4j6 ; https:\/\/blog.jquery.com\/2020\/04\/10\/jquery-3-5-0-released\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-11023",
|
|
2448
2643
|
"cwes": [
|
|
2449
2644
|
"CWE-79"
|
|
2450
2645
|
]
|
|
@@ -25,11 +25,11 @@ CVE = "CVEs"
|
|
|
25
25
|
|
|
26
26
|
class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
27
27
|
"""
|
|
28
|
-
Nexpose Scan information
|
|
28
|
+
Nexpose Scan information with FedRAMP POAM export support
|
|
29
29
|
"""
|
|
30
30
|
|
|
31
31
|
def __init__(self, **kwargs): # pylint: disable=R0902
|
|
32
|
-
self.name = kwargs.get("name")
|
|
32
|
+
self.name: str = kwargs.get("name", "Nexpose")
|
|
33
33
|
self.vuln_title = VULNERABILITY_TITLE
|
|
34
34
|
self.vuln_id = VULNERABILITY_ID
|
|
35
35
|
self.cvss3_score = CVSS3_SCORE
|
|
@@ -46,13 +46,18 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
|
46
46
|
"Solution",
|
|
47
47
|
"CVEs",
|
|
48
48
|
]
|
|
49
|
-
self.mapping_file = kwargs.get("mappings_path")
|
|
50
|
-
self.disable_mapping = kwargs.get("disable_mapping")
|
|
49
|
+
self.mapping_file: Optional[str] = kwargs.get("mappings_path")
|
|
50
|
+
self.disable_mapping: Optional[bool] = kwargs.get("disable_mapping")
|
|
51
|
+
file_path: Optional[str] = kwargs.get("file_path")
|
|
51
52
|
self.validater = ImportValidater(
|
|
52
|
-
self.required_headers,
|
|
53
|
+
self.required_headers, file_path or "", self.mapping_file or "", self.disable_mapping or False
|
|
53
54
|
)
|
|
54
55
|
self.headers = self.validater.parsed_headers
|
|
55
56
|
self.mapping = self.validater.mapping
|
|
57
|
+
|
|
58
|
+
# Store file path for property generation
|
|
59
|
+
self.file_path = kwargs.get("file_path")
|
|
60
|
+
|
|
56
61
|
logger = create_logger()
|
|
57
62
|
super().__init__(
|
|
58
63
|
logger=logger,
|
|
@@ -127,6 +132,8 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
|
127
132
|
:return: IssueSeverity or None
|
|
128
133
|
:rtype: Optional[IssueSeverity]
|
|
129
134
|
"""
|
|
135
|
+
if not text_severity:
|
|
136
|
+
return None
|
|
130
137
|
if text_severity.lower() == "low":
|
|
131
138
|
return IssueSeverity.Low
|
|
132
139
|
if text_severity.lower() in ["medium", "moderate"]:
|
|
@@ -170,9 +177,30 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
|
170
177
|
|
|
171
178
|
return severity
|
|
172
179
|
|
|
173
|
-
def
|
|
180
|
+
def get_source_file_path(self) -> Optional[str]:
|
|
174
181
|
"""
|
|
175
|
-
|
|
182
|
+
Get source file path for POAM ID generation
|
|
183
|
+
|
|
184
|
+
Returns file_path if set, None otherwise.
|
|
185
|
+
This supports FedRAMP POAM export logic that generates POAM IDs
|
|
186
|
+
based on source file path properties (e.g., pdf, signatures, campaign, etc.)
|
|
187
|
+
|
|
188
|
+
Note: Properties must be created separately after Issue creation using
|
|
189
|
+
Property.create() or bulk operations, as IntegrationFinding doesn't
|
|
190
|
+
directly support properties.
|
|
191
|
+
|
|
192
|
+
:return: Source file path string or None
|
|
193
|
+
:rtype: Optional[str]
|
|
194
|
+
"""
|
|
195
|
+
if not self.file_path:
|
|
196
|
+
return None
|
|
197
|
+
return str(self.file_path)
|
|
198
|
+
|
|
199
|
+
def create_vuln(
|
|
200
|
+
self, dat: Optional[dict] = None, **kwargs
|
|
201
|
+
) -> Optional[IntegrationFinding]: # pylint: disable=unused-argument
|
|
202
|
+
"""
|
|
203
|
+
Create an IntegrationFinding from a row in the Nexpose csv file
|
|
176
204
|
|
|
177
205
|
:param Optional[dict] dat: Data row from CSV file, defaults to None
|
|
178
206
|
:param kwargs: Additional keyword arguments
|
|
@@ -189,8 +217,6 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
|
189
217
|
# Determine severity using priority logic
|
|
190
218
|
severity = self._determine_severity(dat)
|
|
191
219
|
|
|
192
|
-
# Find matching asset
|
|
193
|
-
|
|
194
220
|
# Extract date information
|
|
195
221
|
first_seen = (
|
|
196
222
|
self.mapping.get_value(dat, self.first_seen)
|
|
@@ -216,7 +242,7 @@ class Nexpose(FlatFileImporter): # pylint: disable=too-many-instance-attributes
|
|
|
216
242
|
cvss_score=cvss_score or 0.0,
|
|
217
243
|
cvss_v3_score=cvss3_score or 0.0,
|
|
218
244
|
cvss_v2_score=cvss_score or 0.0,
|
|
219
|
-
plugin_text=description[:255],
|
|
245
|
+
plugin_text=description[:255] if description else "",
|
|
220
246
|
remediation=self.mapping.get_value(dat, "Solution"),
|
|
221
247
|
category="Hardware",
|
|
222
248
|
status=IssueStatus.Open,
|