souleyez 2.43.26__py3-none-any.whl → 2.43.34__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (358) hide show
  1. souleyez/__init__.py +1 -2
  2. souleyez/ai/__init__.py +21 -15
  3. souleyez/ai/action_mapper.py +249 -150
  4. souleyez/ai/chain_advisor.py +116 -100
  5. souleyez/ai/claude_provider.py +29 -28
  6. souleyez/ai/context_builder.py +80 -62
  7. souleyez/ai/executor.py +158 -117
  8. souleyez/ai/feedback_handler.py +136 -121
  9. souleyez/ai/llm_factory.py +27 -20
  10. souleyez/ai/llm_provider.py +4 -2
  11. souleyez/ai/ollama_provider.py +6 -9
  12. souleyez/ai/ollama_service.py +44 -37
  13. souleyez/ai/path_scorer.py +91 -76
  14. souleyez/ai/recommender.py +176 -144
  15. souleyez/ai/report_context.py +74 -73
  16. souleyez/ai/report_service.py +84 -66
  17. souleyez/ai/result_parser.py +222 -229
  18. souleyez/ai/safety.py +67 -44
  19. souleyez/auth/__init__.py +23 -22
  20. souleyez/auth/audit.py +36 -26
  21. souleyez/auth/engagement_access.py +65 -48
  22. souleyez/auth/permissions.py +14 -3
  23. souleyez/auth/session_manager.py +54 -37
  24. souleyez/auth/user_manager.py +109 -64
  25. souleyez/commands/audit.py +40 -43
  26. souleyez/commands/auth.py +35 -15
  27. souleyez/commands/deliverables.py +55 -50
  28. souleyez/commands/engagement.py +47 -28
  29. souleyez/commands/license.py +32 -23
  30. souleyez/commands/screenshots.py +36 -32
  31. souleyez/commands/user.py +82 -36
  32. souleyez/config.py +52 -44
  33. souleyez/core/credential_tester.py +87 -81
  34. souleyez/core/cve_mappings.py +179 -192
  35. souleyez/core/cve_matcher.py +162 -148
  36. souleyez/core/msf_auto_mapper.py +100 -83
  37. souleyez/core/msf_chain_engine.py +294 -256
  38. souleyez/core/msf_database.py +153 -70
  39. souleyez/core/msf_integration.py +679 -673
  40. souleyez/core/msf_rpc_client.py +40 -42
  41. souleyez/core/msf_rpc_manager.py +77 -79
  42. souleyez/core/msf_sync_manager.py +241 -181
  43. souleyez/core/network_utils.py +22 -15
  44. souleyez/core/parser_handler.py +34 -25
  45. souleyez/core/pending_chains.py +114 -63
  46. souleyez/core/templates.py +158 -107
  47. souleyez/core/tool_chaining.py +9526 -2879
  48. souleyez/core/version_utils.py +79 -94
  49. souleyez/core/vuln_correlation.py +136 -89
  50. souleyez/core/web_utils.py +33 -32
  51. souleyez/data/wordlists/ad_users.txt +378 -0
  52. souleyez/data/wordlists/api_endpoints_large.txt +769 -0
  53. souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
  54. souleyez/data/wordlists/lfi_payloads.txt +82 -0
  55. souleyez/data/wordlists/passwords_brute.txt +1548 -0
  56. souleyez/data/wordlists/passwords_crack.txt +2479 -0
  57. souleyez/data/wordlists/passwords_spray.txt +386 -0
  58. souleyez/data/wordlists/subdomains_large.txt +5057 -0
  59. souleyez/data/wordlists/usernames_common.txt +694 -0
  60. souleyez/data/wordlists/web_dirs_large.txt +4769 -0
  61. souleyez/detection/__init__.py +1 -1
  62. souleyez/detection/attack_signatures.py +12 -17
  63. souleyez/detection/mitre_mappings.py +61 -55
  64. souleyez/detection/validator.py +97 -86
  65. souleyez/devtools.py +23 -10
  66. souleyez/docs/README.md +4 -4
  67. souleyez/docs/api-reference/cli-commands.md +2 -2
  68. souleyez/docs/developer-guide/adding-new-tools.md +562 -0
  69. souleyez/docs/user-guide/auto-chaining.md +30 -8
  70. souleyez/docs/user-guide/getting-started.md +1 -1
  71. souleyez/docs/user-guide/installation.md +26 -3
  72. souleyez/docs/user-guide/metasploit-integration.md +2 -2
  73. souleyez/docs/user-guide/rbac.md +1 -1
  74. souleyez/docs/user-guide/scope-management.md +1 -1
  75. souleyez/docs/user-guide/siem-integration.md +1 -1
  76. souleyez/docs/user-guide/tools-reference.md +1 -8
  77. souleyez/docs/user-guide/worker-management.md +1 -1
  78. souleyez/engine/background.py +1239 -535
  79. souleyez/engine/base.py +4 -1
  80. souleyez/engine/job_status.py +17 -49
  81. souleyez/engine/log_sanitizer.py +103 -77
  82. souleyez/engine/manager.py +38 -7
  83. souleyez/engine/result_handler.py +2200 -1550
  84. souleyez/engine/worker_manager.py +50 -41
  85. souleyez/export/evidence_bundle.py +72 -62
  86. souleyez/feature_flags/features.py +16 -20
  87. souleyez/feature_flags.py +5 -9
  88. souleyez/handlers/__init__.py +11 -0
  89. souleyez/handlers/base.py +188 -0
  90. souleyez/handlers/bash_handler.py +277 -0
  91. souleyez/handlers/bloodhound_handler.py +243 -0
  92. souleyez/handlers/certipy_handler.py +311 -0
  93. souleyez/handlers/crackmapexec_handler.py +486 -0
  94. souleyez/handlers/dnsrecon_handler.py +344 -0
  95. souleyez/handlers/enum4linux_handler.py +400 -0
  96. souleyez/handlers/evil_winrm_handler.py +493 -0
  97. souleyez/handlers/ffuf_handler.py +815 -0
  98. souleyez/handlers/gobuster_handler.py +1114 -0
  99. souleyez/handlers/gpp_extract_handler.py +334 -0
  100. souleyez/handlers/hashcat_handler.py +444 -0
  101. souleyez/handlers/hydra_handler.py +563 -0
  102. souleyez/handlers/impacket_getuserspns_handler.py +343 -0
  103. souleyez/handlers/impacket_psexec_handler.py +222 -0
  104. souleyez/handlers/impacket_secretsdump_handler.py +426 -0
  105. souleyez/handlers/john_handler.py +286 -0
  106. souleyez/handlers/katana_handler.py +425 -0
  107. souleyez/handlers/kerbrute_handler.py +298 -0
  108. souleyez/handlers/ldapsearch_handler.py +636 -0
  109. souleyez/handlers/lfi_extract_handler.py +464 -0
  110. souleyez/handlers/msf_auxiliary_handler.py +408 -0
  111. souleyez/handlers/msf_exploit_handler.py +380 -0
  112. souleyez/handlers/nikto_handler.py +413 -0
  113. souleyez/handlers/nmap_handler.py +821 -0
  114. souleyez/handlers/nuclei_handler.py +359 -0
  115. souleyez/handlers/nxc_handler.py +371 -0
  116. souleyez/handlers/rdp_sec_check_handler.py +353 -0
  117. souleyez/handlers/registry.py +292 -0
  118. souleyez/handlers/responder_handler.py +232 -0
  119. souleyez/handlers/service_explorer_handler.py +434 -0
  120. souleyez/handlers/smbclient_handler.py +344 -0
  121. souleyez/handlers/smbmap_handler.py +510 -0
  122. souleyez/handlers/smbpasswd_handler.py +296 -0
  123. souleyez/handlers/sqlmap_handler.py +1116 -0
  124. souleyez/handlers/theharvester_handler.py +601 -0
  125. souleyez/handlers/web_login_test_handler.py +327 -0
  126. souleyez/handlers/whois_handler.py +277 -0
  127. souleyez/handlers/wpscan_handler.py +554 -0
  128. souleyez/history.py +32 -16
  129. souleyez/importers/msf_importer.py +106 -75
  130. souleyez/importers/smart_importer.py +208 -147
  131. souleyez/integrations/siem/__init__.py +10 -10
  132. souleyez/integrations/siem/base.py +17 -18
  133. souleyez/integrations/siem/elastic.py +108 -122
  134. souleyez/integrations/siem/factory.py +207 -80
  135. souleyez/integrations/siem/googlesecops.py +146 -154
  136. souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
  137. souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
  138. souleyez/integrations/siem/sentinel.py +107 -109
  139. souleyez/integrations/siem/splunk.py +246 -212
  140. souleyez/integrations/siem/wazuh.py +65 -71
  141. souleyez/integrations/wazuh/__init__.py +5 -5
  142. souleyez/integrations/wazuh/client.py +70 -93
  143. souleyez/integrations/wazuh/config.py +85 -57
  144. souleyez/integrations/wazuh/host_mapper.py +28 -36
  145. souleyez/integrations/wazuh/sync.py +78 -68
  146. souleyez/intelligence/__init__.py +4 -5
  147. souleyez/intelligence/correlation_analyzer.py +309 -295
  148. souleyez/intelligence/exploit_knowledge.py +661 -623
  149. souleyez/intelligence/exploit_suggestions.py +159 -139
  150. souleyez/intelligence/gap_analyzer.py +132 -97
  151. souleyez/intelligence/gap_detector.py +251 -214
  152. souleyez/intelligence/sensitive_tables.py +266 -129
  153. souleyez/intelligence/service_parser.py +137 -123
  154. souleyez/intelligence/surface_analyzer.py +407 -268
  155. souleyez/intelligence/target_parser.py +159 -162
  156. souleyez/licensing/__init__.py +6 -6
  157. souleyez/licensing/validator.py +17 -19
  158. souleyez/log_config.py +79 -54
  159. souleyez/main.py +1505 -687
  160. souleyez/migrations/fix_job_counter.py +16 -14
  161. souleyez/parsers/bloodhound_parser.py +41 -39
  162. souleyez/parsers/crackmapexec_parser.py +178 -111
  163. souleyez/parsers/dalfox_parser.py +72 -77
  164. souleyez/parsers/dnsrecon_parser.py +103 -91
  165. souleyez/parsers/enum4linux_parser.py +183 -153
  166. souleyez/parsers/ffuf_parser.py +29 -25
  167. souleyez/parsers/gobuster_parser.py +301 -41
  168. souleyez/parsers/hashcat_parser.py +324 -79
  169. souleyez/parsers/http_fingerprint_parser.py +350 -103
  170. souleyez/parsers/hydra_parser.py +131 -111
  171. souleyez/parsers/impacket_parser.py +231 -178
  172. souleyez/parsers/john_parser.py +98 -86
  173. souleyez/parsers/katana_parser.py +316 -0
  174. souleyez/parsers/msf_parser.py +943 -498
  175. souleyez/parsers/nikto_parser.py +346 -65
  176. souleyez/parsers/nmap_parser.py +262 -174
  177. souleyez/parsers/nuclei_parser.py +40 -44
  178. souleyez/parsers/responder_parser.py +26 -26
  179. souleyez/parsers/searchsploit_parser.py +74 -74
  180. souleyez/parsers/service_explorer_parser.py +279 -0
  181. souleyez/parsers/smbmap_parser.py +180 -124
  182. souleyez/parsers/sqlmap_parser.py +434 -308
  183. souleyez/parsers/theharvester_parser.py +75 -57
  184. souleyez/parsers/whois_parser.py +135 -94
  185. souleyez/parsers/wpscan_parser.py +278 -190
  186. souleyez/plugins/afp.py +44 -36
  187. souleyez/plugins/afp_brute.py +114 -46
  188. souleyez/plugins/ard.py +48 -37
  189. souleyez/plugins/bloodhound.py +95 -61
  190. souleyez/plugins/certipy.py +303 -0
  191. souleyez/plugins/crackmapexec.py +186 -85
  192. souleyez/plugins/dalfox.py +120 -59
  193. souleyez/plugins/dns_hijack.py +146 -41
  194. souleyez/plugins/dnsrecon.py +97 -61
  195. souleyez/plugins/enum4linux.py +91 -66
  196. souleyez/plugins/evil_winrm.py +291 -0
  197. souleyez/plugins/ffuf.py +166 -90
  198. souleyez/plugins/firmware_extract.py +133 -29
  199. souleyez/plugins/gobuster.py +387 -190
  200. souleyez/plugins/gpp_extract.py +393 -0
  201. souleyez/plugins/hashcat.py +100 -73
  202. souleyez/plugins/http_fingerprint.py +854 -267
  203. souleyez/plugins/hydra.py +566 -200
  204. souleyez/plugins/impacket_getnpusers.py +117 -69
  205. souleyez/plugins/impacket_psexec.py +84 -64
  206. souleyez/plugins/impacket_secretsdump.py +103 -69
  207. souleyez/plugins/impacket_smbclient.py +89 -75
  208. souleyez/plugins/john.py +86 -69
  209. souleyez/plugins/katana.py +313 -0
  210. souleyez/plugins/kerbrute.py +237 -0
  211. souleyez/plugins/lfi_extract.py +541 -0
  212. souleyez/plugins/macos_ssh.py +117 -48
  213. souleyez/plugins/mdns.py +35 -30
  214. souleyez/plugins/msf_auxiliary.py +253 -130
  215. souleyez/plugins/msf_exploit.py +239 -161
  216. souleyez/plugins/nikto.py +134 -78
  217. souleyez/plugins/nmap.py +275 -91
  218. souleyez/plugins/nuclei.py +180 -89
  219. souleyez/plugins/nxc.py +285 -0
  220. souleyez/plugins/plugin_base.py +35 -36
  221. souleyez/plugins/plugin_template.py +13 -5
  222. souleyez/plugins/rdp_sec_check.py +130 -0
  223. souleyez/plugins/responder.py +112 -71
  224. souleyez/plugins/router_http_brute.py +76 -65
  225. souleyez/plugins/router_ssh_brute.py +118 -41
  226. souleyez/plugins/router_telnet_brute.py +124 -42
  227. souleyez/plugins/routersploit.py +91 -59
  228. souleyez/plugins/routersploit_exploit.py +77 -55
  229. souleyez/plugins/searchsploit.py +91 -77
  230. souleyez/plugins/service_explorer.py +1160 -0
  231. souleyez/plugins/smbmap.py +122 -72
  232. souleyez/plugins/smbpasswd.py +215 -0
  233. souleyez/plugins/sqlmap.py +301 -113
  234. souleyez/plugins/theharvester.py +127 -75
  235. souleyez/plugins/tr069.py +79 -57
  236. souleyez/plugins/upnp.py +65 -47
  237. souleyez/plugins/upnp_abuse.py +73 -55
  238. souleyez/plugins/vnc_access.py +129 -42
  239. souleyez/plugins/vnc_brute.py +109 -38
  240. souleyez/plugins/web_login_test.py +417 -0
  241. souleyez/plugins/whois.py +77 -58
  242. souleyez/plugins/wpscan.py +173 -69
  243. souleyez/reporting/__init__.py +2 -1
  244. souleyez/reporting/attack_chain.py +411 -346
  245. souleyez/reporting/charts.py +436 -501
  246. souleyez/reporting/compliance_mappings.py +334 -201
  247. souleyez/reporting/detection_report.py +126 -125
  248. souleyez/reporting/formatters.py +828 -591
  249. souleyez/reporting/generator.py +386 -302
  250. souleyez/reporting/metrics.py +72 -75
  251. souleyez/scanner.py +35 -29
  252. souleyez/security/__init__.py +37 -11
  253. souleyez/security/scope_validator.py +175 -106
  254. souleyez/security/validation.py +223 -149
  255. souleyez/security.py +22 -6
  256. souleyez/storage/credentials.py +247 -186
  257. souleyez/storage/crypto.py +296 -129
  258. souleyez/storage/database.py +73 -50
  259. souleyez/storage/db.py +58 -36
  260. souleyez/storage/deliverable_evidence.py +177 -128
  261. souleyez/storage/deliverable_exporter.py +282 -246
  262. souleyez/storage/deliverable_templates.py +134 -116
  263. souleyez/storage/deliverables.py +135 -130
  264. souleyez/storage/engagements.py +109 -56
  265. souleyez/storage/evidence.py +181 -152
  266. souleyez/storage/execution_log.py +31 -17
  267. souleyez/storage/exploit_attempts.py +93 -57
  268. souleyez/storage/exploits.py +67 -36
  269. souleyez/storage/findings.py +48 -61
  270. souleyez/storage/hosts.py +176 -144
  271. souleyez/storage/migrate_to_engagements.py +43 -19
  272. souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
  273. souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
  274. souleyez/storage/migrations/_003_add_execution_log.py +14 -8
  275. souleyez/storage/migrations/_005_screenshots.py +13 -5
  276. souleyez/storage/migrations/_006_deliverables.py +13 -5
  277. souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
  278. souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
  279. souleyez/storage/migrations/_010_evidence_linking.py +17 -10
  280. souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
  281. souleyez/storage/migrations/_012_team_collaboration.py +34 -21
  282. souleyez/storage/migrations/_013_add_host_tags.py +12 -6
  283. souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
  284. souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
  285. souleyez/storage/migrations/_016_add_domain_field.py +10 -4
  286. souleyez/storage/migrations/_017_msf_sessions.py +16 -8
  287. souleyez/storage/migrations/_018_add_osint_target.py +10 -6
  288. souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
  289. souleyez/storage/migrations/_020_add_rbac.py +36 -15
  290. souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
  291. souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
  292. souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
  293. souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
  294. souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
  295. souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
  296. souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
  297. souleyez/storage/migrations/__init__.py +26 -26
  298. souleyez/storage/migrations/migration_manager.py +19 -19
  299. souleyez/storage/msf_sessions.py +100 -65
  300. souleyez/storage/osint.py +17 -24
  301. souleyez/storage/recommendation_engine.py +269 -235
  302. souleyez/storage/screenshots.py +33 -32
  303. souleyez/storage/smb_shares.py +136 -92
  304. souleyez/storage/sqlmap_data.py +183 -128
  305. souleyez/storage/team_collaboration.py +135 -141
  306. souleyez/storage/timeline_tracker.py +122 -94
  307. souleyez/storage/wazuh_vulns.py +64 -66
  308. souleyez/storage/web_paths.py +33 -37
  309. souleyez/testing/credential_tester.py +221 -205
  310. souleyez/ui/__init__.py +1 -1
  311. souleyez/ui/ai_quotes.py +12 -12
  312. souleyez/ui/attack_surface.py +2439 -1516
  313. souleyez/ui/chain_rules_view.py +914 -382
  314. souleyez/ui/correlation_view.py +312 -230
  315. souleyez/ui/dashboard.py +2382 -1130
  316. souleyez/ui/deliverables_view.py +148 -62
  317. souleyez/ui/design_system.py +13 -13
  318. souleyez/ui/errors.py +49 -49
  319. souleyez/ui/evidence_linking_view.py +284 -179
  320. souleyez/ui/evidence_vault.py +393 -285
  321. souleyez/ui/exploit_suggestions_view.py +555 -349
  322. souleyez/ui/export_view.py +100 -66
  323. souleyez/ui/gap_analysis_view.py +315 -171
  324. souleyez/ui/help_system.py +105 -97
  325. souleyez/ui/intelligence_view.py +436 -293
  326. souleyez/ui/interactive.py +23434 -10286
  327. souleyez/ui/interactive_selector.py +75 -68
  328. souleyez/ui/log_formatter.py +47 -39
  329. souleyez/ui/menu_components.py +22 -13
  330. souleyez/ui/msf_auxiliary_menu.py +184 -133
  331. souleyez/ui/pending_chains_view.py +336 -172
  332. souleyez/ui/progress_indicators.py +5 -3
  333. souleyez/ui/recommendations_view.py +195 -137
  334. souleyez/ui/rule_builder.py +343 -225
  335. souleyez/ui/setup_wizard.py +678 -284
  336. souleyez/ui/shortcuts.py +217 -165
  337. souleyez/ui/splunk_gap_analysis_view.py +452 -270
  338. souleyez/ui/splunk_vulns_view.py +139 -86
  339. souleyez/ui/team_dashboard.py +498 -335
  340. souleyez/ui/template_selector.py +196 -105
  341. souleyez/ui/terminal.py +6 -6
  342. souleyez/ui/timeline_view.py +198 -127
  343. souleyez/ui/tool_setup.py +264 -164
  344. souleyez/ui/tutorial.py +202 -72
  345. souleyez/ui/tutorial_state.py +40 -40
  346. souleyez/ui/wazuh_vulns_view.py +235 -141
  347. souleyez/ui/wordlist_browser.py +260 -107
  348. souleyez/ui.py +464 -312
  349. souleyez/utils/tool_checker.py +427 -367
  350. souleyez/utils.py +33 -29
  351. souleyez/wordlists.py +134 -167
  352. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
  353. souleyez-2.43.34.dist-info/RECORD +443 -0
  354. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
  355. souleyez-2.43.26.dist-info/RECORD +0 -379
  356. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
  357. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
  358. {souleyez-2.43.26.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
@@ -23,13 +23,14 @@ logger = logging.getLogger(__name__)
23
23
  @dataclass
24
24
  class CVEMapping:
25
25
  """Maps a CVE to affected product versions and exploit tool."""
26
+
26
27
  cve_id: str
27
- product: str # Normalized product name (e.g., 'apache')
28
- affected_versions: str # Version spec (e.g., '>=2.4.49,<=2.4.50')
29
- tool: str # Tool to run (e.g., 'nuclei')
28
+ product: str # Normalized product name (e.g., 'apache')
29
+ affected_versions: str # Version spec (e.g., '>=2.4.49,<=2.4.50')
30
+ tool: str # Tool to run (e.g., 'nuclei')
30
31
  args: List[str] = field(default_factory=list) # Tool arguments
31
- severity: str = 'high' # critical, high, medium, low
32
- description: str = '' # Human-readable description
32
+ severity: str = "high" # critical, high, medium, low
33
+ description: str = "" # Human-readable description
33
34
  references: List[str] = field(default_factory=list) # URLs
34
35
 
35
36
  def matches_service(self, product: str, version: str) -> bool:
@@ -49,213 +50,199 @@ class CVEMapping:
49
50
  # These are well-known vulnerabilities with reliable detection
50
51
  CURATED_CVES: Dict[str, CVEMapping] = {
51
52
  # Apache HTTP Server
52
- 'CVE-2021-41773': CVEMapping(
53
- cve_id='CVE-2021-41773',
54
- product='apache',
55
- affected_versions='>=2.4.49,<=2.4.49',
56
- tool='nuclei',
57
- args=['-t', 'http/cves/2021/CVE-2021-41773.yaml'],
58
- severity='critical',
59
- description='Apache 2.4.49 path traversal and RCE',
60
- references=['https://nvd.nist.gov/vuln/detail/CVE-2021-41773'],
53
+ "CVE-2021-41773": CVEMapping(
54
+ cve_id="CVE-2021-41773",
55
+ product="apache",
56
+ affected_versions=">=2.4.49,<=2.4.49",
57
+ tool="nuclei",
58
+ args=["-t", "http/cves/2021/CVE-2021-41773.yaml"],
59
+ severity="critical",
60
+ description="Apache 2.4.49 path traversal and RCE",
61
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2021-41773"],
61
62
  ),
62
- 'CVE-2021-42013': CVEMapping(
63
- cve_id='CVE-2021-42013',
64
- product='apache',
65
- affected_versions='>=2.4.49,<=2.4.50',
66
- tool='nuclei',
67
- args=['-t', 'http/cves/2021/CVE-2021-42013.yaml'],
68
- severity='critical',
69
- description='Apache 2.4.49-2.4.50 path traversal bypass (incomplete fix for CVE-2021-41773)',
70
- references=['https://nvd.nist.gov/vuln/detail/CVE-2021-42013'],
63
+ "CVE-2021-42013": CVEMapping(
64
+ cve_id="CVE-2021-42013",
65
+ product="apache",
66
+ affected_versions=">=2.4.49,<=2.4.50",
67
+ tool="nuclei",
68
+ args=["-t", "http/cves/2021/CVE-2021-42013.yaml"],
69
+ severity="critical",
70
+ description="Apache 2.4.49-2.4.50 path traversal bypass (incomplete fix for CVE-2021-41773)",
71
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2021-42013"],
71
72
  ),
72
-
73
73
  # nginx
74
- 'CVE-2021-23017': CVEMapping(
75
- cve_id='CVE-2021-23017',
76
- product='nginx',
77
- affected_versions='>=0.6.18,<=1.20.0',
78
- tool='nuclei',
79
- args=['-t', 'http/cves/2021/CVE-2021-23017.yaml'],
80
- severity='high',
81
- description='nginx DNS resolver off-by-one heap write',
82
- references=['https://nvd.nist.gov/vuln/detail/CVE-2021-23017'],
74
+ "CVE-2021-23017": CVEMapping(
75
+ cve_id="CVE-2021-23017",
76
+ product="nginx",
77
+ affected_versions=">=0.6.18,<=1.20.0",
78
+ tool="nuclei",
79
+ args=["-t", "http/cves/2021/CVE-2021-23017.yaml"],
80
+ severity="high",
81
+ description="nginx DNS resolver off-by-one heap write",
82
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2021-23017"],
83
83
  ),
84
-
85
84
  # PHP
86
- 'CVE-2019-11043': CVEMapping(
87
- cve_id='CVE-2019-11043',
88
- product='php',
89
- affected_versions='>=7.1.0,<7.1.33',
90
- tool='nuclei',
91
- args=['-t', 'http/cves/2019/CVE-2019-11043.yaml'],
92
- severity='critical',
93
- description='PHP-FPM RCE via nginx misconfiguration',
94
- references=['https://nvd.nist.gov/vuln/detail/CVE-2019-11043'],
85
+ "CVE-2019-11043": CVEMapping(
86
+ cve_id="CVE-2019-11043",
87
+ product="php",
88
+ affected_versions=">=7.1.0,<7.1.33",
89
+ tool="nuclei",
90
+ args=["-t", "http/cves/2019/CVE-2019-11043.yaml"],
91
+ severity="critical",
92
+ description="PHP-FPM RCE via nginx misconfiguration",
93
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2019-11043"],
95
94
  ),
96
- 'CVE-2012-1823': CVEMapping(
97
- cve_id='CVE-2012-1823',
98
- product='php',
99
- affected_versions='>=5.3.0,<5.3.12',
100
- tool='nuclei',
101
- args=['-t', 'http/cves/2012/CVE-2012-1823.yaml'],
102
- severity='critical',
103
- description='PHP CGI argument injection RCE',
104
- references=['https://nvd.nist.gov/vuln/detail/CVE-2012-1823'],
95
+ "CVE-2012-1823": CVEMapping(
96
+ cve_id="CVE-2012-1823",
97
+ product="php",
98
+ affected_versions=">=5.3.0,<5.3.12",
99
+ tool="nuclei",
100
+ args=["-t", "http/cves/2012/CVE-2012-1823.yaml"],
101
+ severity="critical",
102
+ description="PHP CGI argument injection RCE",
103
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2012-1823"],
105
104
  ),
106
-
107
105
  # OpenSSH
108
- 'CVE-2018-15473': CVEMapping(
109
- cve_id='CVE-2018-15473',
110
- product='ssh',
111
- affected_versions='>=2.0,<7.7',
112
- tool='nmap',
113
- args=['--script', 'ssh-auth-methods', '-p', '22'],
114
- severity='medium',
115
- description='OpenSSH user enumeration',
116
- references=['https://nvd.nist.gov/vuln/detail/CVE-2018-15473'],
106
+ "CVE-2018-15473": CVEMapping(
107
+ cve_id="CVE-2018-15473",
108
+ product="ssh",
109
+ affected_versions=">=2.0,<7.7",
110
+ tool="nmap",
111
+ args=["--script", "ssh-auth-methods", "-p", "22"],
112
+ severity="medium",
113
+ description="OpenSSH user enumeration",
114
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2018-15473"],
117
115
  ),
118
-
119
116
  # vsftpd
120
- 'CVE-2011-2523': CVEMapping(
121
- cve_id='CVE-2011-2523',
122
- product='vsftpd',
123
- affected_versions='=2.3.4',
124
- tool='nmap',
125
- args=['--script', 'ftp-vsftpd-backdoor', '-p', '21'],
126
- severity='critical',
127
- description='vsftpd 2.3.4 backdoor (smiley face)',
128
- references=['https://nvd.nist.gov/vuln/detail/CVE-2011-2523'],
117
+ "CVE-2011-2523": CVEMapping(
118
+ cve_id="CVE-2011-2523",
119
+ product="vsftpd",
120
+ affected_versions="=2.3.4",
121
+ tool="nmap",
122
+ args=["--script", "ftp-vsftpd-backdoor", "-p", "21"],
123
+ severity="critical",
124
+ description="vsftpd 2.3.4 backdoor (smiley face)",
125
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2011-2523"],
129
126
  ),
130
-
131
127
  # ProFTPD
132
- 'CVE-2015-3306': CVEMapping(
133
- cve_id='CVE-2015-3306',
134
- product='proftpd',
135
- affected_versions='>=1.3.5,<1.3.5a',
136
- tool='nmap',
137
- args=['--script', 'ftp-proftpd-backdoor', '-p', '21'],
138
- severity='critical',
139
- description='ProFTPD mod_copy arbitrary file read/write',
140
- references=['https://nvd.nist.gov/vuln/detail/CVE-2015-3306'],
128
+ "CVE-2015-3306": CVEMapping(
129
+ cve_id="CVE-2015-3306",
130
+ product="proftpd",
131
+ affected_versions=">=1.3.5,<1.3.5a",
132
+ tool="nmap",
133
+ args=["--script", "ftp-proftpd-backdoor", "-p", "21"],
134
+ severity="critical",
135
+ description="ProFTPD mod_copy arbitrary file read/write",
136
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2015-3306"],
141
137
  ),
142
-
143
138
  # Samba
144
- 'CVE-2017-7494': CVEMapping(
145
- cve_id='CVE-2017-7494',
146
- product='samba',
147
- affected_versions='>=3.5.0,<4.6.4',
148
- tool='nmap',
149
- args=['--script', 'smb-vuln-cve-2017-7494', '-p', '445'],
150
- severity='critical',
151
- description='Samba RCE via writable share (SambaCry)',
152
- references=['https://nvd.nist.gov/vuln/detail/CVE-2017-7494'],
139
+ "CVE-2017-7494": CVEMapping(
140
+ cve_id="CVE-2017-7494",
141
+ product="samba",
142
+ affected_versions=">=3.5.0,<4.6.4",
143
+ tool="nmap",
144
+ args=["--script", "smb-vuln-cve-2017-7494", "-p", "445"],
145
+ severity="critical",
146
+ description="Samba RCE via writable share (SambaCry)",
147
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2017-7494"],
153
148
  ),
154
-
155
149
  # Apache Tomcat
156
- 'CVE-2020-1938': CVEMapping(
157
- cve_id='CVE-2020-1938',
158
- product='tomcat',
159
- affected_versions='>=6.0.0,<9.0.31',
160
- tool='nmap',
161
- args=['--script', 'ajp-brute,ajp-headers,ajp-methods', '-p', '8009'],
162
- severity='critical',
163
- description='Apache Tomcat AJP Ghostcat file read/include',
164
- references=['https://nvd.nist.gov/vuln/detail/CVE-2020-1938'],
150
+ "CVE-2020-1938": CVEMapping(
151
+ cve_id="CVE-2020-1938",
152
+ product="tomcat",
153
+ affected_versions=">=6.0.0,<9.0.31",
154
+ tool="nmap",
155
+ args=["--script", "ajp-brute,ajp-headers,ajp-methods", "-p", "8009"],
156
+ severity="critical",
157
+ description="Apache Tomcat AJP Ghostcat file read/include",
158
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2020-1938"],
165
159
  ),
166
-
167
160
  # WordPress
168
- 'CVE-2022-21661': CVEMapping(
169
- cve_id='CVE-2022-21661',
170
- product='wordpress',
171
- affected_versions='>=5.8.0,<5.8.3',
172
- tool='wpscan',
173
- args=['--enumerate', 'vp,vt,u'],
174
- severity='high',
175
- description='WordPress SQL injection via WP_Query',
176
- references=['https://nvd.nist.gov/vuln/detail/CVE-2022-21661'],
161
+ "CVE-2022-21661": CVEMapping(
162
+ cve_id="CVE-2022-21661",
163
+ product="wordpress",
164
+ affected_versions=">=5.8.0,<5.8.3",
165
+ tool="wpscan",
166
+ args=["--enumerate", "vp,vt,u"],
167
+ severity="high",
168
+ description="WordPress SQL injection via WP_Query",
169
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2022-21661"],
177
170
  ),
178
-
179
171
  # Drupal
180
- 'CVE-2018-7600': CVEMapping(
181
- cve_id='CVE-2018-7600',
182
- product='drupal',
183
- affected_versions='>=7.0,<7.58',
184
- tool='nuclei',
185
- args=['-t', 'http/cves/2018/CVE-2018-7600.yaml'],
186
- severity='critical',
187
- description='Drupal RCE (Drupalgeddon2)',
188
- references=['https://nvd.nist.gov/vuln/detail/CVE-2018-7600'],
172
+ "CVE-2018-7600": CVEMapping(
173
+ cve_id="CVE-2018-7600",
174
+ product="drupal",
175
+ affected_versions=">=7.0,<7.58",
176
+ tool="nuclei",
177
+ args=["-t", "http/cves/2018/CVE-2018-7600.yaml"],
178
+ severity="critical",
179
+ description="Drupal RCE (Drupalgeddon2)",
180
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2018-7600"],
189
181
  ),
190
- 'CVE-2018-7602': CVEMapping(
191
- cve_id='CVE-2018-7602',
192
- product='drupal',
193
- affected_versions='>=7.0,<7.59',
194
- tool='nuclei',
195
- args=['-t', 'http/cves/2018/CVE-2018-7602.yaml'],
196
- severity='critical',
197
- description='Drupal RCE (Drupalgeddon3)',
198
- references=['https://nvd.nist.gov/vuln/detail/CVE-2018-7602'],
182
+ "CVE-2018-7602": CVEMapping(
183
+ cve_id="CVE-2018-7602",
184
+ product="drupal",
185
+ affected_versions=">=7.0,<7.59",
186
+ tool="nuclei",
187
+ args=["-t", "http/cves/2018/CVE-2018-7602.yaml"],
188
+ severity="critical",
189
+ description="Drupal RCE (Drupalgeddon3)",
190
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2018-7602"],
199
191
  ),
200
-
201
192
  # Microsoft IIS
202
- 'CVE-2017-7269': CVEMapping(
203
- cve_id='CVE-2017-7269',
204
- product='iis',
205
- affected_versions='>=6.0,<=6.0',
206
- tool='nmap',
207
- args=['--script', 'http-vuln-cve2017-7269', '-p', '80'],
208
- severity='critical',
209
- description='IIS 6.0 WebDAV buffer overflow RCE',
210
- references=['https://nvd.nist.gov/vuln/detail/CVE-2017-7269'],
193
+ "CVE-2017-7269": CVEMapping(
194
+ cve_id="CVE-2017-7269",
195
+ product="iis",
196
+ affected_versions=">=6.0,<=6.0",
197
+ tool="nmap",
198
+ args=["--script", "http-vuln-cve2017-7269", "-p", "80"],
199
+ severity="critical",
200
+ description="IIS 6.0 WebDAV buffer overflow RCE",
201
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2017-7269"],
211
202
  ),
212
-
213
203
  # Redis
214
- 'CVE-2022-0543': CVEMapping(
215
- cve_id='CVE-2022-0543',
216
- product='redis',
217
- affected_versions='>=2.2,<6.2.7',
218
- tool='nuclei',
219
- args=['-t', 'network/cves/2022/CVE-2022-0543.yaml'],
220
- severity='critical',
221
- description='Redis Lua sandbox escape RCE (Debian/Ubuntu)',
222
- references=['https://nvd.nist.gov/vuln/detail/CVE-2022-0543'],
204
+ "CVE-2022-0543": CVEMapping(
205
+ cve_id="CVE-2022-0543",
206
+ product="redis",
207
+ affected_versions=">=2.2,<6.2.7",
208
+ tool="nuclei",
209
+ args=["-t", "network/cves/2022/CVE-2022-0543.yaml"],
210
+ severity="critical",
211
+ description="Redis Lua sandbox escape RCE (Debian/Ubuntu)",
212
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2022-0543"],
223
213
  ),
224
-
225
214
  # Elasticsearch
226
- 'CVE-2015-1427': CVEMapping(
227
- cve_id='CVE-2015-1427',
228
- product='elasticsearch',
229
- affected_versions='>=1.3.0,<1.4.3',
230
- tool='nuclei',
231
- args=['-t', 'http/cves/2015/CVE-2015-1427.yaml'],
232
- severity='critical',
233
- description='Elasticsearch Groovy sandbox bypass RCE',
234
- references=['https://nvd.nist.gov/vuln/detail/CVE-2015-1427'],
215
+ "CVE-2015-1427": CVEMapping(
216
+ cve_id="CVE-2015-1427",
217
+ product="elasticsearch",
218
+ affected_versions=">=1.3.0,<1.4.3",
219
+ tool="nuclei",
220
+ args=["-t", "http/cves/2015/CVE-2015-1427.yaml"],
221
+ severity="critical",
222
+ description="Elasticsearch Groovy sandbox bypass RCE",
223
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2015-1427"],
235
224
  ),
236
-
237
225
  # Apache Struts
238
- 'CVE-2017-5638': CVEMapping(
239
- cve_id='CVE-2017-5638',
240
- product='struts',
241
- affected_versions='>=2.3.5,<2.3.32',
242
- tool='nuclei',
243
- args=['-t', 'http/cves/2017/CVE-2017-5638.yaml'],
244
- severity='critical',
245
- description='Apache Struts2 RCE via Content-Type header',
246
- references=['https://nvd.nist.gov/vuln/detail/CVE-2017-5638'],
226
+ "CVE-2017-5638": CVEMapping(
227
+ cve_id="CVE-2017-5638",
228
+ product="struts",
229
+ affected_versions=">=2.3.5,<2.3.32",
230
+ tool="nuclei",
231
+ args=["-t", "http/cves/2017/CVE-2017-5638.yaml"],
232
+ severity="critical",
233
+ description="Apache Struts2 RCE via Content-Type header",
234
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2017-5638"],
247
235
  ),
248
-
249
236
  # Log4j
250
- 'CVE-2021-44228': CVEMapping(
251
- cve_id='CVE-2021-44228',
252
- product='log4j',
253
- affected_versions='>=2.0,<2.15.0',
254
- tool='nuclei',
255
- args=['-t', 'http/cves/2021/CVE-2021-44228.yaml'],
256
- severity='critical',
257
- description='Log4j RCE (Log4Shell)',
258
- references=['https://nvd.nist.gov/vuln/detail/CVE-2021-44228'],
237
+ "CVE-2021-44228": CVEMapping(
238
+ cve_id="CVE-2021-44228",
239
+ product="log4j",
240
+ affected_versions=">=2.0,<2.15.0",
241
+ tool="nuclei",
242
+ args=["-t", "http/cves/2021/CVE-2021-44228.yaml"],
243
+ severity="critical",
244
+ description="Log4j RCE (Log4Shell)",
245
+ references=["https://nvd.nist.gov/vuln/detail/CVE-2021-44228"],
259
246
  ),
260
247
  }
261
248
 
@@ -277,7 +264,7 @@ def get_cves_for_service(product: str, version: str) -> List[CVEMapping]:
277
264
  applicable.append(cve)
278
265
 
279
266
  # Sort by severity (critical > high > medium > low)
280
- severity_order = {'critical': 0, 'high': 1, 'medium': 2, 'low': 3}
267
+ severity_order = {"critical": 0, "high": 1, "medium": 2, "low": 3}
281
268
  applicable.sort(key=lambda c: severity_order.get(c.severity, 4))
282
269
 
283
270
  return applicable
@@ -300,12 +287,12 @@ def load_cve_database(path: Optional[str] = None) -> Dict[str, CVEMapping]:
300
287
  """
301
288
  if path is None:
302
289
  # Check user config directory first
303
- user_path = Path.home() / '.souleyez' / 'cve_database.json'
290
+ user_path = Path.home() / ".souleyez" / "cve_database.json"
304
291
  if user_path.exists():
305
292
  path = str(user_path)
306
293
  else:
307
294
  # Fall back to package data
308
- pkg_path = Path(__file__).parent.parent / 'data' / 'cve_database.json'
295
+ pkg_path = Path(__file__).parent.parent / "data" / "cve_database.json"
309
296
  if pkg_path.exists():
310
297
  path = str(pkg_path)
311
298
  else:
@@ -313,20 +300,20 @@ def load_cve_database(path: Optional[str] = None) -> Dict[str, CVEMapping]:
313
300
  return CURATED_CVES
314
301
 
315
302
  try:
316
- with open(path, 'r') as f:
303
+ with open(path, "r") as f:
317
304
  data = json.load(f)
318
305
 
319
306
  cves = {}
320
307
  for cve_id, entry in data.items():
321
308
  cves[cve_id] = CVEMapping(
322
309
  cve_id=cve_id,
323
- product=entry.get('product', ''),
324
- affected_versions=entry.get('affected', ''),
325
- tool=entry.get('tool', 'nuclei'),
326
- args=entry.get('args', []),
327
- severity=entry.get('severity', 'high'),
328
- description=entry.get('description', ''),
329
- references=entry.get('references', []),
310
+ product=entry.get("product", ""),
311
+ affected_versions=entry.get("affected", ""),
312
+ tool=entry.get("tool", "nuclei"),
313
+ args=entry.get("args", []),
314
+ severity=entry.get("severity", "high"),
315
+ description=entry.get("description", ""),
316
+ references=entry.get("references", []),
330
317
  )
331
318
 
332
319
  logger.info(f"Loaded {len(cves)} CVEs from {path}")