-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
revised; enabling openssl advisors with different versions
- Loading branch information
1 parent
47b96c4
commit bac6a79
Showing
35 changed files
with
509 additions
and
229 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -14,5 +14,7 @@ history: | |
|
||
scope: inventory | ||
|
||
cvssV3: MAV:A/MAC:H | ||
cvssV2: AV:A | ||
cvssV3: | ||
lower: MAV:A/MAC:H | ||
cvssV2: | ||
lower: AV:A |
File renamed without changes.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
history: | ||
- rationale: | ||
"<p> | ||
The application services are operated in an isolated network. No direct access from the external adversaries | ||
shall be possible. | ||
</p> | ||
<p> | ||
The CVSS vectors have been adjusted to expect that an adversary must have access to the network the | ||
application service are deployed (MAV:A; AV:A). Additional privileges are required (MAC:H) as the adversary | ||
must have already passed the gateway-level security perimeter or the physical protection of the data center. | ||
</p>" | ||
date: 2024-08-24 | ||
author: KKL | ||
|
||
scope: inventory | ||
|
||
cvssV3: | ||
lower: MAV:A/MAC:H | ||
cvssV2: | ||
lower: AV:A |
21 changes: 21 additions & 0 deletions
21
advisors/openssl-1.1-advisor/context/CTX_external-attackers.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
sets: | ||
- name: external attacker | ||
category: external threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- external attacker | ||
- external attackers | ||
- external adversary | ||
- external adversaries | ||
- external user | ||
- remote attacker | ||
- remote attackers | ||
- remote adversary | ||
- remote adversaries | ||
- remote code execution | ||
- remote code executions | ||
- RCE | ||
- execute arbitrary code | ||
- initiate the attack remotely |
19 changes: 19 additions & 0 deletions
19
advisors/openssl-1.1-advisor/context/CTX_information-disclosure.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
sets: | ||
- name: information disclosure | ||
category: confidentiality threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- information disclosure | ||
- making private services on the VM accessible to the network | ||
- leaking credential | ||
- leaked credential | ||
- leaked credentials | ||
- credential leak | ||
- credentials leak | ||
- exposed credantial | ||
- credential exposed | ||
- credentials exposed | ||
- readable by unauthorized | ||
- readable by unauthorised |
17 changes: 17 additions & 0 deletions
17
advisors/openssl-1.1-advisor/context/CTX_malicious-content.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
sets: | ||
- name: malicious content | ||
category: integrity threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- request smuggling | ||
- missing input validation | ||
- SQL injection | ||
- sql injection | ||
- sql-injection | ||
- XML External Entity Injection | ||
- XML Entity Expansion | ||
- XXE | ||
- specifically crafted request | ||
- specifically crafted conent |
14 changes: 14 additions & 0 deletions
14
advisors/openssl-1.1-advisor/context/CTX_privilege-escalation.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
sets: | ||
- name: privilege escalation | ||
category: general threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- privilege escalation | ||
- jailbreak | ||
- container escape | ||
- to access any other file | ||
- arbitrary code execution | ||
- allows unauthorized acccess | ||
- allows unauthorised acccess |
10 changes: 10 additions & 0 deletions
10
advisors/openssl-1.1-advisor/context/CTX_request-forgery.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
sets: | ||
- name: request forgery | ||
category: external threat | ||
score: 2.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- cross-site request forgery | ||
- CSFR | ||
- forge requests |
14 changes: 14 additions & 0 deletions
14
advisors/openssl-1.1-advisor/context/CTX_resource-exemption.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
sets: | ||
- name: resource exemption | ||
category: external threat | ||
score: 1.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- resource consumption | ||
- resource exemption | ||
- denial of service | ||
- denial of service attacks | ||
- connection pool exhaustion | ||
- memory leak | ||
- resource leak |
2 changes: 0 additions & 2 deletions
2
advisors/openssl-advisor/context/README.md → ...ors/openssl-1.1-advisor/context/README.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,5 +1,3 @@ | ||
# Vulnerability Context Definition | ||
|
||
Within the folder `context` configurations can be places that help to prioritize vulnerabilities on a general level. | ||
|
||
Currently, no context information is provided. |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,50 @@ | ||
<?xml version="1.0" encoding="UTF-8"?> | ||
<project xmlns="http://maven.apache.org/POM/4.0.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" | ||
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven.apache.org/maven-v4_0_0.xsd"> | ||
<modelVersion>4.0.0</modelVersion> | ||
|
||
<parent> | ||
<groupId>org.metaeffekt.example.documentation</groupId> | ||
<artifactId>ae-advisors</artifactId> | ||
<version>1.0.0-SNAPSHOT</version> | ||
</parent> | ||
|
||
<artifactId>ae-openssl-1.1-advisor</artifactId> | ||
<packaging>jar</packaging> | ||
|
||
<properties> | ||
<input.inventory>${project.basedir}/inventory/openssl-inventory.xls</input.inventory> | ||
|
||
<dashboard.title>OpenSSL-1.1.1o</dashboard.title> | ||
<dashboard.subtitle>Vulnerability Assessment Dashboard</dashboard.subtitle> | ||
<dashboard.footer>Demo Dashboard for OpenSSL-1.1.1o</dashboard.footer> | ||
</properties> | ||
|
||
<build> | ||
<plugins> | ||
<plugin> | ||
<groupId>org.apache.maven.plugins</groupId> | ||
<artifactId>maven-dependency-plugin</artifactId> | ||
</plugin> | ||
<plugin> | ||
<groupId>org.metaeffekt.core</groupId> | ||
<artifactId>ae-inventory-maven-plugin</artifactId> | ||
</plugin> | ||
<!-- FIXME: fix plugins; remove configuration on project level --> | ||
<plugin> | ||
<groupId>com.metaeffekt.artifact.analysis</groupId> | ||
<artifactId>ae-inventory-enrichment-plugin</artifactId> | ||
</plugin> | ||
</plugins> | ||
</build> | ||
|
||
<dependencies> | ||
<dependency> | ||
<groupId>org.metaeffekt.example.documentation</groupId> | ||
<artifactId>ae-inventory-extractor</artifactId> | ||
<version>${project.version}</version> | ||
<scope>provided</scope> | ||
</dependency> | ||
</dependencies> | ||
|
||
</project> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,8 @@ | ||
# Vulnerability Assessment | ||
|
||
The `assessment` folder container yaml files that contain context-specific assessment information. | ||
|
||
The example uses an assessment of CVE-2021-44228 (here as an applicable vulnerability) and CVE-2021-45046 as | ||
vulnerability that is not applicable, because the affected MDC feature is not used in this context. | ||
|
||
The example is artifical and meant to illustrate the different options for vulnerability assessment. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,20 @@ | ||
history: | ||
- rationale: | ||
"<p> | ||
The application services are operated in an isolated network. No direct access from the external adversaries | ||
shall be possible. | ||
</p> | ||
<p> | ||
The CVSS vectors have been adjusted to expect that an adversary must have access to the network the | ||
application service are deployed (MAV:A; AV:A). Additional privileges are required (MAC:H) as the adversary | ||
must have already passed the gateway-level security perimeter or the physical protection of the data center. | ||
</p>" | ||
date: 2024-08-24 | ||
author: KKL | ||
|
||
scope: inventory | ||
|
||
cvssV3: | ||
lower: MAV:A/MAC:H | ||
cvssV2: | ||
lower: AV:A |
21 changes: 21 additions & 0 deletions
21
advisors/openssl-3.0-advisor/context/CTX_external-attackers.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,21 @@ | ||
sets: | ||
- name: external attacker | ||
category: external threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- external attacker | ||
- external attackers | ||
- external adversary | ||
- external adversaries | ||
- external user | ||
- remote attacker | ||
- remote attackers | ||
- remote adversary | ||
- remote adversaries | ||
- remote code execution | ||
- remote code executions | ||
- RCE | ||
- execute arbitrary code | ||
- initiate the attack remotely |
19 changes: 19 additions & 0 deletions
19
advisors/openssl-3.0-advisor/context/CTX_information-disclosure.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
sets: | ||
- name: information disclosure | ||
category: confidentiality threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- information disclosure | ||
- making private services on the VM accessible to the network | ||
- leaking credential | ||
- leaked credential | ||
- leaked credentials | ||
- credential leak | ||
- credentials leak | ||
- exposed credantial | ||
- credential exposed | ||
- credentials exposed | ||
- readable by unauthorized | ||
- readable by unauthorised |
17 changes: 17 additions & 0 deletions
17
advisors/openssl-3.0-advisor/context/CTX_malicious-content.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,17 @@ | ||
sets: | ||
- name: malicious content | ||
category: integrity threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- request smuggling | ||
- missing input validation | ||
- SQL injection | ||
- sql injection | ||
- sql-injection | ||
- XML External Entity Injection | ||
- XML Entity Expansion | ||
- XXE | ||
- specifically crafted request | ||
- specifically crafted conent |
14 changes: 14 additions & 0 deletions
14
advisors/openssl-3.0-advisor/context/CTX_privilege-escalation.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
sets: | ||
- name: privilege escalation | ||
category: general threat | ||
score: 3.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- privilege escalation | ||
- jailbreak | ||
- container escape | ||
- to access any other file | ||
- arbitrary code execution | ||
- allows unauthorized acccess | ||
- allows unauthorised acccess |
10 changes: 10 additions & 0 deletions
10
advisors/openssl-3.0-advisor/context/CTX_request-forgery.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,10 @@ | ||
sets: | ||
- name: request forgery | ||
category: external threat | ||
score: 2.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- cross-site request forgery | ||
- CSFR | ||
- forge requests |
14 changes: 14 additions & 0 deletions
14
advisors/openssl-3.0-advisor/context/CTX_resource-exemption.yaml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,14 @@ | ||
sets: | ||
- name: resource exemption | ||
category: external threat | ||
score: 1.0 | ||
min: | ||
- amount: 1 | ||
keywords: | ||
- resource consumption | ||
- resource exemption | ||
- denial of service | ||
- denial of service attacks | ||
- connection pool exhaustion | ||
- memory leak | ||
- resource leak |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
# Vulnerability Context Definition | ||
|
||
Within the folder `context` configurations can be places that help to prioritize vulnerabilities on a general level. |
Binary file not shown.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
Oops, something went wrong.