-
Notifications
You must be signed in to change notification settings - Fork 385
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OSCD Initiative] Vulners analyzer #880
Conversation
More details: https://github.com/uchakin/Vulners-analyzer |
I've an issue with Vulners_IOC:
Probably the check is not correct or there is an error if the return list in empty. Can you check? It's still missing templates and documentation info but seems good to me. |
Hello! Thank you for your review. I did not fully understand your comment about documentation and templates. Or do you mean to add README to the pool request? |
For the documentation you can now add a README file, subscription and logo informations in json files to have them deployed automatically in the new docs. For the code I still have issues.. it seems that search returns a list so I have to iterate on the results. Something like this:
|
@dadokkio Updated code and all templates. Added rendering of each result, according to your recommendation. + added README with each points. |
@dadokkio Are there any others issues? Any chance this could be included in the next release? |
tags = ', '.join( | ||
set([', '.join(result['tags']) for result in raw['results']]) | ||
) | ||
if tags: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think there is something strange here. The code will not reach the else clause in any case.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@dadokkio done
You're right. I fixed and simplified this part.
Ok, just one little note and one question. Can you please add proxies support?
The question is related to the search. Can you guarantee that query like yours will return always at most 1 result? |
@dadokkio Thanks a lot for your code review! |
My question was because at the moment if the search for one ioc returns data you pick vulnerabilities only for the first result.
I tried to run your type of query randomly few times and they did return just one record, so this was the reason for the question. |
The Vulners API has a limit on the number of free requests per month (1000 with possible limit exceeding) Therefore, after receiving id documents and passing all the conditions, we pass them to documentList() (instead of document() ) and get their full version .
The loop (for document_results in full_documents_info) is necessary to collect information on each result for further parsing, as you suggested last time. |
Hello, Thank you for the submission. Could you please update your Readme to follow the following formatting rule: And also, could you please update your JSON files, so that extra information can be shared in the documentation. You can follow this guide : https://thehive-project.github.io/Cortex-Analyzers/analyzers_definition/#definition-of-an-analyzer For example:
Thanks |
Hello! Updated documentation according to your comment. |
"if the case (incident) is related to the exploitation of a vulnerability, then the analyst (manually / automatically) can add it to observables and quickly get all the basic information on it in order to continue analyzing the case."
By default theHive does not have a "cve" type to be observables, so we have to add it to Administrator Settings:
Vulners API KEY available in the user's profile after registration: vulners.com
P.S. part of OSCD sprint