All Projects → fkie-cad → Iva

fkie-cad / Iva

Licence: lgpl-3.0
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Iva

inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+159.18%)
Mutual labels:  cve, vulnerability-scanners
Vfeed
The Correlated CVE Vulnerability And Threat Intelligence Database API
Stars: ✭ 826 (+1585.71%)
Mutual labels:  vulnerability-scanners, cve
Faraday
Faraday introduces a new concept - IPE (Integrated Penetration-Test Environment) a multiuser Penetration test IDE. Designed for distributing, indexing, and analyzing the data generated during a security audit.
Stars: ✭ 3,198 (+6426.53%)
Mutual labels:  vulnerability-scanners, cve
Sbt Dependency Check
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). 🌈
Stars: ✭ 187 (+281.63%)
Mutual labels:  vulnerability-scanners, cve
dep-scan
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI and Google CloudBuild. No server required!
Stars: ✭ 346 (+606.12%)
Mutual labels:  cve, vulnerability-scanners
vulnerablecode
A free and open vulnerabilities database and the packages they impact. And the tools to aggregate and correlate these vulnerabilities. Sponsored by NLnet https://nlnet.nl/project/vulnerabilitydatabase/ for https://www.aboutcode.org/ Chat at https://gitter.im/aboutcode-org/vulnerablecode Docs at https://vulnerablecode.readthedocs.org/
Stars: ✭ 269 (+448.98%)
Mutual labels:  cve, vulnerability-scanners
Hellraiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Stars: ✭ 413 (+742.86%)
Mutual labels:  vulnerability-scanners, cve
Ms17 010 scan
ms17_010的批量扫描工具
Stars: ✭ 23 (-53.06%)
Mutual labels:  vulnerability-scanners
Safety
Safety checks your installed dependencies for known security vulnerabilities
Stars: ✭ 982 (+1904.08%)
Mutual labels:  vulnerability-scanners
Secretscanner
Find secrets and passwords in container images and file systems
Stars: ✭ 895 (+1726.53%)
Mutual labels:  vulnerability-scanners
Atscan
Advanced dork Search & Mass Exploit Scanner
Stars: ✭ 817 (+1567.35%)
Mutual labels:  vulnerability-scanners
Whitewidow
SQL Vulnerability Scanner
Stars: ✭ 926 (+1789.8%)
Mutual labels:  vulnerability-scanners
Cve Api
Unofficial api for cve.mitre.org
Stars: ✭ 36 (-26.53%)
Mutual labels:  cve
Whour
Tool for information gathering, IPReverse, AdminFInder, DNS, WHOIS, SQLi Scanner with google.
Stars: ✭ 18 (-63.27%)
Mutual labels:  vulnerability-scanners
Labs
Vulnerability Labs for security analysis
Stars: ✭ 1,002 (+1944.9%)
Mutual labels:  cve
Pentest Tools Framework
Pentest Tools Framework is a database of exploits, Scanners and tools for penetration testing. Pentest is a powerful framework includes a lot of tools for beginners. You can explore kernel vulnerabilities, network vulnerabilities
Stars: ✭ 48 (-2.04%)
Mutual labels:  vulnerability-scanners
Regslscan
A tool for scanning registery key permissions. Find where non-admins can create symbolic links.
Stars: ✭ 39 (-20.41%)
Mutual labels:  vulnerability-scanners
Cve 2017 0065
Exploiting Edge's read:// urlhandler
Stars: ✭ 15 (-69.39%)
Mutual labels:  cve
Poccollect
Poc Collected for study and develop
Stars: ✭ 15 (-69.39%)
Mutual labels:  cve
Cve 2020 15906
Writeup of CVE-2020-15906
Stars: ✭ 39 (-20.41%)
Mutual labels:  cve

⚠️ This project is not maintained anymore! It is kept here only for reference. Use at your own risk. ⚠️

Inventory Vulnerability Analysis (IVA)

Index

Summary

IVA is a system (written in Python 3) to automate the process of finding possible vulnerabilities in software products installed inside an organization. It receives as input a list of software products (the inventory) in JSON format. Each JSON document contains three attributes: vendor, product, and version. IVA retrieves the software inventory from a GLPI database (GLPI is currently the only DB supported by IVA).

To find possible vulnerabilities for the software products, IVA employs the CPE dictionary and the CVE feeds. First, IVA provides a list of CPE candidates that match a software product. Once a CPE is assigned to a product, IVA searches for CVEs that possibly match the assigned CPE. IVA also generates alerts (in case the user confirms a CVE as match for a product) and allows to send, via SMTP, notifications about the vulnerable software.

Main Features

  • Software inventory import from GLPI
  • CPE and CVE support
  • Additional infos on matching CVEs by linking to a local copy of cve-search
  • CPE and CVE matching algorithms to semi-automatically find vulnerable software products
  • Matching algorithms based on the CPE Well-Formed Name (WFN) format
  • Automatic update of the CPE and CVE repositories
  • Usage via a web interface
  • LDAP support for user authentication
  • Notifications of vulnerable software via email (SMTP(S)) and GPG support
  • Implemented with Python 3, Django, and MongoDB

Index

Modules

IVA is basically composed of 8 modules: Inventory, CPE and CVE Database, Well-Formed Name Converter, CPE and CVE Matching, Alerts, Security, and Tasks Manager. In the following sections, each module is briefly explained.

Inventory

This module allows to read the software products from an inventory database (currently, IVA only supports GLPI database), and then, the information read about each software product is converted into JSON format, as shown in the following example:

{"id": "d6218a56203853300f4862ae8c23a103", "vendor": "Microsoft Corporation", "product": "Internet Explorer", "version": "8.0.7"}

The JSON documents of each software product are stored in the IVA database. The id attribute is the MD5 hash value of the vendor, product, and version. IVA uses the id to avoid creating a new document for a product that is already in the IVA database.

Index

Local Repositories

To carry out the CPE and CVE matching (see CPE and CVE Matching sections), IVA does not query the public CPE dictionary and the CVE feeds. Instead, it queries its local database which contains a copy of both repositories. To fetch the CPE dictionary and the CVE feeds from the NVD public repositories, IVA uses cve-search. Having a local copy of the CPE and CVE repositories allows a fast lookup when executing the CPE and CVE matching algorithms.

Tasks

To keep the local repositories updated, IVA defines three tasks:

  1. Daily DB Update This task is scheduled daily. It updates the local repositories (CPE and CVE) with the new entries fetched from the public repositories using cve-search. Thereafter, it performs a search of CVE matches for the software products which already have a CPE assigned.
  2. Populate DB This task is used to populate the local repositories when they are empty.
  3. Repopulate DB This task is used to repopulate the local repositories.

Index

Well-Formed Name (WFN) Converter

To facilitate the lookup of CPE candidates and possible CVE matches for a software product (see CPE and CVE Matching sections), this module converts the URI binding of a CPE into its well-formed name format. The conversion is based on the CPE Naming Specification Version 2.3. In the following, an example of a conversion is shown:

CPE URI binding:

cpe:/a:microsoft:internet_explorer:8.*::en~-~~windows~x86~

CPE WFN:

{"part": "a", "vendor": "microsoft", "product": "internet_explorer", "version": "8.*", "update": "ANY", "edition": "NA", "language": "en", "sw_edition": "ANY", "target_sw": "windows", "target_hw": "x86", "other": "ANY"}

Specially, this conversion is important when searching for CVE matches for a given CPE. When a CPE entry is modified (e.g., due to a typo) in the CPE Dictionary, the modification is not synchronized with the CVE feeds. This can prevent from finding the CVE entries that must otherwise match the modified CPE. This is the case when comparing the CPE URI binding of the CPE dictionary with the CPE URI binding of the CVE feeds. This can however be overcome with string matching algorithms that determine the similarity of two strings. However, if we apply such methods, we cannot establish which attributes (e.g., vendor, product, version) of both CPEs (CPE in the CPE dictionary and CPE in the CVE feed) are unequal.

On the other hand, by comparing both CPEs based on their WFNs, we can determine which attributes are unequal, and moreover, we can assign weights to the attributes. For example, the attributes vendor, product, and version should have higher weights than the attributes target_sw, target_hw, or other. In this way, we are able to calculate a more accurate similarity score. In addition, this method allows us to perform logical comparisons between two CPEs' versions. For example, the version 8.* is equal to 8.2.7, due to the special character *.

Index

CPE Matching

This module allows assigning a suitable CPE to a software product. To do this, IVA searches in the CPE collection (local copy of the CPE dictionary) for the best candidates that could match that software product. The selection of the CPE candidates is performed by comparing the software's information (vendor, product, and version) with the CPE entries' attributes (wfn.vendor, wfn.product, and wfn.version). This comparison is based on regular expressions, edit distance, and other string matching methods.

Once the user has selected a CPE for that software product, IVA adds the selected CPE (well-formed name and URI binding) to the software document. Following the example shown above, the resulting document after the CPE assignment is shown below:

{"id": "d6218a56203853300f4862ae8c23a103", "vendor": "Microsoft Corporation", "product": "Internet Explorer", "version": "8.0.7", "cpe": {"uri_binding": "cpe:/a:microsoft:internet_explorer:8.*", "wfn": {"part": "a", "vendor": "microsoft", "product": "internet_explorer", "version": "8.*", "update": "ANY", "edition": "ANY", "language": "ANY", "sw_edition": "ANY", "target_sw": "ANY", "target_hw": "ANY", "other": "ANY"}}

Index

CVE Matching

This module searches for possible CVE matches for a software product based on the product's CPE and the CPE entries of a CVE. If a CVE does not have any CPE entry, the search is carried out using the CVE description. The comparison of the CPE WFN attributes (or the CVE description) is based on regular expressions, edit distance, and other string matching methods.

After finding possible matches, they are added to the software document in a list with the key cve_matches, as shown in the example below. Each CVE match contains four elements:

  • cve_id CVE Identifier
  • cpe_entries CPE entries of the affected software products. However, only the entries that are relevant for the product of the inventory.
  • removed 0 means that the CVE was not yet discarded as a match, and 1 means the opposite.
  • positive 0 means that the CVE was not yet confirmed as a match, and 1 means the opposite.
{"id": "d6218a56203853300f4862ae8c23a103", "vendor": "Microsoft Corporation", "product": "Internet Explorer", "cpe": {"uri_binding": "cpe:/a:microsoft:internet_explorer:8.*:::de", "wfn": {"target_sw": "ANY", "sw_edition": "ANY", "version": "8.*", "vendor": "microsoft", "language": "de", "other": "ANY", "target_hw": "ANY", "part": "a", "edition": "ANY", "product": "internet_explorer", "update": "ANY"}}, "version": "8.0.7601.17514", "cve_matches": [{"removed": 0, "cpe_entries": ["cpe:/a:microsoft:internet_explorer:8"], "cve_id": "CVE-2008-2948", "positive": 0}, {"removed": 0, "cpe_entries": ["cpe:/a:microsoft:internet_explorer:8:beta2"], "cve_id": "CVE-2008-5551", "positive": 0}, {"removed": 0, "cpe_entries": ["cpe:/a:microsoft:internet_explorer:8:beta2"], "cve_id": "CVE-2008-5552", "positive": 0}, {"removed": 0, "cpe_entries": ["cpe:/a:microsoft:internet_explorer:8:beta2"], "cve_id": "CVE-2008-5553", "positive": 0}, {"removed": 0, "cpe_entries": ["cpe:/a:microsoft:internet_explorer:8:beta2"], "cve_id": "CVE-2008-5554", "positive": 0}]}

Index

Alerts

This module generates an alert when a user confirms that a CVE is a match for a software product. The alerts represent a list of vulnerable software in the inventory. In addition, this module allows sending notifications (via email) containing information about a vulnerable software.

Index

Security

This module assures that only authorized users can access the IVA system. To authenticate a user, this module queries the IVA database (local authentication) and verifies the user's credentials (username and password). Moreover, user authentication can be performed via LDAP (LDAP authentication). To use this method, the user must configure the LDAP options (see section Configuration) in order to query the LDAP directory.

Index

Installation

The following sections explain how to install IVA and its requirements. The installation steps were tested on CentOS 6.8. Installation on Ubuntu 14.04 LTS was also tested and works similarly, but is not documented here.

Source Code

Git is needed download the source code. To install it on CentOS, open a terminal and enter the following command as root:

yum install git

To download IVA, enter the following Git command from the directory where you want to install IVA (e.g., /usr/local/share):

git clone https://github.com/fkie-cad/iva.git

If you get a 401 error, try:

git clone https://[email protected]/fkie-cad/iva.git

Requirements

At the moment, Python3 and MongoDB must be installed manually on CentOS 6.8 as there are no yum packages available. Please refer to the respective installation instructions.

  1. Python 3
  2. MongoDB
  3. cve-search
  4. Python dependencies: To facilitate the installation of the Python dependencies, the source code is shipped with a requirements.txt file, which can be found in the root directory. To install the dependencies, execute the following pip 3 command:
    pip3 install -r requirements.txt
    

Installation Test

To test the installation, run the file main.py, which is located at the root directory of the source code, with the option test:

python3 main.py test

If all the requirements were installed correctly, IVA can now be accessed at: http://localhost:8080/iva/index.html. To log into the IVA system, use the credentials that were printed in the terminal. Alternatively, you can find the credentials in ./user_authentication/dummy_user_credentials.txt.

The installation test modus allow you to test some functionalities of IVA. For example, if you go to new software (this option is shown on the menu of the IVA web interface), you will see a list of software products without assigned CPEs. By clicking on the search icon of a product, you can search CPE candidates for that product. You can assign a suitable CPE for that product and then search CVEs for it. If you click on the option software with CPE, you will see a list of products that already have CPEs assigned to them.

Configuration Remarks

In some cases, in order to test the installation, some configuration options must be modified in ./dummy/config.ini.

Frontend: If localhost:8080 does not match with your setup (e.g., you installed IVA on a virtual machine, but you want to access it from your host machine), the following options must be configured:

[frontend]

  • host= host name of IVA web interface (e.g., 192.168.56.101).
  • port= port of IVA web interface (e.g., 8080).

Database Authentication: If MongoDB authentication is required, the following options must be configured:

[database]

  • authentication= This option must be set to 1.
  • user= Username of the user granted to read and write the IVA database.
  • password= Password of the user granted to read and write the IVA database.

Index

Tests

IVA is delivered with a set of UnitTests, which can be executed from the root directory of the IVA source code with the following command:

python3 -m unittest discover -s tests

Index

Usage

The following sections explain how to use the main functionalities of IVA.

Start IVA

To start IVA, run main.py which can be found in the root directory of the source code:

python3 main.py

The first time you run IVA, a user is created so that you can log in. The credentials (username and password) of this user are saved in ./user_authentication/dummy_user_credentials.txt. After the first login, we recommend you to create a new user (see Users), delete the dummy user, and delete the file ./user_authentication/dummy_user_credentials.txt.

Log in

IVA is accessed via its web interface. To log in, open a web browser and go to:

http://host:port/iva/sign_in.html  

Replace host and port with the information you provided in the section [frontend] of config.ini (see section Configuration).

After providing your credentials in the login form, IVA verifies whether the entered information is valid. This is done by searching the user in the local database or via LDAP. If you want to use LDAP, you must configure the section [ldap] of config.ini (see Section Configuration).

Read Inventory

To read the software inventory from the GLPI database, from the IVA web interface, select the option New Software of the main menu, and then click on the GLPI icon. Note that, to be able to read the inventory, you must first configure the section [inventory-database] of config.ini (see section Configuration).

Populate Local Repositories

To populate the local repositories (CPE dictionary and CVE feeds), click on the option Local Repositories of the main menu, and then press the Populate button. If this button is not available, it means that the repositories were already populated. In this case, you will see the Repopulate button.

Daily Repository Update

To schedule a daily update of the CPE dictionary and CVE feeds, select the option Local Repositories of the main menu. On the section Daily Update, click on the clock icon to activate the daily update. The task is activated when the clock icon does not have a red circle on it. To change the schedule time, click on the change execution time icon and enter the time you want the update to be executed.

Assign CPE

To assign a CPE to a software product, select the option New Software in the main menu. On this page, you will see a list of software products which don't have a CPE yet. Then, click on the Search icon of the software product you want to assign a CPE to. IVA will search CPEs that could match the software product. Once you selected a suitable CPE, press the button Assign CPE. If none of the CPE candidates completely match the software product, you can edit the CPE attributes (e.g., version, update, edition).

The CPEs of software products can be modified from Software with CPE. On this page, you will see a list of products that have a CPE already. To edit one, click on the Edit CPE icon.

Search CVE Matches

To search CVE matches for a software product, click on the option Software with CPE in the main menu and then click on the Search icon of the product you want to search CVEs for. If you already configured the daily repository update, the search of CVEs for each software product with CPE is performed daily.

Process CVE Matches

To see all the CVE matches, click on the option CVE Matches in the main menu. On this page, you see all the found matches for the software products with assigned CPEs. Here, you can confirm a CVE match (you are sure that the vulnerability corresponds to the software product) or you can remove the CVE match (you are sure that the CVE is not a match for the software product). When you confirm a CVE match, an alert is generated.

Process Alerts

To see all the alerts that have been generated, click on the option Alerts in the main menu. On this page, the following actions can be performed:

  • Change Alert Status An alert can have the following status:
    • New The alert was generated due to the confirmation of a CVE match (see CVE Matches). This status can be changed to Closed or Removed.
    • Closed The alert was was closed, for example, because the software product was patched or uninstalled, thus it is not longer in the inventory. This status can be changed to New or Removed.
    • Removed If an alert was mistakenly generated, you can set its status to removed.
  • Send Notification To send a notification (via Email) of the vulnerable software product, click on the notify icon. To use this functionality, you must configure the section [smtp] of config.ini (see Section Configuration).

Manage Users

To manage (add new, modify, remove or change password) the users that are allowed to access to the system, select the option Users in the main menu. On this page, a list of the users is provided. Since IVA supports user authentication via LDAP, these are not the only users that can access the system.

Index

Configuration

Before using IVA, the following options must be configured. The configuration file (config.ini) is found at the root directory of the source code.

[database] In this section, the configuration used to access the MongoDB database is provided

host host name or IP of the computer where the MongoDB service is listening (e.g., localhost)

port port at where the MongoDB service is listening. The default is 27017. For mor information about MongoDB configuration see MongoDB documentation

name name of the IVA database (e.g., iva)

authentication This option must be set to 1 when MongoDB authentication is required

user Username of the user granted to read and write the IVA database

password Password of the user granted to read and write the IVA database

[inventory-database] In this section, the options to access the GLPI inventory database (MySql) are given

host host name or IP of the computer where the MySql server is listening

user user name to access the GLPI database

password password of the configured user to access the GLPI database

name name of the GLPI database (default name is glpi)

[frontend] IVA is accessed via its web frontend. In this section, the host and port of the HTTP server that receives the requests for IVA are configured. For example, if the host is localhost and the port 8080, then IVA is accessed at http://localhost:8080/iva/index.html

host host name or IP at where the HTTP server is listening (e.g., 127.0.0.1)

port port at where the HTTP server is listening (e.g., 8080)

[cve-search] IVA uses cve-search to synchronize its local repositories with the public CPE and CVE repositories. In this section, the configuration to use cve-search is provided

dir directory where the cve-search tool is installed (e.g., /usr/local/share/cve-search)

db name of the cve-search database. The default name is cvedb. For more information see cve-search Configuration

url url to access the cve-search web interface (e.g., http://192.168.56.125:5000). For more information see cve-search Configuration

[smtp] IVA allows sending emails (notifications) when a software product is confirmed to be vulnerable. In this section, options to send emails via SMTP are configured

host host name or IP of the SMTP server

port port number at which the SMTP server is listening (normally SMTP uses port 25)

user user name for authentication with the server

password password for authentication with the server

sender Email address of the sender (e.g., [email protected])

receiver Email address of the receiver (e.g., [email protected])

smtps to enable SMTPS (SMTP over TLS/SSL), this option must be set to 1. Note that you need also to configure the port (normally SMTPS listing on port 465).

starttls to enable STARTTLS (method to upgrade SMTP insecure connections to TLS RFC3207), this option must be set to 1. Note that if the option smtps is set to 1, starttls is not considered. SMTPS is preferred

verify_server_cert if this option is set to 1, the SSL/TLS certificate of the SMTP server is verified with the CA certificate provided in the option ca_cert_file. Note that this option can be used with both smtps and starttls

ca_cert_file path to the CA certificate (in PEM format) used to verify the server certificate (e.g. /usr/local/share/iva/ssl/smtp/ca_cert.pem)

[gpg] IVA allows encrypting (with GPG) the notifications that are sent when a software product is vulnerable. In this section, the GPG options are configured

required to activate GPG encryption, this option must be set to 1

home_dir directory where GPG stores its keyring (e.g., /usr/local/share/iva/gpg). Note that is not necessary to generate a key pair for IVA, since the notifications are only encrypted with the public key of the receiver. The notifications are not signed

pub_key_file path to the public key of the receiver (e.g., /usr/local/share/iva/gpg/0xF4G24G5Q.asc)

[ldap] Access to IVA system can be also granted via LDAP. In this section, the LDAP configuration is provided

host host name or IP of the LDAP server

port port number at which the SMTP server is listening. Normally, for insecure connections (no TLS) the port 389 is used, and 636 for TLS connections (LDAPS). However, by using the method StartTLS, it is possible to secure connections handled at port 389. IVA supports this method, when the option tls is activated

base_dn This option indicates the LDAP server where to find the user in the LDAP directory. (e.g., ou=users,dc=my-ldap-server,dc=com)

tls to activate the StartTLS method set the value 1

cacert When TLS is activated, the authenticity of the LDAP server must be verified. To do this, the path to the CA certificate, with which the certificate of the LDAP server is signed, is provided here (e.g., /etc/ssl/certs/cacert.pem)

[logging]

file path of the IVA logging file (/var/log/iva.log)

cve-search Configuration

cve-search comes with a configuration file example: cve-search/etc/configuration.ini.sample. To use this configuration rename the file to configuration.ini. In addition, the following options must be configured:

[Mongo] if the MongoDB authentication is required, the following options must be added and configured:

Username username of the user granted to read and write the cve-search database

Password password of the user granted to read and write the cve-search database

DB this value must be the same as the value of db in section [cve-search] in the IVA configuration

[Webserver]

Host host name or IP at where the HTTP server of cve-search is listening (e.g., 127.0.0.1)

Port port at where the HTTP server of cve-search is listening (e.g., 5000)

Index

Contact

Luis Alberto Benthin Sanguino

[email protected]

Index

License

Copyright 2017 Fraunhofer FKIE

IVA is free software: you can redistribute it and/or modify it under the terms of the GNU Lesser General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.

IVA is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Lesser General Public License for more details.

IVA source code is shipped with a copy of the GNU Lesser General Public License (see COPYING and COPYING.LESSER). If not, see http://www.gnu.org/licenses/.

Index

References

[1] GLPI

[2] cve-search

Index

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].