rename qualys modules to be more accurate
This commit is contained in:
@ -18,7 +18,7 @@ class qualysWhisperAPI(object):
|
||||
self.logger = logging.getLogger('qualysWhisperAPI')
|
||||
self.config = config
|
||||
try:
|
||||
self.qgc = qualysapi.connect(config, 'qualys_vuln')
|
||||
self.qgc = qualysapi.connect(config, 'qualys_vm')
|
||||
# Fail early if we can't make a request or auth is incorrect
|
||||
self.qgc.request('about.php')
|
||||
self.logger.info('Connected to Qualys at {}'.format(self.qgc.server))
|
@ -38,7 +38,7 @@ class qualysWhisperAPI(object):
|
||||
self.logger = logging.getLogger('qualysWhisperAPI')
|
||||
self.config = config
|
||||
try:
|
||||
self.qgc = qualysapi.connect(config, 'qualys_web')
|
||||
self.qgc = qualysapi.connect(config, 'qualys_was')
|
||||
self.logger.info('Connected to Qualys at {}'.format(self.qgc.server))
|
||||
except Exception as e:
|
||||
self.logger.error('Could not connect to Qualys: {}'.format(str(e)))
|
||||
@ -46,7 +46,7 @@ class qualysWhisperAPI(object):
|
||||
#"content-type": "text/xml"}
|
||||
"Accept" : "application/json",
|
||||
"Content-Type": "application/json"}
|
||||
self.config_parse = qcconf.QualysConnectConfig(config, 'qualys_web')
|
||||
self.config_parse = qcconf.QualysConnectConfig(config, 'qualys_was')
|
||||
try:
|
||||
self.template_id = self.config_parse.get_template_id()
|
||||
except:
|
@ -37,16 +37,16 @@ class mockAPI(object):
|
||||
body=open('{}/{}/{}'.format(self.mock_dir, framework, filename)).read()
|
||||
)
|
||||
|
||||
def qualys_vuln_callback(self, request, uri, response_headers):
|
||||
def qualys_vm_callback(self, request, uri, response_headers):
|
||||
self.logger.info('Simulating response for {} ({})'.format(uri, request.body))
|
||||
if 'list' in request.parsed_body['action']:
|
||||
return [200,
|
||||
response_headers,
|
||||
open(self.qualys_vuln_path + '/scans').read()]
|
||||
open(self.qualys_vm_path + '/scans').read()]
|
||||
elif 'fetch' in request.parsed_body['action']:
|
||||
try:
|
||||
response_body = open('{}/{}'.format(
|
||||
self.qualys_vuln_path,
|
||||
self.qualys_vm_path,
|
||||
request.parsed_body['scan_ref'][0].replace('/', '_'))
|
||||
).read()
|
||||
except:
|
||||
@ -54,7 +54,7 @@ class mockAPI(object):
|
||||
response_body = ''
|
||||
return [200, response_headers, response_body]
|
||||
|
||||
def create_qualys_vuln_resource(self, framework):
|
||||
def create_qualys_vm_resource(self, framework):
|
||||
# Create health check endpoint
|
||||
self.logger.info('Adding mocked {} endpoint GET msp/about.php'.format(framework))
|
||||
httpretty.register_uri(
|
||||
@ -65,15 +65,15 @@ class mockAPI(object):
|
||||
self.logger.info('Adding mocked {} endpoint {} {}'.format(framework, 'POST', 'api/2.0/fo/scan'))
|
||||
httpretty.register_uri(
|
||||
httpretty.POST, 'https://{}:443/api/2.0/fo/scan/'.format(framework),
|
||||
body=self.qualys_vuln_callback)
|
||||
body=self.qualys_vm_callback)
|
||||
|
||||
def qualys_web_callback(self, request, uri, response_headers):
|
||||
def qualys_was_callback(self, request, uri, response_headers):
|
||||
self.logger.info('Simulating response for {} ({})'.format(uri, request.body))
|
||||
report_id = request.parsed_body.split('<WasScan><id>')[1].split('<')[0]
|
||||
response_body = open('{}/create_{}'.format(self.qualys_web_path, report_id)).read()
|
||||
response_body = open('{}/create_{}'.format(self.qualys_was_path, report_id)).read()
|
||||
return [200, response_headers, response_body]
|
||||
|
||||
def create_qualys_web_resource(self, framework):
|
||||
def create_qualys_was_resource(self, framework):
|
||||
for filename in self.get_files('{}/{}'.format(self.mock_dir, framework)):
|
||||
if filename.startswith('POST') or filename.startswith('GET'):
|
||||
method, resource = filename.split('_', 1)
|
||||
@ -87,7 +87,7 @@ class mockAPI(object):
|
||||
self.logger.info('Adding mocked {} endpoint {} {}'.format(framework, 'POST', 'qps/rest/3.0/create/was/report'))
|
||||
httpretty.register_uri(
|
||||
httpretty.POST, 'https://{}:443/qps/rest/3.0/create/was/report'.format(framework),
|
||||
body=self.qualys_web_callback)
|
||||
body=self.qualys_was_callback)
|
||||
|
||||
def openvas_callback(self, request, uri, response_headers):
|
||||
self.logger.info('Simulating response for {} ({})'.format(uri, request.body))
|
||||
@ -116,12 +116,12 @@ class mockAPI(object):
|
||||
for framework in self.get_directories(self.mock_dir):
|
||||
if framework in ['nessus', 'tenable']:
|
||||
self.create_nessus_resource(framework)
|
||||
elif framework == 'qualys_vuln':
|
||||
self.qualys_vuln_path = self.mock_dir + '/' + framework
|
||||
self.create_qualys_vuln_resource(framework)
|
||||
elif framework == 'qualys_web':
|
||||
self.qualys_web_path = self.mock_dir + '/' + framework
|
||||
self.create_qualys_web_resource(framework)
|
||||
elif framework == 'qualys_vm':
|
||||
self.qualys_vm_path = self.mock_dir + '/' + framework
|
||||
self.create_qualys_vm_resource(framework)
|
||||
elif framework == 'qualys_was':
|
||||
self.qualys_was_path = self.mock_dir + '/' + framework
|
||||
self.create_qualys_was_resource(framework)
|
||||
elif framework == 'openvas':
|
||||
self.openvas_path = self.mock_dir + '/' + framework
|
||||
self.create_openvas_resource(framework)
|
||||
|
@ -18,8 +18,8 @@ from lxml import objectify
|
||||
from base.config import vwConfig
|
||||
from frameworks.nessus import NessusAPI
|
||||
from frameworks.openvas import OpenVAS_API
|
||||
from frameworks.qualys_vuln import qualysVulnScan
|
||||
from frameworks.qualys_web import qualysScanReport
|
||||
from frameworks.qualys_vm import qualysVulnScan
|
||||
from frameworks.qualys_was import qualysScanReport
|
||||
from reporting.jira_api import JiraAPI
|
||||
|
||||
|
||||
@ -544,9 +544,9 @@ class vulnWhispererNessus(vulnWhispererBase):
|
||||
return self.exit_code
|
||||
|
||||
|
||||
class vulnWhispererQualys(vulnWhispererBase):
|
||||
class vulnWhispererQualysWAS(vulnWhispererBase):
|
||||
|
||||
CONFIG_SECTION = 'qualys_web'
|
||||
CONFIG_SECTION = 'qualys_was'
|
||||
def __init__(
|
||||
self,
|
||||
config=None,
|
||||
@ -556,8 +556,8 @@ class vulnWhispererQualys(vulnWhispererBase):
|
||||
debug=False,
|
||||
):
|
||||
|
||||
super(vulnWhispererQualys, self).__init__(config=config, verbose=verbose, debug=debug)
|
||||
self.logger = logging.getLogger('vulnWhispererQualys')
|
||||
super(vulnWhispererQualysWAS, self).__init__(config=config, verbose=verbose, debug=debug)
|
||||
self.logger = logging.getLogger('vulnWhispererQualysWAS')
|
||||
if not verbose:
|
||||
verbose = self.config.getbool(self.CONFIG_SECTION, 'verbose')
|
||||
self.logger.setLevel(logging.DEBUG if debug else logging.INFO if verbose else logging.WARNING)
|
||||
@ -583,7 +583,7 @@ class vulnWhispererQualys(vulnWhispererBase):
|
||||
try:
|
||||
if 'Z' in launched_date:
|
||||
launched_date = self.qualys_scan.utils.iso_to_epoch(launched_date)
|
||||
report_name = 'qualys_web_' + str(report_id) \
|
||||
report_name = 'qualys_was_' + str(report_id) \
|
||||
+ '_{last_updated}'.format(last_updated=launched_date) \
|
||||
+ '.{extension}'.format(extension=output_format)
|
||||
|
||||
@ -843,7 +843,7 @@ class vulnWhispererOpenVAS(vulnWhispererBase):
|
||||
|
||||
class vulnWhispererQualysVuln(vulnWhispererBase):
|
||||
|
||||
CONFIG_SECTION = 'qualys_vuln'
|
||||
CONFIG_SECTION = 'qualys_vm'
|
||||
|
||||
def __init__(
|
||||
self,
|
||||
@ -873,7 +873,7 @@ class vulnWhispererQualysVuln(vulnWhispererBase):
|
||||
cleanup=True):
|
||||
if 'Z' in launched_date:
|
||||
launched_date = self.qualys_scan.utils.iso_to_epoch(launched_date)
|
||||
report_name = 'qualys_vuln_' + report_id.replace('/','_') \
|
||||
report_name = 'qualys_vm_' + report_id.replace('/','_') \
|
||||
+ '_{last_updated}'.format(last_updated=launched_date) \
|
||||
+ '.{extension}'.format(extension=output_format)
|
||||
|
||||
@ -1122,7 +1122,7 @@ class vulnWhispererJIRA(vulnWhispererBase):
|
||||
|
||||
return vulnerabilities
|
||||
|
||||
def parse_qualys_vuln_vulnerabilities(self, fullpath, source, scan_name, min_critical, dns_resolv = False):
|
||||
def parse_qualys_vm_vulnerabilities(self, fullpath, source, scan_name, min_critical, dns_resolv = False):
|
||||
#parsing of the qualys vulnerabilities schema
|
||||
#parse json
|
||||
vulnerabilities = []
|
||||
@ -1230,8 +1230,8 @@ class vulnWhispererJIRA(vulnWhispererBase):
|
||||
vulnerabilities = self.parse_nessus_vulnerabilities(fullpath, source, scan_name, min_critical)
|
||||
|
||||
#***Qualys VM parsing***
|
||||
if source == "qualys_vuln":
|
||||
vulnerabilities = self.parse_qualys_vuln_vulnerabilities(fullpath, source, scan_name, min_critical, dns_resolv)
|
||||
if source == "qualys_vm":
|
||||
vulnerabilities = self.parse_qualys_vm_vulnerabilities(fullpath, source, scan_name, min_critical, dns_resolv)
|
||||
|
||||
#***JIRA sync***
|
||||
if vulnerabilities:
|
||||
@ -1286,8 +1286,8 @@ class vulnWhisperer(object):
|
||||
debug=self.debug)
|
||||
self.exit_code += vw.whisper_nessus()
|
||||
|
||||
elif self.profile == 'qualys_web':
|
||||
vw = vulnWhispererQualys(config=self.config,
|
||||
elif self.profile == 'qualys_was':
|
||||
vw = vulnWhispererQualysWAS(config=self.config,
|
||||
verbose=self.verbose,
|
||||
debug=self.debug)
|
||||
self.exit_code += vw.process_web_assets()
|
||||
@ -1305,7 +1305,7 @@ class vulnWhisperer(object):
|
||||
debug=self.debug)
|
||||
self.exit_code += vw.whisper_nessus()
|
||||
|
||||
elif self.profile == 'qualys_vuln':
|
||||
elif self.profile == 'qualys_vm':
|
||||
vw = vulnWhispererQualysVuln(config=self.config,
|
||||
verbose=self.verbose,
|
||||
debug=self.debug)
|
||||
|
Reference in New Issue
Block a user