2012-06-29 05:18:28 +00:00
|
|
|
# -*- coding: binary -*-
|
2012-05-14 23:40:08 +00:00
|
|
|
require "rex/parser/nokogiri_doc_mixin"
|
|
|
|
|
|
|
|
module Rex
|
|
|
|
module Parser
|
|
|
|
|
2013-08-30 21:28:33 +00:00
|
|
|
# If Nokogiri is available, define OpenVAS document class.
|
|
|
|
load_nokogiri && class OpenVASDocument < Nokogiri::XML::SAX::Document
|
|
|
|
|
|
|
|
include NokogiriDocMixin
|
|
|
|
|
|
|
|
# ourselves with the @state variable, turning things on when we
|
|
|
|
# get here (and turning things off when we exit in end_element()).
|
|
|
|
def start_element(name=nil,attrs=[])
|
|
|
|
attrs = normalize_attrs(attrs)
|
|
|
|
block = @block
|
|
|
|
@state[:current_tag][name] = true
|
|
|
|
case name
|
|
|
|
when "host"
|
|
|
|
@state[:has_text] = true
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
# When we exit a tag, this is triggered.
|
|
|
|
def end_element(name=nil)
|
|
|
|
block = @block
|
|
|
|
case name
|
|
|
|
when "name"
|
|
|
|
return if not in_tag("result")
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:vuln_name] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
when "description"
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:vuln_desc] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
when "bid"
|
|
|
|
return if not in_tag("result")
|
|
|
|
return if not in_tag("nvt")
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:bid] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
when "cve"
|
|
|
|
return if not in_tag("result")
|
|
|
|
return if not in_tag("nvt")
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:cves] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
when "risk_factor"
|
|
|
|
return if not in_tag("result")
|
|
|
|
return if not in_tag("nvt")
|
|
|
|
|
|
|
|
#we do this to clean out the buffer so to speak
|
|
|
|
#if we don't set text to nil now, the text will show up later
|
|
|
|
@state[:has_text] = true
|
|
|
|
@text = nil
|
|
|
|
when "cvss_base"
|
|
|
|
return if not in_tag("result")
|
|
|
|
return if not in_tag("nvt")
|
|
|
|
@state[:has_text] = true
|
|
|
|
@text = nil
|
|
|
|
when "subnet"
|
|
|
|
@state[:has_text] = true
|
|
|
|
@text = nil
|
|
|
|
when "result"
|
|
|
|
return if not in_tag("results")
|
|
|
|
record_vuln
|
|
|
|
when "threat"
|
|
|
|
return if not in_tag("ports")
|
|
|
|
return if not in_tag("port")
|
|
|
|
@state[:has_text] = true
|
|
|
|
|
|
|
|
if not @text.index('(')
|
|
|
|
@state[:name] = nil
|
|
|
|
@state[:port] = nil
|
|
|
|
@state[:proto] = nil
|
|
|
|
@text = nil
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
@state[:name] = @text.split(' ')[0] if @text
|
|
|
|
@state[:port] = @text.split('(')[1].split('/')[0] if @text
|
|
|
|
@state[:proto] = @text.split('(')[1].split('/')[1].split(')')[0] if @text
|
|
|
|
|
|
|
|
@text = nil
|
|
|
|
when "host"
|
|
|
|
if in_tag('result')
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:host] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
elsif in_tag('ports')
|
|
|
|
return if not in_tag('port')
|
|
|
|
@state[:has_text] = true
|
|
|
|
@state[:host] = @text.strip if @text
|
|
|
|
@text = nil
|
|
|
|
end
|
|
|
|
when "port"
|
|
|
|
if in_tag('result')
|
|
|
|
@state[:has_text] = true
|
|
|
|
if not @text.index('(')
|
|
|
|
@state[:proto] = nil
|
|
|
|
@state[:port] = nil
|
|
|
|
@text = nil
|
|
|
|
return
|
|
|
|
end
|
|
|
|
@state[:proto] = @text.split('(')[0].strip if @text
|
|
|
|
@state[:port] = @text.split('(')[1].split('/')[0].gsub(/\)/, '') if @text
|
|
|
|
@text = nil
|
|
|
|
elsif in_tag('ports')
|
|
|
|
record_service
|
|
|
|
end
|
|
|
|
when "name"
|
|
|
|
return if not in_tag("result")
|
|
|
|
@state[:has_text] = true
|
|
|
|
@text = nil
|
|
|
|
end
|
|
|
|
@state[:current_tag].delete name
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_vuln
|
|
|
|
if (@state[:cves] and @state[:cves] == "NOCVE") and (@state[:bid] and @state[:bid] == "NOBID")
|
|
|
|
return
|
|
|
|
end
|
|
|
|
|
|
|
|
if @state[:cves] and @state[:cves] != "NOCVE" and !@state[:cves].empty?
|
|
|
|
@state[:cves].split(',').each do |cve|
|
|
|
|
vuln_info = {}
|
|
|
|
vuln_info[:host] = @state[:host]
|
|
|
|
vuln_info[:refs] = normalize_references([{ :source => "CVE", :value => cve}])
|
|
|
|
vuln_info[:name] = @state[:vuln_name]
|
|
|
|
vuln_info[:info] = @state[:vuln_desc]
|
|
|
|
vuln_info[:port] = @state[:port]
|
|
|
|
vuln_info[:proto] = @state[:proto]
|
|
|
|
|
|
|
|
db_report(:vuln, vuln_info)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
if @state[:bid] and @state[:bid] != "NOBID" and !@state[:bid].empty?
|
|
|
|
@state[:bid].split(',').each do |bid|
|
|
|
|
vuln_info = {}
|
|
|
|
vuln_info[:host] = @state[:host]
|
|
|
|
vuln_info[:refs] = normalize_references([{ :source => "BID", :value => bid}])
|
|
|
|
vuln_info[:name] = @state[:vuln_name]
|
|
|
|
vuln_info[:info] = @state[:vuln_desc]
|
|
|
|
vuln_info[:port] = @state[:port]
|
|
|
|
vuln_info[:proto] = @state[:proto]
|
|
|
|
|
|
|
|
db_report(:vuln, vuln_info)
|
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|
|
|
|
def record_service
|
|
|
|
return if not @state[:name]
|
|
|
|
|
|
|
|
service_info = {}
|
|
|
|
service_info[:host] = @state[:host]
|
|
|
|
service_info[:name] = @state[:name]
|
|
|
|
service_info[:port] = @state[:port]
|
|
|
|
service_info[:proto] = @state[:proto]
|
|
|
|
|
|
|
|
db_report(:service, service_info)
|
|
|
|
|
|
|
|
host_info = {}
|
|
|
|
host_info[:host] = @state[:host]
|
|
|
|
|
|
|
|
db_report(:host, host_info)
|
|
|
|
end
|
2012-05-14 23:40:08 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|
|
|
|
|