Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

scanning on Centos6, but vuls recognizes debian. #174

Closed
stkhr opened this issue Sep 12, 2016 · 3 comments
Closed

scanning on Centos6, but vuls recognizes debian. #174

stkhr opened this issue Sep 12, 2016 · 3 comments

Comments

@stkhr
Copy link

stkhr commented Sep 12, 2016

When I tried to scan centos6, vuls recognized that scanned OS is debian.

Scan target OS: CentOS6.5
Run Command: vuls scan -debug -ssh-external -report-json -cve-dictionary-dbpath=$PWD/cve.sqlite3
Debug log:

[Sep 12 12:25:18]  INFO [localhost] Validating Config...
[Sep 12 12:25:18]  INFO [localhost] Detecting Server/Contianer OS...
[Sep 12 12:25:18]  INFO [localhost] Detecting OS of servers...
[Sep 12 12:25:18] DEBUG [localhost] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; ls /etc/debian_version, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:18] DEBUG [localhost] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; lsb_release -ir, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:18]  WARN [localhost] Unknown Debian/Ubuntu version. lsb_release -ir: SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; lsb_release -ir, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:18] DEBUG [localhost] Debian like Linux. Host: 10.0.0.1:22
[Sep 12 12:25:18]  INFO [localhost] (1/1) Detected: server1: debian/ubuntu unknown
[Sep 12 12:25:18]  INFO [localhost] Detecting OS of containers...
[Sep 12 12:25:18]  INFO [localhost] Checking sudo configuration...
[Sep 12 12:25:18] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; sudo -S apt-get -v, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:18]  INFO [server1] sudo ... OK
[Sep 12 12:25:18]  INFO [localhost] Detecting Platforms...
[Sep 12 12:25:19] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; type curl, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:19] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; curl --max-time 1 --retry 3 --noproxy 169.254.169.254 http://169.254.169.254/latest/meta-data/instance-id, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:19]  INFO [localhost] (1/1) server1 is running on other
[Sep 12 12:25:19]  INFO [localhost] Scanning vulnerabilities...
[Sep 12 12:25:19]  INFO [localhost] Check required packages for scanning...
[Sep 12 12:25:19]  INFO [localhost] Scanning vulnerable OS packages...
[Sep 12 12:25:19] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; dpkg-query -W, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:19] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; sudo -S apt-get update, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:19] DEBUG [server1] SSHResult: servername: server1, cmd: /usr/bin/ssh -t -o StrictHostKeyChecking=no -o UserKnownHostsFile=/dev/null -o LogLevel=quiet -o ConnectionAttempts=3 -o ConnectTimeout=10 -o ControlMaster=no -o ControlPath=none [email protected] -p 22 -i /home/vuls/.ssh/id_rsa -o PasswordAuthentication=no set -o pipefail; sudo -S LANG=en_US.UTF-8 apt-get upgrade --dry-run, exitstatus: 0, stdout: , stderr: , err: %!s(<nil>)
[Sep 12 12:25:19] DEBUG [server1] 0 Cves are found. cves: []
[Sep 12 12:25:19]  INFO [server1] Fetching CVE details...
[Sep 12 12:25:19]  INFO [server1] Done
[Sep 12 12:25:19]  INFO [localhost] Scanning vulnerable software specified in the CPE...
[Sep 12 12:25:19]  INFO [localhost] Reporting...
@kotakanbe
Copy link
Member

Thanks for reporting :)
I will check this issue.

@kotakanbe
Copy link
Member

kotakanbe commented Sep 14, 2016

I tried to reproduce the issue, but I couldn't.
I want to know more details, please join to Vuls slack team via http://goo.gl/forms/xm5KFo35tu .
( You can communicate in Japanese in #vulsjp channel )

@stkhr
Copy link
Author

stkhr commented Sep 21, 2016

Sorry, I solved this problem.
My environment was wrong. I changed settings, then vuls was operating nomarlly.

@stkhr stkhr closed this as completed Sep 21, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants