-
Notifications
You must be signed in to change notification settings - Fork 32
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: include extra steps to Vulns verifications E2E
- Loading branch information
Showing
11 changed files
with
544 additions
and
480 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -13,70 +13,144 @@ | |
amd64: https://downloads.rclone.org/v1.49.5/rclone-v1.49.5-linux-amd64.deb | ||
arm: null | ||
windows: | ||
amd64: http://sourceforge.net/projects/firebird/files/firebird-win32/2.0.7-Release/Firebird-2.0.7.13318_0_win32.exe/download | ||
check_alerts: | ||
amd64: https://get.videolan.org/vlc/3.0.6/win64/vlc-3.0.6-win64.exe | ||
macos: | ||
amd64: https://nodejs.org/dist/v17.0.1/node-v17.0.1.pkg | ||
|
||
# {"timestamp":"2023-11-14T10:52:41.932+0000","rule":{"level":10,"description":"CVE-2020-28924 affects rclone","id":"23505","firedtimes":392,"mail":false,"groups":["vulnerability-detector"],"gdpr":["IV_35.7.d"],"pci_dss":["11.2.1","11.2.3"],"tsc":["CC7.1","CC7.2"]},"agent":{"id":"002","name":"ip-172-31-12-122.ec2.internal","ip":"172.31.12.122"},"manager":{"name":"ip-172-31-6-24"},"id":"1699959161.19604197","cluster":{"name":"wazuh","node":"master"},"decoder":{"name":"json"},"data":{"vulnerability":{"package":{"name":"rclone","version":"1.49.5-1","architecture":"x86_64","condition":"Package less than 1.53.3"},"cvss":{"cvss2":{"vector":{"attack_vector":"network","access_complexity":"low","authentication":"none","confidentiality_impact":"partial","integrity_impact":"none","availability":"none"},"base_score":"5","exploitability_score":"10","impact_score":"2.900000"},"cvss3":{"vector":{"attack_vector":"network","access_complexity":"low","privileges_required":"none","user_interaction":"none","scope":"unchanged","confidentiality_impact":"high","integrity_impact":"none","availability":"none"},"base_score":"7.500000","exploitability_score":"3.900000","impact_score":"3.600000"}},"cve":"CVE-2020-28924","title":"CVE-2020-28924 affects rclone","rationale":"An issue was discovered in Rclone before 1.53.3. Due to the use of a weak random number generator, the password generator has been producing weak passwords with much less entropy than advertised. The suggested passwords depend deterministically on the time the second rclone was started. This limits the entropy of the passwords enormously. These passwords are often used in the crypt backend for encryption of data. It would be possible to make a dictionary of all possible passwords with about 38 million entries per password length. This would make decryption of secret material possible with a plausible amount of effort. NOTE: all passwords generated by affected versions should be changed.","severity":"High","published":"2020-11-19","updated":"2022-04-26","cwe_reference":"CWE-331","status":"Active","type":"PACKAGE","references":["https://github.com/rclone/rclone/issues/4783","https://lists.fedoraproject.org/archives/list/[email protected]/message/UJIFT24Q6EFXLQZ24AER2QGFFZLMIPCD/","https://rclone.org/downloads/","https://security.gentoo.org/glsa/202107-14","https://nvd.nist.gov/vuln/detail/CVE-2020-28924"],"assigner":"[email protected]"}},"location":"vulnerability-detector"} | ||
|
||
check_agent_alert_indexer: | ||
centos: | ||
- event: syscollector_install_package_alert_yum | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.49.5" | ||
ubuntu: | ||
- event: syscollector_install_package_alert_apt | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.49.5" | ||
teardown: | ||
- remove_package: | ||
package: | ||
centos: rclone | ||
ubuntu: rclone | ||
|
||
- case: "Updating a vulnerable package that remains vulnerable to the same CVE" | ||
id: "update_vuln_package_remain_vulnerable" | ||
description: "Updating a vulnerable package that remains vulnerable to the same CVE" | ||
preconditions: | ||
tasks: | ||
- install_package: | ||
package: | ||
centos: | ||
amd64: https://downloads.rclone.org/v1.49.5/rclone-v1.49.5-linux-amd64.rpm | ||
ubuntu: | ||
amd64: https://downloads.rclone.org/v1.49.5/rclone-v1.49.5-linux-amd64.deb | ||
check_alerts: | ||
centos: | ||
amd64: | ||
- event: syscollector_install_package_alert_yum | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.49.5" | ||
ubuntu: | ||
- event: syscollector_install_package_alert_apt | ||
arm: | ||
- event: syscollector_install_package_alert_yum | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.49.5" | ||
body: | ||
tasks: | ||
- install_package: | ||
package: | ||
centos: | ||
amd64: https://downloads.rclone.org/v1.50.0/rclone-v1.50.0-linux-amd64.rpm | ||
ubuntu: | ||
amd64: https://downloads.rclone.org/v1.50.0/rclone-v1.50.0-linux-amd64.deb | ||
check_alerts: | ||
centos: | ||
- event: upgrade_package | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.50.0" | ||
ubuntu: | ||
- event: upgrade_package | ||
amd64: | ||
- event: syscollector_install_package_alert_apt | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.49.5" | ||
arm: | ||
- event: syscollector_install_package_alert_apt | ||
parameters: | ||
PACKAGE_NAME: "rclone" | ||
PACKAGE_VERSION: "1.50.0" | ||
PACKAGE_VERSION: "1.49.5" | ||
windows: | ||
amd64: | ||
- event: syscollector_install_package_alert_apt | ||
parameters: | ||
PACKAGE_NAME: "VideoLAN" | ||
PACKAGE_VERSION: "3.0.6" | ||
macos: | ||
amd64: | ||
- event: syscollector_install_package_alert_apt | ||
parameters: | ||
PACKAGE_NAME: | ||
PACKAGE_VERSION: | ||
|
||
|
||
# check_alerts: | ||
# centos: | ||
# amd64: | ||
# - event: syscollector_install_package_alert_yum | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# arm: | ||
# - event: syscollector_install_package_alert_yum | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# ubuntu: | ||
# amd64: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# arm: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# windows: | ||
# amd64: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: "VideoLAN" | ||
# PACKAGE_VERSION: "3.0.6" | ||
# macos: | ||
# amd64: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: | ||
# PACKAGE_VERSION: | ||
teardown: | ||
- remove_package: | ||
package: | ||
centos: rclone | ||
ubuntu: rclone | ||
centos: | ||
amd: rclone | ||
arm: rclone | ||
ubuntu: | ||
amd: rclone | ||
arm: rclone | ||
windows: | ||
amd64: C:\\\\Program Files\\\\VideoLAN\\\\VLC\\\\uninstall.exe | ||
macos: | ||
amd64: | ||
|
||
# - case: "Updating a vulnerable package that remains vulnerable to the same CVE" | ||
# id: "update_vuln_package_remain_vulnerable" | ||
# description: "Updating a vulnerable package that remains vulnerable to the same CVE" | ||
# preconditions: | ||
# tasks: | ||
# - install_package: | ||
# package: | ||
# centos: | ||
# amd64: https://downloads.rclone.org/v1.49.5/rclone-v1.49.5-linux-amd64.rpm | ||
# ubuntu: | ||
# amd64: https://downloads.rclone.org/v1.49.5/rclone-v1.49.5-linux-amd64.deb | ||
# check_alerts: | ||
# centos: | ||
# - event: syscollector_install_package_alert_yum | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# ubuntu: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.49.5" | ||
# body: | ||
# tasks: | ||
# - install_package: | ||
# package: | ||
# centos: | ||
# amd64: https://downloads.rclone.org/v1.50.0/rclone-v1.50.0-linux-amd64.rpm | ||
# ubuntu: | ||
# amd64: https://downloads.rclone.org/v1.50.0/rclone-v1.50.0-linux-amd64.deb | ||
# check_alerts: | ||
# centos: | ||
# - event: syscollector_upgrade_package_alert_yum | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.50.0" | ||
# ubuntu: | ||
# - event: syscollector_install_package_alert_apt | ||
# parameters: | ||
# PACKAGE_NAME: "rclone" | ||
# PACKAGE_VERSION: "1.50.0" | ||
# teardown: | ||
# - remove_package: | ||
# package: | ||
# centos: rclone | ||
# ubuntu: rclone | ||
|
||
# ---- | ||
|
||
|
Oops, something went wrong.