Skip to content

Commit

Permalink
feature: unified advisor context; different keycloak inventories;
Browse files Browse the repository at this point in the history
  • Loading branch information
karsten-klein committed Sep 9, 2024
1 parent 9dc25f3 commit c272e1e
Show file tree
Hide file tree
Showing 47 changed files with 49 additions and 365 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: external attacker
category: external threat
score: 3.0
notes: An adversary may attempt to attack the system from remote. The adversary may modify / reconfigure existing code or introduce code from remote.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: information disclosure
category: confidentiality threat
score: 2.0
notes: Confidential or restricted information may be exposed to an adversary. The adversary gains unauthorized access.
min:
- amount: 1
keywords:
Expand All @@ -10,10 +11,17 @@ sets:
- leaking credential
- leaked credential
- leaked credentials
- leaking secret
- leaked secret
- leaked secrets
- credential leak
- credentials leak
- exposed credantial
- exposed credential
- credential exposed
- credentials exposed
- readable by unauthorized
- readable by unauthorised
- information leak
- privacy leak
- data leak
- data leakage
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: malicious content
category: integrity threat
score: 3.0
notes: An adversary may attempt to inject executable code or drafted messages to destabilize or compromise the system.
min:
- amount: 1
keywords:
Expand All @@ -13,5 +14,8 @@ sets:
- XML External Entity Injection
- XML Entity Expansion
- XXE
- specifically crafted request
- specifically crafted conent
- crafted request
- crafted content
- crafted document
- crafted PDF
- crafted HTML
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: privilege escalation
category: general threat
score: 3.0
notes: An adversary may gain further privileges and gain unauthorized access to the system or services.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: request forgery
category: external threat
score: 2.0
notes: An adversary may attempt to gain access to information and spoof a user.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,6 +1,7 @@
sets:
- name: resource exemption
category: external threat
notes: An adversary may attempt to exhaust resources of the system compromising performance objectives and availability.
score: 1.0
min:
- amount: 1
Expand Down
17 changes: 0 additions & 17 deletions advisors/example-advisor/context/CTX_malicious-content.yaml

This file was deleted.

14 changes: 0 additions & 14 deletions advisors/example-advisor/context/CTX_privilege-escalation.yaml

This file was deleted.

10 changes: 0 additions & 10 deletions advisors/example-advisor/context/CTX_request-forgery.yaml

This file was deleted.

5 changes: 0 additions & 5 deletions advisors/example-advisor/context/README.md

This file was deleted.

Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
8 changes: 5 additions & 3 deletions advisors/keycloak-advisor/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -13,9 +13,11 @@
<packaging>jar</packaging>

<properties>
<input.inventory>${project.basedir}/inventory/ae-example-keycloak-25.0.0.xlsx</input.inventory>
<version.selector>24.0.5</version.selector>

<dashboard.title>Keycloak</dashboard.title>
<input.inventory>${project.basedir}/inventory/keycloak-extractor-inventory-${version.selector}.xlsx</input.inventory>

<dashboard.title>Keycloak ${version.selector}</dashboard.title>
<dashboard.subtitle>Vulnerability Assessment Dashboard</dashboard.subtitle>
<dashboard.footer>Demo Dashboard for Keycloak</dashboard.footer>
</properties>
Expand All @@ -30,7 +32,7 @@
<groupId>org.metaeffekt.core</groupId>
<artifactId>ae-inventory-maven-plugin</artifactId>
</plugin>
<!-- FIXME: fix plugins; remove configuration on project level -->
<!-- FIXME: fix plugins (do not apply on poms); remove configuration on project level -->
<plugin>
<groupId>com.metaeffekt.artifact.analysis</groupId>
<artifactId>ae-inventory-enrichment-plugin</artifactId>
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: external attacker
category: external threat
score: 3.0
notes: An adversary may attempt to attack the system from remote. The adversary may modify / reconfigure existing code or introduce code from remote.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: information disclosure
category: confidentiality threat
score: 2.0
notes: Confidential or restricted information may be exposed to an adversary. The adversary gains unauthorized access.
min:
- amount: 1
keywords:
Expand All @@ -10,10 +11,17 @@ sets:
- leaking credential
- leaked credential
- leaked credentials
- leaking secret
- leaked secret
- leaked secrets
- credential leak
- credentials leak
- exposed credantial
- exposed credential
- credential exposed
- credentials exposed
- readable by unauthorized
- readable by unauthorised
- information leak
- privacy leak
- data leak
- data leakage
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: malicious content
category: integrity threat
score: 3.0
notes: An adversary may attempt to inject executable code or drafted messages to destabilize or compromise the system.
min:
- amount: 1
keywords:
Expand All @@ -13,5 +14,8 @@ sets:
- XML External Entity Injection
- XML Entity Expansion
- XXE
- specifically crafted request
- specifically crafted conent
- crafted request
- crafted content
- crafted document
- crafted PDF
- crafted HTML
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: privilege escalation
category: general threat
score: 3.0
notes: An adversary may gain further privileges and gain unauthorized access to the system or services.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -2,6 +2,7 @@ sets:
- name: request forgery
category: external threat
score: 2.0
notes: An adversary may attempt to gain access to information and spoof a user.
min:
- amount: 1
keywords:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,7 +1,7 @@
sets:
- name: resource exemption
category: external threat
notes: The adversary may attempt to exhaust resources of the application service by injecting foreign log messages.
notes: An adversary may attempt to exhaust resources of the system compromising performance objectives and availability.
score: 1.0
min:
- amount: 1
Expand Down
Binary file not shown.
2 changes: 1 addition & 1 deletion advisors/keycloak-contextualized-advisor/pom.xml
Original file line number Diff line number Diff line change
Expand Up @@ -15,7 +15,7 @@
<properties>
<input.inventory>${project.basedir}/inventory/ae-example-keycloak-25.0.0.xlsx</input.inventory>

<dashboard.title>Keycloak</dashboard.title>
<dashboard.title>Keycloak 25.0.0</dashboard.title>
<dashboard.subtitle>Vulnerability Assessment Dashboard</dashboard.subtitle>
<dashboard.footer>Demo Dashboard for Keycloak</dashboard.footer>
</properties>
Expand Down
5 changes: 0 additions & 5 deletions advisors/openssl-1.1-advisor/assessment/README.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,3 @@
# Vulnerability Assessment

The `assessment` folder container yaml files that contain context-specific assessment information.

The example uses an assessment of CVE-2021-44228 (here as an applicable vulnerability) and CVE-2021-45046 as
vulnerability that is not applicable, because the affected MDC feature is not used in this context.

The example is artifical and meant to illustrate the different options for vulnerability assessment.
20 changes: 0 additions & 20 deletions advisors/openssl-1.1-advisor/assessment/baseline.yaml_

This file was deleted.

21 changes: 0 additions & 21 deletions advisors/openssl-1.1-advisor/context/CTX_external-attackers.yaml

This file was deleted.

This file was deleted.

14 changes: 0 additions & 14 deletions advisors/openssl-1.1-advisor/context/CTX_resource-exemption.yaml

This file was deleted.

5 changes: 0 additions & 5 deletions advisors/openssl-3.0-advisor/assessment/README.md
Original file line number Diff line number Diff line change
@@ -1,8 +1,3 @@
# Vulnerability Assessment

The `assessment` folder container yaml files that contain context-specific assessment information.

The example uses an assessment of CVE-2021-44228 (here as an applicable vulnerability) and CVE-2021-45046 as
vulnerability that is not applicable, because the affected MDC feature is not used in this context.

The example is artifical and meant to illustrate the different options for vulnerability assessment.
20 changes: 0 additions & 20 deletions advisors/openssl-3.0-advisor/assessment/baseline.yaml_

This file was deleted.

21 changes: 0 additions & 21 deletions advisors/openssl-3.0-advisor/context/CTX_external-attackers.yaml

This file was deleted.

Loading

0 comments on commit c272e1e

Please sign in to comment.