souleyez 2.43.29__py3-none-any.whl → 2.43.34__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- souleyez/__init__.py +1 -2
- souleyez/ai/__init__.py +21 -15
- souleyez/ai/action_mapper.py +249 -150
- souleyez/ai/chain_advisor.py +116 -100
- souleyez/ai/claude_provider.py +29 -28
- souleyez/ai/context_builder.py +80 -62
- souleyez/ai/executor.py +158 -117
- souleyez/ai/feedback_handler.py +136 -121
- souleyez/ai/llm_factory.py +27 -20
- souleyez/ai/llm_provider.py +4 -2
- souleyez/ai/ollama_provider.py +6 -9
- souleyez/ai/ollama_service.py +44 -37
- souleyez/ai/path_scorer.py +91 -76
- souleyez/ai/recommender.py +176 -144
- souleyez/ai/report_context.py +74 -73
- souleyez/ai/report_service.py +84 -66
- souleyez/ai/result_parser.py +222 -229
- souleyez/ai/safety.py +67 -44
- souleyez/auth/__init__.py +23 -22
- souleyez/auth/audit.py +36 -26
- souleyez/auth/engagement_access.py +65 -48
- souleyez/auth/permissions.py +14 -3
- souleyez/auth/session_manager.py +54 -37
- souleyez/auth/user_manager.py +109 -64
- souleyez/commands/audit.py +40 -43
- souleyez/commands/auth.py +35 -15
- souleyez/commands/deliverables.py +55 -50
- souleyez/commands/engagement.py +47 -28
- souleyez/commands/license.py +32 -23
- souleyez/commands/screenshots.py +36 -32
- souleyez/commands/user.py +82 -36
- souleyez/config.py +52 -44
- souleyez/core/credential_tester.py +87 -81
- souleyez/core/cve_mappings.py +179 -192
- souleyez/core/cve_matcher.py +162 -148
- souleyez/core/msf_auto_mapper.py +100 -83
- souleyez/core/msf_chain_engine.py +294 -256
- souleyez/core/msf_database.py +153 -70
- souleyez/core/msf_integration.py +679 -673
- souleyez/core/msf_rpc_client.py +40 -42
- souleyez/core/msf_rpc_manager.py +77 -79
- souleyez/core/msf_sync_manager.py +241 -181
- souleyez/core/network_utils.py +22 -15
- souleyez/core/parser_handler.py +34 -25
- souleyez/core/pending_chains.py +114 -63
- souleyez/core/templates.py +158 -107
- souleyez/core/tool_chaining.py +9526 -2879
- souleyez/core/version_utils.py +79 -94
- souleyez/core/vuln_correlation.py +136 -89
- souleyez/core/web_utils.py +33 -32
- souleyez/data/wordlists/ad_users.txt +378 -0
- souleyez/data/wordlists/api_endpoints_large.txt +769 -0
- souleyez/data/wordlists/home_dir_sensitive.txt +39 -0
- souleyez/data/wordlists/lfi_payloads.txt +82 -0
- souleyez/data/wordlists/passwords_brute.txt +1548 -0
- souleyez/data/wordlists/passwords_crack.txt +2479 -0
- souleyez/data/wordlists/passwords_spray.txt +386 -0
- souleyez/data/wordlists/subdomains_large.txt +5057 -0
- souleyez/data/wordlists/usernames_common.txt +694 -0
- souleyez/data/wordlists/web_dirs_large.txt +4769 -0
- souleyez/detection/__init__.py +1 -1
- souleyez/detection/attack_signatures.py +12 -17
- souleyez/detection/mitre_mappings.py +61 -55
- souleyez/detection/validator.py +97 -86
- souleyez/devtools.py +23 -10
- souleyez/docs/README.md +4 -4
- souleyez/docs/api-reference/cli-commands.md +2 -2
- souleyez/docs/developer-guide/adding-new-tools.md +562 -0
- souleyez/docs/user-guide/auto-chaining.md +30 -8
- souleyez/docs/user-guide/getting-started.md +1 -1
- souleyez/docs/user-guide/installation.md +26 -3
- souleyez/docs/user-guide/metasploit-integration.md +2 -2
- souleyez/docs/user-guide/rbac.md +1 -1
- souleyez/docs/user-guide/scope-management.md +1 -1
- souleyez/docs/user-guide/siem-integration.md +1 -1
- souleyez/docs/user-guide/tools-reference.md +1 -8
- souleyez/docs/user-guide/worker-management.md +1 -1
- souleyez/engine/background.py +1239 -535
- souleyez/engine/base.py +4 -1
- souleyez/engine/job_status.py +17 -49
- souleyez/engine/log_sanitizer.py +103 -77
- souleyez/engine/manager.py +38 -7
- souleyez/engine/result_handler.py +2200 -1550
- souleyez/engine/worker_manager.py +50 -41
- souleyez/export/evidence_bundle.py +72 -62
- souleyez/feature_flags/features.py +16 -20
- souleyez/feature_flags.py +5 -9
- souleyez/handlers/__init__.py +11 -0
- souleyez/handlers/base.py +188 -0
- souleyez/handlers/bash_handler.py +277 -0
- souleyez/handlers/bloodhound_handler.py +243 -0
- souleyez/handlers/certipy_handler.py +311 -0
- souleyez/handlers/crackmapexec_handler.py +486 -0
- souleyez/handlers/dnsrecon_handler.py +344 -0
- souleyez/handlers/enum4linux_handler.py +400 -0
- souleyez/handlers/evil_winrm_handler.py +493 -0
- souleyez/handlers/ffuf_handler.py +815 -0
- souleyez/handlers/gobuster_handler.py +1114 -0
- souleyez/handlers/gpp_extract_handler.py +334 -0
- souleyez/handlers/hashcat_handler.py +444 -0
- souleyez/handlers/hydra_handler.py +563 -0
- souleyez/handlers/impacket_getuserspns_handler.py +343 -0
- souleyez/handlers/impacket_psexec_handler.py +222 -0
- souleyez/handlers/impacket_secretsdump_handler.py +426 -0
- souleyez/handlers/john_handler.py +286 -0
- souleyez/handlers/katana_handler.py +425 -0
- souleyez/handlers/kerbrute_handler.py +298 -0
- souleyez/handlers/ldapsearch_handler.py +636 -0
- souleyez/handlers/lfi_extract_handler.py +464 -0
- souleyez/handlers/msf_auxiliary_handler.py +408 -0
- souleyez/handlers/msf_exploit_handler.py +380 -0
- souleyez/handlers/nikto_handler.py +413 -0
- souleyez/handlers/nmap_handler.py +821 -0
- souleyez/handlers/nuclei_handler.py +359 -0
- souleyez/handlers/nxc_handler.py +371 -0
- souleyez/handlers/rdp_sec_check_handler.py +353 -0
- souleyez/handlers/registry.py +292 -0
- souleyez/handlers/responder_handler.py +232 -0
- souleyez/handlers/service_explorer_handler.py +434 -0
- souleyez/handlers/smbclient_handler.py +344 -0
- souleyez/handlers/smbmap_handler.py +510 -0
- souleyez/handlers/smbpasswd_handler.py +296 -0
- souleyez/handlers/sqlmap_handler.py +1116 -0
- souleyez/handlers/theharvester_handler.py +601 -0
- souleyez/handlers/web_login_test_handler.py +327 -0
- souleyez/handlers/whois_handler.py +277 -0
- souleyez/handlers/wpscan_handler.py +554 -0
- souleyez/history.py +32 -16
- souleyez/importers/msf_importer.py +106 -75
- souleyez/importers/smart_importer.py +208 -147
- souleyez/integrations/siem/__init__.py +10 -10
- souleyez/integrations/siem/base.py +17 -18
- souleyez/integrations/siem/elastic.py +108 -122
- souleyez/integrations/siem/factory.py +207 -80
- souleyez/integrations/siem/googlesecops.py +146 -154
- souleyez/integrations/siem/rule_mappings/__init__.py +1 -1
- souleyez/integrations/siem/rule_mappings/wazuh_rules.py +8 -5
- souleyez/integrations/siem/sentinel.py +107 -109
- souleyez/integrations/siem/splunk.py +246 -212
- souleyez/integrations/siem/wazuh.py +65 -71
- souleyez/integrations/wazuh/__init__.py +5 -5
- souleyez/integrations/wazuh/client.py +70 -93
- souleyez/integrations/wazuh/config.py +85 -57
- souleyez/integrations/wazuh/host_mapper.py +28 -36
- souleyez/integrations/wazuh/sync.py +78 -68
- souleyez/intelligence/__init__.py +4 -5
- souleyez/intelligence/correlation_analyzer.py +309 -295
- souleyez/intelligence/exploit_knowledge.py +661 -623
- souleyez/intelligence/exploit_suggestions.py +159 -139
- souleyez/intelligence/gap_analyzer.py +132 -97
- souleyez/intelligence/gap_detector.py +251 -214
- souleyez/intelligence/sensitive_tables.py +266 -129
- souleyez/intelligence/service_parser.py +137 -123
- souleyez/intelligence/surface_analyzer.py +407 -268
- souleyez/intelligence/target_parser.py +159 -162
- souleyez/licensing/__init__.py +6 -6
- souleyez/licensing/validator.py +17 -19
- souleyez/log_config.py +79 -54
- souleyez/main.py +1505 -687
- souleyez/migrations/fix_job_counter.py +16 -14
- souleyez/parsers/bloodhound_parser.py +41 -39
- souleyez/parsers/crackmapexec_parser.py +178 -111
- souleyez/parsers/dalfox_parser.py +72 -77
- souleyez/parsers/dnsrecon_parser.py +103 -91
- souleyez/parsers/enum4linux_parser.py +183 -153
- souleyez/parsers/ffuf_parser.py +29 -25
- souleyez/parsers/gobuster_parser.py +301 -41
- souleyez/parsers/hashcat_parser.py +324 -79
- souleyez/parsers/http_fingerprint_parser.py +350 -103
- souleyez/parsers/hydra_parser.py +131 -111
- souleyez/parsers/impacket_parser.py +231 -178
- souleyez/parsers/john_parser.py +98 -86
- souleyez/parsers/katana_parser.py +316 -0
- souleyez/parsers/msf_parser.py +943 -498
- souleyez/parsers/nikto_parser.py +346 -65
- souleyez/parsers/nmap_parser.py +262 -174
- souleyez/parsers/nuclei_parser.py +40 -44
- souleyez/parsers/responder_parser.py +26 -26
- souleyez/parsers/searchsploit_parser.py +74 -74
- souleyez/parsers/service_explorer_parser.py +279 -0
- souleyez/parsers/smbmap_parser.py +180 -124
- souleyez/parsers/sqlmap_parser.py +434 -308
- souleyez/parsers/theharvester_parser.py +75 -57
- souleyez/parsers/whois_parser.py +135 -94
- souleyez/parsers/wpscan_parser.py +278 -190
- souleyez/plugins/afp.py +44 -36
- souleyez/plugins/afp_brute.py +114 -46
- souleyez/plugins/ard.py +48 -37
- souleyez/plugins/bloodhound.py +95 -61
- souleyez/plugins/certipy.py +303 -0
- souleyez/plugins/crackmapexec.py +186 -85
- souleyez/plugins/dalfox.py +120 -59
- souleyez/plugins/dns_hijack.py +146 -41
- souleyez/plugins/dnsrecon.py +97 -61
- souleyez/plugins/enum4linux.py +91 -66
- souleyez/plugins/evil_winrm.py +291 -0
- souleyez/plugins/ffuf.py +166 -90
- souleyez/plugins/firmware_extract.py +133 -29
- souleyez/plugins/gobuster.py +387 -190
- souleyez/plugins/gpp_extract.py +393 -0
- souleyez/plugins/hashcat.py +100 -73
- souleyez/plugins/http_fingerprint.py +854 -267
- souleyez/plugins/hydra.py +566 -200
- souleyez/plugins/impacket_getnpusers.py +117 -69
- souleyez/plugins/impacket_psexec.py +84 -64
- souleyez/plugins/impacket_secretsdump.py +103 -69
- souleyez/plugins/impacket_smbclient.py +89 -75
- souleyez/plugins/john.py +86 -69
- souleyez/plugins/katana.py +313 -0
- souleyez/plugins/kerbrute.py +237 -0
- souleyez/plugins/lfi_extract.py +541 -0
- souleyez/plugins/macos_ssh.py +117 -48
- souleyez/plugins/mdns.py +35 -30
- souleyez/plugins/msf_auxiliary.py +253 -130
- souleyez/plugins/msf_exploit.py +239 -161
- souleyez/plugins/nikto.py +134 -78
- souleyez/plugins/nmap.py +275 -91
- souleyez/plugins/nuclei.py +180 -89
- souleyez/plugins/nxc.py +285 -0
- souleyez/plugins/plugin_base.py +35 -36
- souleyez/plugins/plugin_template.py +13 -5
- souleyez/plugins/rdp_sec_check.py +130 -0
- souleyez/plugins/responder.py +112 -71
- souleyez/plugins/router_http_brute.py +76 -65
- souleyez/plugins/router_ssh_brute.py +118 -41
- souleyez/plugins/router_telnet_brute.py +124 -42
- souleyez/plugins/routersploit.py +91 -59
- souleyez/plugins/routersploit_exploit.py +77 -55
- souleyez/plugins/searchsploit.py +91 -77
- souleyez/plugins/service_explorer.py +1160 -0
- souleyez/plugins/smbmap.py +122 -72
- souleyez/plugins/smbpasswd.py +215 -0
- souleyez/plugins/sqlmap.py +301 -113
- souleyez/plugins/theharvester.py +127 -75
- souleyez/plugins/tr069.py +79 -57
- souleyez/plugins/upnp.py +65 -47
- souleyez/plugins/upnp_abuse.py +73 -55
- souleyez/plugins/vnc_access.py +129 -42
- souleyez/plugins/vnc_brute.py +109 -38
- souleyez/plugins/web_login_test.py +417 -0
- souleyez/plugins/whois.py +77 -58
- souleyez/plugins/wpscan.py +173 -69
- souleyez/reporting/__init__.py +2 -1
- souleyez/reporting/attack_chain.py +411 -346
- souleyez/reporting/charts.py +436 -501
- souleyez/reporting/compliance_mappings.py +334 -201
- souleyez/reporting/detection_report.py +126 -125
- souleyez/reporting/formatters.py +828 -591
- souleyez/reporting/generator.py +386 -302
- souleyez/reporting/metrics.py +72 -75
- souleyez/scanner.py +35 -29
- souleyez/security/__init__.py +37 -11
- souleyez/security/scope_validator.py +175 -106
- souleyez/security/validation.py +223 -149
- souleyez/security.py +22 -6
- souleyez/storage/credentials.py +247 -186
- souleyez/storage/crypto.py +296 -129
- souleyez/storage/database.py +73 -50
- souleyez/storage/db.py +58 -36
- souleyez/storage/deliverable_evidence.py +177 -128
- souleyez/storage/deliverable_exporter.py +282 -246
- souleyez/storage/deliverable_templates.py +134 -116
- souleyez/storage/deliverables.py +135 -130
- souleyez/storage/engagements.py +109 -56
- souleyez/storage/evidence.py +181 -152
- souleyez/storage/execution_log.py +31 -17
- souleyez/storage/exploit_attempts.py +93 -57
- souleyez/storage/exploits.py +67 -36
- souleyez/storage/findings.py +48 -61
- souleyez/storage/hosts.py +176 -144
- souleyez/storage/migrate_to_engagements.py +43 -19
- souleyez/storage/migrations/_001_add_credential_enhancements.py +22 -12
- souleyez/storage/migrations/_002_add_status_tracking.py +10 -7
- souleyez/storage/migrations/_003_add_execution_log.py +14 -8
- souleyez/storage/migrations/_005_screenshots.py +13 -5
- souleyez/storage/migrations/_006_deliverables.py +13 -5
- souleyez/storage/migrations/_007_deliverable_templates.py +12 -7
- souleyez/storage/migrations/_008_add_nuclei_table.py +10 -4
- souleyez/storage/migrations/_010_evidence_linking.py +17 -10
- souleyez/storage/migrations/_011_timeline_tracking.py +20 -13
- souleyez/storage/migrations/_012_team_collaboration.py +34 -21
- souleyez/storage/migrations/_013_add_host_tags.py +12 -6
- souleyez/storage/migrations/_014_exploit_attempts.py +22 -10
- souleyez/storage/migrations/_015_add_mac_os_fields.py +15 -7
- souleyez/storage/migrations/_016_add_domain_field.py +10 -4
- souleyez/storage/migrations/_017_msf_sessions.py +16 -8
- souleyez/storage/migrations/_018_add_osint_target.py +10 -6
- souleyez/storage/migrations/_019_add_engagement_type.py +10 -6
- souleyez/storage/migrations/_020_add_rbac.py +36 -15
- souleyez/storage/migrations/_021_wazuh_integration.py +20 -8
- souleyez/storage/migrations/_022_wazuh_indexer_columns.py +6 -4
- souleyez/storage/migrations/_023_fix_detection_results_fk.py +16 -6
- souleyez/storage/migrations/_024_wazuh_vulnerabilities.py +26 -10
- souleyez/storage/migrations/_025_multi_siem_support.py +3 -5
- souleyez/storage/migrations/_026_add_engagement_scope.py +31 -12
- souleyez/storage/migrations/_027_multi_siem_persistence.py +32 -15
- souleyez/storage/migrations/__init__.py +26 -26
- souleyez/storage/migrations/migration_manager.py +19 -19
- souleyez/storage/msf_sessions.py +100 -65
- souleyez/storage/osint.py +17 -24
- souleyez/storage/recommendation_engine.py +269 -235
- souleyez/storage/screenshots.py +33 -32
- souleyez/storage/smb_shares.py +136 -92
- souleyez/storage/sqlmap_data.py +183 -128
- souleyez/storage/team_collaboration.py +135 -141
- souleyez/storage/timeline_tracker.py +122 -94
- souleyez/storage/wazuh_vulns.py +64 -66
- souleyez/storage/web_paths.py +33 -37
- souleyez/testing/credential_tester.py +221 -205
- souleyez/ui/__init__.py +1 -1
- souleyez/ui/ai_quotes.py +12 -12
- souleyez/ui/attack_surface.py +2439 -1516
- souleyez/ui/chain_rules_view.py +914 -382
- souleyez/ui/correlation_view.py +312 -230
- souleyez/ui/dashboard.py +2382 -1130
- souleyez/ui/deliverables_view.py +148 -62
- souleyez/ui/design_system.py +13 -13
- souleyez/ui/errors.py +49 -49
- souleyez/ui/evidence_linking_view.py +284 -179
- souleyez/ui/evidence_vault.py +393 -285
- souleyez/ui/exploit_suggestions_view.py +555 -349
- souleyez/ui/export_view.py +100 -66
- souleyez/ui/gap_analysis_view.py +315 -171
- souleyez/ui/help_system.py +105 -97
- souleyez/ui/intelligence_view.py +436 -293
- souleyez/ui/interactive.py +22827 -10678
- souleyez/ui/interactive_selector.py +75 -68
- souleyez/ui/log_formatter.py +47 -39
- souleyez/ui/menu_components.py +22 -13
- souleyez/ui/msf_auxiliary_menu.py +184 -133
- souleyez/ui/pending_chains_view.py +336 -172
- souleyez/ui/progress_indicators.py +5 -3
- souleyez/ui/recommendations_view.py +195 -137
- souleyez/ui/rule_builder.py +343 -225
- souleyez/ui/setup_wizard.py +678 -284
- souleyez/ui/shortcuts.py +217 -165
- souleyez/ui/splunk_gap_analysis_view.py +452 -270
- souleyez/ui/splunk_vulns_view.py +139 -86
- souleyez/ui/team_dashboard.py +498 -335
- souleyez/ui/template_selector.py +196 -105
- souleyez/ui/terminal.py +6 -6
- souleyez/ui/timeline_view.py +198 -127
- souleyez/ui/tool_setup.py +264 -164
- souleyez/ui/tutorial.py +202 -72
- souleyez/ui/tutorial_state.py +40 -40
- souleyez/ui/wazuh_vulns_view.py +235 -141
- souleyez/ui/wordlist_browser.py +260 -107
- souleyez/ui.py +464 -312
- souleyez/utils/tool_checker.py +427 -367
- souleyez/utils.py +33 -29
- souleyez/wordlists.py +134 -167
- {souleyez-2.43.29.dist-info → souleyez-2.43.34.dist-info}/METADATA +1 -1
- souleyez-2.43.34.dist-info/RECORD +443 -0
- {souleyez-2.43.29.dist-info → souleyez-2.43.34.dist-info}/WHEEL +1 -1
- souleyez-2.43.29.dist-info/RECORD +0 -379
- {souleyez-2.43.29.dist-info → souleyez-2.43.34.dist-info}/entry_points.txt +0 -0
- {souleyez-2.43.29.dist-info → souleyez-2.43.34.dist-info}/licenses/LICENSE +0 -0
- {souleyez-2.43.29.dist-info → souleyez-2.43.34.dist-info}/top_level.txt +0 -0
souleyez/core/cve_mappings.py
CHANGED
|
@@ -23,13 +23,14 @@ logger = logging.getLogger(__name__)
|
|
|
23
23
|
@dataclass
|
|
24
24
|
class CVEMapping:
|
|
25
25
|
"""Maps a CVE to affected product versions and exploit tool."""
|
|
26
|
+
|
|
26
27
|
cve_id: str
|
|
27
|
-
product: str
|
|
28
|
-
affected_versions: str
|
|
29
|
-
tool: str
|
|
28
|
+
product: str # Normalized product name (e.g., 'apache')
|
|
29
|
+
affected_versions: str # Version spec (e.g., '>=2.4.49,<=2.4.50')
|
|
30
|
+
tool: str # Tool to run (e.g., 'nuclei')
|
|
30
31
|
args: List[str] = field(default_factory=list) # Tool arguments
|
|
31
|
-
severity: str =
|
|
32
|
-
description: str =
|
|
32
|
+
severity: str = "high" # critical, high, medium, low
|
|
33
|
+
description: str = "" # Human-readable description
|
|
33
34
|
references: List[str] = field(default_factory=list) # URLs
|
|
34
35
|
|
|
35
36
|
def matches_service(self, product: str, version: str) -> bool:
|
|
@@ -49,213 +50,199 @@ class CVEMapping:
|
|
|
49
50
|
# These are well-known vulnerabilities with reliable detection
|
|
50
51
|
CURATED_CVES: Dict[str, CVEMapping] = {
|
|
51
52
|
# Apache HTTP Server
|
|
52
|
-
|
|
53
|
-
cve_id=
|
|
54
|
-
product=
|
|
55
|
-
affected_versions=
|
|
56
|
-
tool=
|
|
57
|
-
args=[
|
|
58
|
-
severity=
|
|
59
|
-
description=
|
|
60
|
-
references=[
|
|
53
|
+
"CVE-2021-41773": CVEMapping(
|
|
54
|
+
cve_id="CVE-2021-41773",
|
|
55
|
+
product="apache",
|
|
56
|
+
affected_versions=">=2.4.49,<=2.4.49",
|
|
57
|
+
tool="nuclei",
|
|
58
|
+
args=["-t", "http/cves/2021/CVE-2021-41773.yaml"],
|
|
59
|
+
severity="critical",
|
|
60
|
+
description="Apache 2.4.49 path traversal and RCE",
|
|
61
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2021-41773"],
|
|
61
62
|
),
|
|
62
|
-
|
|
63
|
-
cve_id=
|
|
64
|
-
product=
|
|
65
|
-
affected_versions=
|
|
66
|
-
tool=
|
|
67
|
-
args=[
|
|
68
|
-
severity=
|
|
69
|
-
description=
|
|
70
|
-
references=[
|
|
63
|
+
"CVE-2021-42013": CVEMapping(
|
|
64
|
+
cve_id="CVE-2021-42013",
|
|
65
|
+
product="apache",
|
|
66
|
+
affected_versions=">=2.4.49,<=2.4.50",
|
|
67
|
+
tool="nuclei",
|
|
68
|
+
args=["-t", "http/cves/2021/CVE-2021-42013.yaml"],
|
|
69
|
+
severity="critical",
|
|
70
|
+
description="Apache 2.4.49-2.4.50 path traversal bypass (incomplete fix for CVE-2021-41773)",
|
|
71
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2021-42013"],
|
|
71
72
|
),
|
|
72
|
-
|
|
73
73
|
# nginx
|
|
74
|
-
|
|
75
|
-
cve_id=
|
|
76
|
-
product=
|
|
77
|
-
affected_versions=
|
|
78
|
-
tool=
|
|
79
|
-
args=[
|
|
80
|
-
severity=
|
|
81
|
-
description=
|
|
82
|
-
references=[
|
|
74
|
+
"CVE-2021-23017": CVEMapping(
|
|
75
|
+
cve_id="CVE-2021-23017",
|
|
76
|
+
product="nginx",
|
|
77
|
+
affected_versions=">=0.6.18,<=1.20.0",
|
|
78
|
+
tool="nuclei",
|
|
79
|
+
args=["-t", "http/cves/2021/CVE-2021-23017.yaml"],
|
|
80
|
+
severity="high",
|
|
81
|
+
description="nginx DNS resolver off-by-one heap write",
|
|
82
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2021-23017"],
|
|
83
83
|
),
|
|
84
|
-
|
|
85
84
|
# PHP
|
|
86
|
-
|
|
87
|
-
cve_id=
|
|
88
|
-
product=
|
|
89
|
-
affected_versions=
|
|
90
|
-
tool=
|
|
91
|
-
args=[
|
|
92
|
-
severity=
|
|
93
|
-
description=
|
|
94
|
-
references=[
|
|
85
|
+
"CVE-2019-11043": CVEMapping(
|
|
86
|
+
cve_id="CVE-2019-11043",
|
|
87
|
+
product="php",
|
|
88
|
+
affected_versions=">=7.1.0,<7.1.33",
|
|
89
|
+
tool="nuclei",
|
|
90
|
+
args=["-t", "http/cves/2019/CVE-2019-11043.yaml"],
|
|
91
|
+
severity="critical",
|
|
92
|
+
description="PHP-FPM RCE via nginx misconfiguration",
|
|
93
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2019-11043"],
|
|
95
94
|
),
|
|
96
|
-
|
|
97
|
-
cve_id=
|
|
98
|
-
product=
|
|
99
|
-
affected_versions=
|
|
100
|
-
tool=
|
|
101
|
-
args=[
|
|
102
|
-
severity=
|
|
103
|
-
description=
|
|
104
|
-
references=[
|
|
95
|
+
"CVE-2012-1823": CVEMapping(
|
|
96
|
+
cve_id="CVE-2012-1823",
|
|
97
|
+
product="php",
|
|
98
|
+
affected_versions=">=5.3.0,<5.3.12",
|
|
99
|
+
tool="nuclei",
|
|
100
|
+
args=["-t", "http/cves/2012/CVE-2012-1823.yaml"],
|
|
101
|
+
severity="critical",
|
|
102
|
+
description="PHP CGI argument injection RCE",
|
|
103
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2012-1823"],
|
|
105
104
|
),
|
|
106
|
-
|
|
107
105
|
# OpenSSH
|
|
108
|
-
|
|
109
|
-
cve_id=
|
|
110
|
-
product=
|
|
111
|
-
affected_versions=
|
|
112
|
-
tool=
|
|
113
|
-
args=[
|
|
114
|
-
severity=
|
|
115
|
-
description=
|
|
116
|
-
references=[
|
|
106
|
+
"CVE-2018-15473": CVEMapping(
|
|
107
|
+
cve_id="CVE-2018-15473",
|
|
108
|
+
product="ssh",
|
|
109
|
+
affected_versions=">=2.0,<7.7",
|
|
110
|
+
tool="nmap",
|
|
111
|
+
args=["--script", "ssh-auth-methods", "-p", "22"],
|
|
112
|
+
severity="medium",
|
|
113
|
+
description="OpenSSH user enumeration",
|
|
114
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2018-15473"],
|
|
117
115
|
),
|
|
118
|
-
|
|
119
116
|
# vsftpd
|
|
120
|
-
|
|
121
|
-
cve_id=
|
|
122
|
-
product=
|
|
123
|
-
affected_versions=
|
|
124
|
-
tool=
|
|
125
|
-
args=[
|
|
126
|
-
severity=
|
|
127
|
-
description=
|
|
128
|
-
references=[
|
|
117
|
+
"CVE-2011-2523": CVEMapping(
|
|
118
|
+
cve_id="CVE-2011-2523",
|
|
119
|
+
product="vsftpd",
|
|
120
|
+
affected_versions="=2.3.4",
|
|
121
|
+
tool="nmap",
|
|
122
|
+
args=["--script", "ftp-vsftpd-backdoor", "-p", "21"],
|
|
123
|
+
severity="critical",
|
|
124
|
+
description="vsftpd 2.3.4 backdoor (smiley face)",
|
|
125
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2011-2523"],
|
|
129
126
|
),
|
|
130
|
-
|
|
131
127
|
# ProFTPD
|
|
132
|
-
|
|
133
|
-
cve_id=
|
|
134
|
-
product=
|
|
135
|
-
affected_versions=
|
|
136
|
-
tool=
|
|
137
|
-
args=[
|
|
138
|
-
severity=
|
|
139
|
-
description=
|
|
140
|
-
references=[
|
|
128
|
+
"CVE-2015-3306": CVEMapping(
|
|
129
|
+
cve_id="CVE-2015-3306",
|
|
130
|
+
product="proftpd",
|
|
131
|
+
affected_versions=">=1.3.5,<1.3.5a",
|
|
132
|
+
tool="nmap",
|
|
133
|
+
args=["--script", "ftp-proftpd-backdoor", "-p", "21"],
|
|
134
|
+
severity="critical",
|
|
135
|
+
description="ProFTPD mod_copy arbitrary file read/write",
|
|
136
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2015-3306"],
|
|
141
137
|
),
|
|
142
|
-
|
|
143
138
|
# Samba
|
|
144
|
-
|
|
145
|
-
cve_id=
|
|
146
|
-
product=
|
|
147
|
-
affected_versions=
|
|
148
|
-
tool=
|
|
149
|
-
args=[
|
|
150
|
-
severity=
|
|
151
|
-
description=
|
|
152
|
-
references=[
|
|
139
|
+
"CVE-2017-7494": CVEMapping(
|
|
140
|
+
cve_id="CVE-2017-7494",
|
|
141
|
+
product="samba",
|
|
142
|
+
affected_versions=">=3.5.0,<4.6.4",
|
|
143
|
+
tool="nmap",
|
|
144
|
+
args=["--script", "smb-vuln-cve-2017-7494", "-p", "445"],
|
|
145
|
+
severity="critical",
|
|
146
|
+
description="Samba RCE via writable share (SambaCry)",
|
|
147
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2017-7494"],
|
|
153
148
|
),
|
|
154
|
-
|
|
155
149
|
# Apache Tomcat
|
|
156
|
-
|
|
157
|
-
cve_id=
|
|
158
|
-
product=
|
|
159
|
-
affected_versions=
|
|
160
|
-
tool=
|
|
161
|
-
args=[
|
|
162
|
-
severity=
|
|
163
|
-
description=
|
|
164
|
-
references=[
|
|
150
|
+
"CVE-2020-1938": CVEMapping(
|
|
151
|
+
cve_id="CVE-2020-1938",
|
|
152
|
+
product="tomcat",
|
|
153
|
+
affected_versions=">=6.0.0,<9.0.31",
|
|
154
|
+
tool="nmap",
|
|
155
|
+
args=["--script", "ajp-brute,ajp-headers,ajp-methods", "-p", "8009"],
|
|
156
|
+
severity="critical",
|
|
157
|
+
description="Apache Tomcat AJP Ghostcat file read/include",
|
|
158
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2020-1938"],
|
|
165
159
|
),
|
|
166
|
-
|
|
167
160
|
# WordPress
|
|
168
|
-
|
|
169
|
-
cve_id=
|
|
170
|
-
product=
|
|
171
|
-
affected_versions=
|
|
172
|
-
tool=
|
|
173
|
-
args=[
|
|
174
|
-
severity=
|
|
175
|
-
description=
|
|
176
|
-
references=[
|
|
161
|
+
"CVE-2022-21661": CVEMapping(
|
|
162
|
+
cve_id="CVE-2022-21661",
|
|
163
|
+
product="wordpress",
|
|
164
|
+
affected_versions=">=5.8.0,<5.8.3",
|
|
165
|
+
tool="wpscan",
|
|
166
|
+
args=["--enumerate", "vp,vt,u"],
|
|
167
|
+
severity="high",
|
|
168
|
+
description="WordPress SQL injection via WP_Query",
|
|
169
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2022-21661"],
|
|
177
170
|
),
|
|
178
|
-
|
|
179
171
|
# Drupal
|
|
180
|
-
|
|
181
|
-
cve_id=
|
|
182
|
-
product=
|
|
183
|
-
affected_versions=
|
|
184
|
-
tool=
|
|
185
|
-
args=[
|
|
186
|
-
severity=
|
|
187
|
-
description=
|
|
188
|
-
references=[
|
|
172
|
+
"CVE-2018-7600": CVEMapping(
|
|
173
|
+
cve_id="CVE-2018-7600",
|
|
174
|
+
product="drupal",
|
|
175
|
+
affected_versions=">=7.0,<7.58",
|
|
176
|
+
tool="nuclei",
|
|
177
|
+
args=["-t", "http/cves/2018/CVE-2018-7600.yaml"],
|
|
178
|
+
severity="critical",
|
|
179
|
+
description="Drupal RCE (Drupalgeddon2)",
|
|
180
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2018-7600"],
|
|
189
181
|
),
|
|
190
|
-
|
|
191
|
-
cve_id=
|
|
192
|
-
product=
|
|
193
|
-
affected_versions=
|
|
194
|
-
tool=
|
|
195
|
-
args=[
|
|
196
|
-
severity=
|
|
197
|
-
description=
|
|
198
|
-
references=[
|
|
182
|
+
"CVE-2018-7602": CVEMapping(
|
|
183
|
+
cve_id="CVE-2018-7602",
|
|
184
|
+
product="drupal",
|
|
185
|
+
affected_versions=">=7.0,<7.59",
|
|
186
|
+
tool="nuclei",
|
|
187
|
+
args=["-t", "http/cves/2018/CVE-2018-7602.yaml"],
|
|
188
|
+
severity="critical",
|
|
189
|
+
description="Drupal RCE (Drupalgeddon3)",
|
|
190
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2018-7602"],
|
|
199
191
|
),
|
|
200
|
-
|
|
201
192
|
# Microsoft IIS
|
|
202
|
-
|
|
203
|
-
cve_id=
|
|
204
|
-
product=
|
|
205
|
-
affected_versions=
|
|
206
|
-
tool=
|
|
207
|
-
args=[
|
|
208
|
-
severity=
|
|
209
|
-
description=
|
|
210
|
-
references=[
|
|
193
|
+
"CVE-2017-7269": CVEMapping(
|
|
194
|
+
cve_id="CVE-2017-7269",
|
|
195
|
+
product="iis",
|
|
196
|
+
affected_versions=">=6.0,<=6.0",
|
|
197
|
+
tool="nmap",
|
|
198
|
+
args=["--script", "http-vuln-cve2017-7269", "-p", "80"],
|
|
199
|
+
severity="critical",
|
|
200
|
+
description="IIS 6.0 WebDAV buffer overflow RCE",
|
|
201
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2017-7269"],
|
|
211
202
|
),
|
|
212
|
-
|
|
213
203
|
# Redis
|
|
214
|
-
|
|
215
|
-
cve_id=
|
|
216
|
-
product=
|
|
217
|
-
affected_versions=
|
|
218
|
-
tool=
|
|
219
|
-
args=[
|
|
220
|
-
severity=
|
|
221
|
-
description=
|
|
222
|
-
references=[
|
|
204
|
+
"CVE-2022-0543": CVEMapping(
|
|
205
|
+
cve_id="CVE-2022-0543",
|
|
206
|
+
product="redis",
|
|
207
|
+
affected_versions=">=2.2,<6.2.7",
|
|
208
|
+
tool="nuclei",
|
|
209
|
+
args=["-t", "network/cves/2022/CVE-2022-0543.yaml"],
|
|
210
|
+
severity="critical",
|
|
211
|
+
description="Redis Lua sandbox escape RCE (Debian/Ubuntu)",
|
|
212
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2022-0543"],
|
|
223
213
|
),
|
|
224
|
-
|
|
225
214
|
# Elasticsearch
|
|
226
|
-
|
|
227
|
-
cve_id=
|
|
228
|
-
product=
|
|
229
|
-
affected_versions=
|
|
230
|
-
tool=
|
|
231
|
-
args=[
|
|
232
|
-
severity=
|
|
233
|
-
description=
|
|
234
|
-
references=[
|
|
215
|
+
"CVE-2015-1427": CVEMapping(
|
|
216
|
+
cve_id="CVE-2015-1427",
|
|
217
|
+
product="elasticsearch",
|
|
218
|
+
affected_versions=">=1.3.0,<1.4.3",
|
|
219
|
+
tool="nuclei",
|
|
220
|
+
args=["-t", "http/cves/2015/CVE-2015-1427.yaml"],
|
|
221
|
+
severity="critical",
|
|
222
|
+
description="Elasticsearch Groovy sandbox bypass RCE",
|
|
223
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2015-1427"],
|
|
235
224
|
),
|
|
236
|
-
|
|
237
225
|
# Apache Struts
|
|
238
|
-
|
|
239
|
-
cve_id=
|
|
240
|
-
product=
|
|
241
|
-
affected_versions=
|
|
242
|
-
tool=
|
|
243
|
-
args=[
|
|
244
|
-
severity=
|
|
245
|
-
description=
|
|
246
|
-
references=[
|
|
226
|
+
"CVE-2017-5638": CVEMapping(
|
|
227
|
+
cve_id="CVE-2017-5638",
|
|
228
|
+
product="struts",
|
|
229
|
+
affected_versions=">=2.3.5,<2.3.32",
|
|
230
|
+
tool="nuclei",
|
|
231
|
+
args=["-t", "http/cves/2017/CVE-2017-5638.yaml"],
|
|
232
|
+
severity="critical",
|
|
233
|
+
description="Apache Struts2 RCE via Content-Type header",
|
|
234
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2017-5638"],
|
|
247
235
|
),
|
|
248
|
-
|
|
249
236
|
# Log4j
|
|
250
|
-
|
|
251
|
-
cve_id=
|
|
252
|
-
product=
|
|
253
|
-
affected_versions=
|
|
254
|
-
tool=
|
|
255
|
-
args=[
|
|
256
|
-
severity=
|
|
257
|
-
description=
|
|
258
|
-
references=[
|
|
237
|
+
"CVE-2021-44228": CVEMapping(
|
|
238
|
+
cve_id="CVE-2021-44228",
|
|
239
|
+
product="log4j",
|
|
240
|
+
affected_versions=">=2.0,<2.15.0",
|
|
241
|
+
tool="nuclei",
|
|
242
|
+
args=["-t", "http/cves/2021/CVE-2021-44228.yaml"],
|
|
243
|
+
severity="critical",
|
|
244
|
+
description="Log4j RCE (Log4Shell)",
|
|
245
|
+
references=["https://nvd.nist.gov/vuln/detail/CVE-2021-44228"],
|
|
259
246
|
),
|
|
260
247
|
}
|
|
261
248
|
|
|
@@ -277,7 +264,7 @@ def get_cves_for_service(product: str, version: str) -> List[CVEMapping]:
|
|
|
277
264
|
applicable.append(cve)
|
|
278
265
|
|
|
279
266
|
# Sort by severity (critical > high > medium > low)
|
|
280
|
-
severity_order = {
|
|
267
|
+
severity_order = {"critical": 0, "high": 1, "medium": 2, "low": 3}
|
|
281
268
|
applicable.sort(key=lambda c: severity_order.get(c.severity, 4))
|
|
282
269
|
|
|
283
270
|
return applicable
|
|
@@ -300,12 +287,12 @@ def load_cve_database(path: Optional[str] = None) -> Dict[str, CVEMapping]:
|
|
|
300
287
|
"""
|
|
301
288
|
if path is None:
|
|
302
289
|
# Check user config directory first
|
|
303
|
-
user_path = Path.home() /
|
|
290
|
+
user_path = Path.home() / ".souleyez" / "cve_database.json"
|
|
304
291
|
if user_path.exists():
|
|
305
292
|
path = str(user_path)
|
|
306
293
|
else:
|
|
307
294
|
# Fall back to package data
|
|
308
|
-
pkg_path = Path(__file__).parent.parent /
|
|
295
|
+
pkg_path = Path(__file__).parent.parent / "data" / "cve_database.json"
|
|
309
296
|
if pkg_path.exists():
|
|
310
297
|
path = str(pkg_path)
|
|
311
298
|
else:
|
|
@@ -313,20 +300,20 @@ def load_cve_database(path: Optional[str] = None) -> Dict[str, CVEMapping]:
|
|
|
313
300
|
return CURATED_CVES
|
|
314
301
|
|
|
315
302
|
try:
|
|
316
|
-
with open(path,
|
|
303
|
+
with open(path, "r") as f:
|
|
317
304
|
data = json.load(f)
|
|
318
305
|
|
|
319
306
|
cves = {}
|
|
320
307
|
for cve_id, entry in data.items():
|
|
321
308
|
cves[cve_id] = CVEMapping(
|
|
322
309
|
cve_id=cve_id,
|
|
323
|
-
product=entry.get(
|
|
324
|
-
affected_versions=entry.get(
|
|
325
|
-
tool=entry.get(
|
|
326
|
-
args=entry.get(
|
|
327
|
-
severity=entry.get(
|
|
328
|
-
description=entry.get(
|
|
329
|
-
references=entry.get(
|
|
310
|
+
product=entry.get("product", ""),
|
|
311
|
+
affected_versions=entry.get("affected", ""),
|
|
312
|
+
tool=entry.get("tool", "nuclei"),
|
|
313
|
+
args=entry.get("args", []),
|
|
314
|
+
severity=entry.get("severity", "high"),
|
|
315
|
+
description=entry.get("description", ""),
|
|
316
|
+
references=entry.get("references", []),
|
|
330
317
|
)
|
|
331
318
|
|
|
332
319
|
logger.info(f"Loaded {len(cves)} CVEs from {path}")
|