mirror of
https://github.com/ail-project/ail-framework.git
synced 2024-11-26 07:47:17 +00:00
191 lines
No EOL
5.6 KiB
Python
Executable file
191 lines
No EOL
5.6 KiB
Python
Executable file
#!/usr/bin/env python3
|
|
# -*-coding:UTF-8 -*
|
|
|
|
import os
|
|
import re
|
|
import sys
|
|
|
|
from flask import url_for
|
|
|
|
from pymisp import MISPObject
|
|
|
|
import requests
|
|
|
|
sys.path.append(os.environ['AIL_BIN'])
|
|
##################################
|
|
# Import Project packages
|
|
##################################
|
|
from lib.ConfigLoader import ConfigLoader
|
|
from lib.objects.abstract_daterange_object import AbstractDaterangeObject, AbstractDaterangeObjects
|
|
from packages import Date
|
|
|
|
config_loader = ConfigLoader()
|
|
r_objects = config_loader.get_db_conn("Kvrocks_Objects")
|
|
baseurl = config_loader.get_config_str("Notifications", "ail_domain")
|
|
config_loader = None
|
|
|
|
|
|
class Cve(AbstractDaterangeObject):
|
|
"""
|
|
AIL Cve Object.
|
|
"""
|
|
|
|
def __init__(self, id):
|
|
super(Cve, self).__init__('cve', id)
|
|
|
|
# def get_ail_2_ail_payload(self):
|
|
# payload = {'raw': self.get_gzip_content(b64=True),
|
|
# 'compress': 'gzip'}
|
|
# return payload
|
|
|
|
# # WARNING: UNCLEAN DELETE /!\ TEST ONLY /!\
|
|
def delete(self):
|
|
# # TODO:
|
|
pass
|
|
|
|
def get_link(self, flask_context=False):
|
|
if flask_context:
|
|
url = url_for('correlation.show_correlation', type=self.type, id=self.id)
|
|
else:
|
|
url = f'{baseurl}/correlation/show?type={self.type}&id={self.id}'
|
|
return url
|
|
|
|
# TODO # CHANGE COLOR
|
|
def get_svg_icon(self):
|
|
return {'style': 'fas', 'icon': '\uf188', 'color': '#1E88E5', 'radius': 5}
|
|
|
|
def get_misp_object(self):
|
|
obj_attrs = []
|
|
obj = MISPObject('vulnerability')
|
|
first_seen = self.get_first_seen()
|
|
last_seen = self.get_last_seen()
|
|
if first_seen:
|
|
obj.first_seen = first_seen
|
|
if last_seen:
|
|
obj.last_seen = last_seen
|
|
if not first_seen or not last_seen:
|
|
self.logger.warning(
|
|
f'Export error, None seen {self.type}:{self.subtype}:{self.id}, first={first_seen}, last={last_seen}')
|
|
|
|
obj_attrs.append(obj.add_attribute('id', value=self.id))
|
|
for obj_attr in obj_attrs:
|
|
for tag in self.get_tags():
|
|
obj_attr.add_tag(tag)
|
|
return obj
|
|
|
|
def get_meta(self, options=set()):
|
|
meta = self._get_meta(options=options)
|
|
meta['id'] = self.id
|
|
meta['tags'] = self.get_tags(r_list=True)
|
|
return meta
|
|
|
|
def get_cve_search(self):
|
|
try:
|
|
response = requests.get(f'https://cvepremium.circl.lu/api/cve/{self.id}', timeout=10)
|
|
if response.status_code == 200:
|
|
json_response = response.json()
|
|
# 'summary'
|
|
# 'references'
|
|
# 'last-modified'
|
|
# 'Published'
|
|
# 'Modified'
|
|
return json_response
|
|
else:
|
|
return {'error': f'{response.status_code}'}
|
|
except requests.exceptions.ConnectionError:
|
|
return {'error': f'Connection Error'}
|
|
except requests.exceptions.ReadTimeout:
|
|
return {'error': f'Timeout Error'}
|
|
|
|
class Cves(AbstractDaterangeObjects):
|
|
"""
|
|
Barcodes Objects
|
|
"""
|
|
def __init__(self):
|
|
super().__init__('cve', Cve)
|
|
|
|
def get_name(self):
|
|
return 'Cves'
|
|
|
|
def get_icon(self):
|
|
return {'fa': 'fas', 'icon': 'bug'}
|
|
|
|
def get_link(self, flask_context=False):
|
|
if flask_context:
|
|
url = url_for('objects_cve.objects_cves')
|
|
else:
|
|
url = f'{baseurl}/objects/cves'
|
|
return url
|
|
|
|
def sanitize_id_to_search(self, name_to_search):
|
|
return name_to_search # TODO
|
|
|
|
|
|
# TODO ADD SEARCH FUNCTION
|
|
|
|
def get_all_cves():
|
|
return r_objects.smembers(f'cve:all')
|
|
|
|
def get_cves_by_date(date):
|
|
return r_objects.zrange(f'cve:date:{date}', 0, -1)
|
|
|
|
def get_nb_cves_by_date(date):
|
|
return r_objects.zcard(f'cve:date:{date}')
|
|
|
|
def get_cves_by_daterange(date_from, date_to):
|
|
cves = set()
|
|
for date in Date.substract_date(date_from, date_to):
|
|
cves = cves | set(get_cves_by_date(date))
|
|
return cves
|
|
|
|
def get_cves_meta(cves_id, options=set()):
|
|
dict_cve = {}
|
|
for cve_id in cves_id:
|
|
cve = Cve(cve_id)
|
|
dict_cve[cve_id] = cve.get_meta(options=options)
|
|
return dict_cve
|
|
|
|
def sanitize_cve_name_to_search(name_to_search): # TODO FILTER NAME
|
|
return name_to_search
|
|
|
|
def search_cves_by_name(name_to_search, r_pos=False):
|
|
cves = {}
|
|
# for subtype in subtypes:
|
|
r_name = sanitize_cve_name_to_search(name_to_search)
|
|
if not name_to_search or isinstance(r_name, dict):
|
|
return cves
|
|
r_name = re.compile(r_name)
|
|
for cve_name in get_all_cves():
|
|
res = re.search(r_name, cve_name)
|
|
if res:
|
|
cves[cve_name] = {}
|
|
if r_pos:
|
|
cves[cve_name]['hl-start'] = res.start()
|
|
cves[cve_name]['hl-end'] = res.end()
|
|
return cves
|
|
|
|
def api_get_cves_range_by_daterange(date_from, date_to):
|
|
cves = []
|
|
for date in Date.substract_date(date_from, date_to):
|
|
d = {'date': f'{date[0:4]}-{date[4:6]}-{date[6:8]}',
|
|
'CVE': get_nb_cves_by_date(date)}
|
|
cves.append(d)
|
|
return cves
|
|
|
|
def api_get_cves_meta_by_daterange(date_from, date_to):
|
|
date = Date.sanitise_date_range(date_from, date_to)
|
|
return get_cves_meta(get_cves_by_daterange(date['date_from'], date['date_to']), options=['sparkline'])
|
|
|
|
def get_cve_graphline(cve_id):
|
|
cve = Cve(cve_id)
|
|
graphline = []
|
|
if cve.exists():
|
|
nb_day = 30
|
|
for date in Date.get_previous_date_list(nb_day):
|
|
graphline.append({'date': f'{date[0:4]}-{date[4:6]}-{date[6:8]}', 'value': cve.get_nb_seen_by_date(date)})
|
|
return graphline
|
|
|
|
|
|
# if __name__ == '__main__':
|
|
# name_to_search = '98'
|
|
# print(search_cves_by_name(name_to_search)) |