-
Notifications
You must be signed in to change notification settings - Fork 205
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CRAVEX: Collect and normalize exploit pointers #95
Comments
exploitdb has moved to https://gitlab.com/exploit-database/exploitdb |
This is a nice dataset:
Also:
|
We're tagging vul IDs (more than just CVE) at
We pull updates from their respective repositories every few hours, crawl the diffs for IDs we recognize, and then tag the commit in which the ID first appeared.
The ID patterns we look for are here: |
Just to set expectations on data quality: Please be aware of the notes about signal-to-noise in the Labyrinth README. An ID that shows up in Labyrinth might be because there's an exploit repo that mentions it, or it could be a number of other relatively benign reasons because our code isn't smart enough to tell the difference. Labyrinth's findings are meant to serve as input to an analysis process, not a production exploit feed. |
On the other hand, we're more confident about the exploitdb/metasploit tags indicating exploits because there's a human vetting process involved (i.e., their developers decide what to include in their product). |
@ahouseholder Thank you for the valuable insights. In the end, I want to know if my code is vulnerable. So the idea here with exploits is this, inc combination with reachability:
And if I am either exploitable or the vulnerable code is reachable, then I need to patch (possibly with the fix commit) |
Related: #655 |
See discussion document at https://docs.google.com/document/d/1XtMmxthmANhr-IqXsyMgFnrOq5fTGfsE/edit?usp=sharing&ouid=117241222429542576816&rtpof=true&sd=true See work-in-progress normalized model spreadsheet at https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing |
The proposed normalized Exploits model spreadsheet at https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing is ready for review. |
The proposed normalized Exploits model spreadsheet at https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing has been reviewed and ready for implementation. |
@DennisClark I’ve been working on the Exploit model but encountered a few challenges:
"notes": {
"AKA": ["Zerologon"],
"Stability": ["crash-safe"],
"Reliability": [],
"SideEffects": ["config-changes", "ioc-in-logs"]
} should we store it as a JSON or just a string?
|
The content of the google referenced in the body of this issue at: is below for reference: CRAVEX: Exploits in VulnerableCodeReady for comments and additions. Essential related details are in: https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing CRAVEX project: See https://github.com/orgs/nexB/projects/56/views/1 BackgroundObjective: collect and normalize published exploit data in the VulnerableCode “Vulnerabilities” model. In addition to providing “references” to various exploit catalogs, store selected exploit details in VulnerableCode using normalized field names. Related issues/PRs:
Exploit Sources:
CRAVEX project: See https://github.com/orgs/nexB/projects/56/views/1 VulnerableCode modelKEV fieldsThe CISA-managed Known Exploited Vulnerabilities (KEV) catalog is now being extracted and stored in VulnerableCode, pending final confirmation. Field details: https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing exploitdb fieldsSee issue #1453 ExploitDB doesn’t provide any PURLs, but it does include an alias like Field details: https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing metasploit fields for packetstorm, metasploit, and CERTCCThe metasploit-framework provides the field structure for multiple export catalogs:
See issues:
Exploit files from packetstorm are available for download at https://packetstormsecurity.com/files/tags/exploit/ |
We have a decent coverage now. I am closing, and we have secondary issues available for later. |
We want to collect data about exploits.
PacketStorm
#1452is now descheduled and removed from plan as explained in #1452 (comment) for whySee discussion document at https://docs.google.com/document/d/1XtMmxthmANhr-IqXsyMgFnrOq5fTGfsE/edit?usp=sharing&ouid=117241222429542576816&rtpof=true&sd=true
See work-in-progress normalized model spreadsheet at https://docs.google.com/spreadsheets/d/1J2t2T_s015pnAouy5ss-AA0SI4e2xjT4uICjlL_Aa38/edit?usp=sharing and these fields are also in this CSV:
Vulnerability-Model - ExploitFields.csv
The text was updated successfully, but these errors were encountered: