regscale-cli 6.27.1.0__py3-none-any.whl → 6.27.3.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of regscale-cli might be problematic. Click here for more details.
- regscale/_version.py +1 -1
- regscale/core/app/application.py +1 -0
- regscale/core/app/internal/control_editor.py +73 -21
- regscale/core/app/internal/login.py +4 -1
- regscale/core/app/internal/model_editor.py +219 -64
- regscale/core/app/utils/app_utils.py +41 -7
- regscale/core/login.py +21 -4
- regscale/core/utils/date.py +77 -1
- regscale/integrations/commercial/aws/scanner.py +7 -3
- regscale/integrations/commercial/microsoft_defender/defender_api.py +1 -1
- regscale/integrations/commercial/sicura/api.py +65 -29
- regscale/integrations/commercial/sicura/scanner.py +36 -7
- regscale/integrations/commercial/synqly/query_builder.py +4 -1
- regscale/integrations/commercial/tenablev2/commands.py +4 -4
- regscale/integrations/commercial/tenablev2/scanner.py +1 -2
- regscale/integrations/commercial/wizv2/scanner.py +40 -16
- regscale/integrations/control_matcher.py +78 -23
- regscale/integrations/public/cci_importer.py +400 -9
- regscale/integrations/public/csam/csam.py +572 -763
- regscale/integrations/public/csam/csam_agency_defined.py +179 -0
- regscale/integrations/public/csam/csam_common.py +154 -0
- regscale/integrations/public/csam/csam_controls.py +432 -0
- regscale/integrations/public/csam/csam_poam.py +124 -0
- regscale/integrations/public/fedramp/click.py +17 -4
- regscale/integrations/public/fedramp/fedramp_cis_crm.py +271 -62
- regscale/integrations/public/fedramp/poam/scanner.py +74 -7
- regscale/integrations/scanner_integration.py +16 -1
- regscale/models/integration_models/aqua.py +2 -2
- regscale/models/integration_models/cisa_kev_data.json +121 -18
- regscale/models/integration_models/flat_file_importer/__init__.py +4 -6
- regscale/models/integration_models/synqly_models/capabilities.json +1 -1
- regscale/models/integration_models/synqly_models/connectors/vulnerabilities.py +35 -2
- regscale/models/integration_models/synqly_models/ocsf_mapper.py +41 -12
- regscale/models/platform.py +3 -0
- regscale/models/regscale_models/__init__.py +5 -0
- regscale/models/regscale_models/component.py +1 -1
- regscale/models/regscale_models/control_implementation.py +55 -24
- regscale/models/regscale_models/organization.py +3 -0
- regscale/models/regscale_models/regscale_model.py +17 -5
- regscale/models/regscale_models/security_plan.py +1 -0
- regscale/regscale.py +11 -1
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/METADATA +1 -1
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/RECORD +53 -49
- tests/regscale/core/test_login.py +171 -4
- tests/regscale/integrations/commercial/test_sicura.py +0 -1
- tests/regscale/integrations/commercial/wizv2/test_wizv2.py +86 -0
- tests/regscale/integrations/public/test_cci.py +596 -1
- tests/regscale/integrations/test_control_matcher.py +24 -0
- tests/regscale/models/test_control_implementation.py +118 -3
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/LICENSE +0 -0
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/WHEEL +0 -0
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/entry_points.txt +0 -0
- {regscale_cli-6.27.1.0.dist-info → regscale_cli-6.27.3.0.dist-info}/top_level.txt +0 -0
|
@@ -210,13 +210,13 @@ class Aqua(FlatFileImporter):
|
|
|
210
210
|
self.logger.error(f"Error creating finding: {e}")
|
|
211
211
|
return None
|
|
212
212
|
|
|
213
|
-
def determine_cvss_severity(self, dat: dict) ->
|
|
213
|
+
def determine_cvss_severity(self, dat: dict) -> IssueSeverity:
|
|
214
214
|
"""
|
|
215
215
|
Determine the CVSS severity of the vulnerability
|
|
216
216
|
|
|
217
217
|
:param dict dat: Data row from CSV file
|
|
218
218
|
:return: A severity derived from the CVSS scores
|
|
219
|
-
:rtype:
|
|
219
|
+
:rtype: IssueSeverity
|
|
220
220
|
"""
|
|
221
221
|
precedence_order = [
|
|
222
222
|
self.nvd_cvss_v3_severity,
|
|
@@ -1,9 +1,127 @@
|
|
|
1
1
|
{
|
|
2
2
|
"title": "CISA Catalog of Known Exploited Vulnerabilities",
|
|
3
|
-
"catalogVersion": "2025.10.
|
|
4
|
-
"dateReleased": "2025-10-
|
|
5
|
-
"count":
|
|
3
|
+
"catalogVersion": "2025.10.24",
|
|
4
|
+
"dateReleased": "2025-10-24T16:55:58.321Z",
|
|
5
|
+
"count": 1449,
|
|
6
6
|
"vulnerabilities": [
|
|
7
|
+
{
|
|
8
|
+
"cveID": "CVE-2025-54236",
|
|
9
|
+
"vendorProject": "Adobe",
|
|
10
|
+
"product": "Commerce and\u202fMagento",
|
|
11
|
+
"vulnerabilityName": "Adobe Commerce and\u202fMagento Improper Input Validation Vulnerability",
|
|
12
|
+
"dateAdded": "2025-10-24",
|
|
13
|
+
"shortDescription": "Adobe Commerce and Magento Open Source contain an improper input validation vulnerability that could allow an attacker to take over customer accounts through the Commerce REST API.",
|
|
14
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
15
|
+
"dueDate": "2025-11-14",
|
|
16
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
17
|
+
"notes": "https:\/\/experienceleague.adobe.com\/en\/docs\/experience-cloud-kcs\/kbarticles\/ka-27397 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-54236",
|
|
18
|
+
"cwes": [
|
|
19
|
+
"CWE-20"
|
|
20
|
+
]
|
|
21
|
+
},
|
|
22
|
+
{
|
|
23
|
+
"cveID": "CVE-2025-59287",
|
|
24
|
+
"vendorProject": "Microsoft",
|
|
25
|
+
"product": "Windows",
|
|
26
|
+
"vulnerabilityName": "Microsoft Windows Server Update Service (WSUS) Deserialization of Untrusted Data Vulnerability",
|
|
27
|
+
"dateAdded": "2025-10-24",
|
|
28
|
+
"shortDescription": "Microsoft Windows Server Update Service (WSUS) contains a deserialization of untrusted data vulnerability that allows for remote code execution.",
|
|
29
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
30
|
+
"dueDate": "2025-11-14",
|
|
31
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
32
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/vulnerability\/CVE-2025-59287 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-59287",
|
|
33
|
+
"cwes": [
|
|
34
|
+
"CWE-502"
|
|
35
|
+
]
|
|
36
|
+
},
|
|
37
|
+
{
|
|
38
|
+
"cveID": "CVE-2025-61932",
|
|
39
|
+
"vendorProject": "Motex",
|
|
40
|
+
"product": "LANSCOPE Endpoint Manager",
|
|
41
|
+
"vulnerabilityName": "Motex LANSCOPE Endpoint Manager Improper Verification of Source of a Communication Channel Vulnerability",
|
|
42
|
+
"dateAdded": "2025-10-22",
|
|
43
|
+
"shortDescription": "Motex LANSCOPE Endpoint Manager contains an improper verification of source of a communication channel vulnerability allowing an attacker to execute arbitrary code by sending specially crafted packets.",
|
|
44
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
45
|
+
"dueDate": "2025-11-12",
|
|
46
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
47
|
+
"notes": "https:\/\/www.motex.co.jp\/news\/notice\/2025\/release251020\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61932",
|
|
48
|
+
"cwes": [
|
|
49
|
+
"CWE-940"
|
|
50
|
+
]
|
|
51
|
+
},
|
|
52
|
+
{
|
|
53
|
+
"cveID": "CVE-2022-48503",
|
|
54
|
+
"vendorProject": "Apple",
|
|
55
|
+
"product": "Multiple Products",
|
|
56
|
+
"vulnerabilityName": "Apple Multiple Products Unspecified Vulnerability",
|
|
57
|
+
"dateAdded": "2025-10-20",
|
|
58
|
+
"shortDescription": "Apple macOS, iOS, tvOS, Safari, and watchOS contain an unspecified vulnerability in JavaScriptCore that when processing web content may lead to arbitrary code execution. The impacted product could be end-of-life (EoL) and\/or end-of-service (EoS). Users should discontinue product utilization.",
|
|
59
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
60
|
+
"dueDate": "2025-11-10",
|
|
61
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
62
|
+
"notes": "https:\/\/support.apple.com\/en-us\/HT213340 ; https:\/\/support.apple.com\/en-us\/HT213341 ; https:\/\/support.apple.com\/en-us\/HT213342 ; https:\/\/support.apple.com\/en-us\/HT213345 ; https:\/\/support.apple.com\/en-us\/HT213346 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2022-48503",
|
|
63
|
+
"cwes": []
|
|
64
|
+
},
|
|
65
|
+
{
|
|
66
|
+
"cveID": "CVE-2025-2746",
|
|
67
|
+
"vendorProject": "Kentico",
|
|
68
|
+
"product": "Xperience CMS",
|
|
69
|
+
"vulnerabilityName": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability",
|
|
70
|
+
"dateAdded": "2025-10-20",
|
|
71
|
+
"shortDescription": "Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.",
|
|
72
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
73
|
+
"dueDate": "2025-11-10",
|
|
74
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
75
|
+
"notes": "https:\/\/devnet.kentico.com\/download\/hotfixes ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-2746",
|
|
76
|
+
"cwes": [
|
|
77
|
+
"CWE-288"
|
|
78
|
+
]
|
|
79
|
+
},
|
|
80
|
+
{
|
|
81
|
+
"cveID": "CVE-2025-2747",
|
|
82
|
+
"vendorProject": "Kentico",
|
|
83
|
+
"product": "Xperience CMS",
|
|
84
|
+
"vulnerabilityName": "Kentico Xperience CMS Authentication Bypass Using an Alternate Path or Channel Vulnerability",
|
|
85
|
+
"dateAdded": "2025-10-20",
|
|
86
|
+
"shortDescription": "Kentico Xperience CMS contains an authentication bypass using an alternate path or channel vulnerability that could allow an attacker to control administrative objects.",
|
|
87
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
88
|
+
"dueDate": "2025-11-10",
|
|
89
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
90
|
+
"notes": "https:\/\/devnet.kentico.com\/download\/hotfixes ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-2747",
|
|
91
|
+
"cwes": [
|
|
92
|
+
"CWE-288"
|
|
93
|
+
]
|
|
94
|
+
},
|
|
95
|
+
{
|
|
96
|
+
"cveID": "CVE-2025-33073",
|
|
97
|
+
"vendorProject": "Microsoft",
|
|
98
|
+
"product": "Windows",
|
|
99
|
+
"vulnerabilityName": "Microsoft Windows SMB Client Improper Access Control Vulnerability",
|
|
100
|
+
"dateAdded": "2025-10-20",
|
|
101
|
+
"shortDescription": "Microsoft Windows SMB Client contains an improper access control vulnerability that could allow for privilege escalation. An attacker could execute a specially crafted malicious script to coerce the victim machine to connect back to the attack system using SMB and authenticate.",
|
|
102
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
103
|
+
"dueDate": "2025-11-10",
|
|
104
|
+
"knownRansomwareCampaignUse": "Unknown",
|
|
105
|
+
"notes": "https:\/\/msrc.microsoft.com\/update-guide\/en-US\/advisory\/CVE-2025-33073 ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-33073",
|
|
106
|
+
"cwes": [
|
|
107
|
+
"CWE-284"
|
|
108
|
+
]
|
|
109
|
+
},
|
|
110
|
+
{
|
|
111
|
+
"cveID": "CVE-2025-61884",
|
|
112
|
+
"vendorProject": "Oracle",
|
|
113
|
+
"product": "E-Business Suite",
|
|
114
|
+
"vulnerabilityName": "Oracle E-Business Suite Server-Side Request Forgery (SSRF) Vulnerability",
|
|
115
|
+
"dateAdded": "2025-10-20",
|
|
116
|
+
"shortDescription": "Oracle E-Business Suite contains a server-side request forgery (SSRF) vulnerability in the Runtime component of Oracle Configurator. This vulnerability is remotely exploitable without authentication.",
|
|
117
|
+
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
118
|
+
"dueDate": "2025-11-10",
|
|
119
|
+
"knownRansomwareCampaignUse": "Known",
|
|
120
|
+
"notes": "https:\/\/www.oracle.com\/security-alerts\/alert-cve-2025-61884.html ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-61884",
|
|
121
|
+
"cwes": [
|
|
122
|
+
"CWE-918"
|
|
123
|
+
]
|
|
124
|
+
},
|
|
7
125
|
{
|
|
8
126
|
"cveID": "CVE-2025-54253",
|
|
9
127
|
"vendorProject": "Adobe",
|
|
@@ -62,21 +180,6 @@
|
|
|
62
180
|
"CWE-284"
|
|
63
181
|
]
|
|
64
182
|
},
|
|
65
|
-
{
|
|
66
|
-
"cveID": "CVE-2025-6264",
|
|
67
|
-
"vendorProject": "Rapid7",
|
|
68
|
-
"product": "Velociraptor",
|
|
69
|
-
"vulnerabilityName": "Rapid7 Velociraptor Incorrect Default Permissions Vulnerability",
|
|
70
|
-
"dateAdded": "2025-10-14",
|
|
71
|
-
"shortDescription": "Rapid7 Velociraptor contains an incorrect default permissions vulnerability that can lead to arbitrary command execution and endpoint takeover. To successfully exploit this vulnerability the user must already have access to collect artifacts from the endpoint.",
|
|
72
|
-
"requiredAction": "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.",
|
|
73
|
-
"dueDate": "2025-11-04",
|
|
74
|
-
"knownRansomwareCampaignUse": "Known",
|
|
75
|
-
"notes": "https:\/\/docs.velociraptor.app\/announcements\/advisories\/cve-2025-6264\/ ; https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2025-6264",
|
|
76
|
-
"cwes": [
|
|
77
|
-
"CWE-276"
|
|
78
|
-
]
|
|
79
|
-
},
|
|
80
183
|
{
|
|
81
184
|
"cveID": "CVE-2016-7836",
|
|
82
185
|
"vendorProject": "SKYSEA",
|
|
@@ -930,13 +930,13 @@ class FlatFileImporter(ABC):
|
|
|
930
930
|
return dict_content
|
|
931
931
|
|
|
932
932
|
@staticmethod
|
|
933
|
-
def determine_severity(s: str) ->
|
|
933
|
+
def determine_severity(s: Optional[str] = None) -> IssueSeverity:
|
|
934
934
|
"""
|
|
935
935
|
Determine the CVSS severity of the vulnerability
|
|
936
936
|
|
|
937
|
-
:param str s: The severity
|
|
937
|
+
:param Optional[str] s: The severity, defaults to None
|
|
938
938
|
:return: The severity
|
|
939
|
-
:rtype:
|
|
939
|
+
:rtype: IssueSeverity
|
|
940
940
|
"""
|
|
941
941
|
mapping = {
|
|
942
942
|
"critical": IssueSeverity.Critical,
|
|
@@ -949,9 +949,7 @@ class FlatFileImporter(ABC):
|
|
|
949
949
|
"info": IssueSeverity.NotAssigned,
|
|
950
950
|
"unknown": IssueSeverity.NotAssigned,
|
|
951
951
|
}
|
|
952
|
-
severity = "info"
|
|
953
|
-
if s:
|
|
954
|
-
severity = s.lower()
|
|
952
|
+
severity = s.lower() if s else "info"
|
|
955
953
|
return mapping.get(severity, IssueSeverity.NotAssigned)
|
|
956
954
|
|
|
957
955
|
@staticmethod
|