
* clean OS X .DS_Store files * fix nessus end of line carriage, added JIRA args * JIRA module fully working * jira module working with nessus * added check on already existing jira config, update README * qualys_vm<->jira working, qualys_vm database entries with qualys_vm, improved checks * JIRA module updates ticket's assets and comments update * added JIRA auto-close function for resolved vulnerabitilies * fix if components variable empty issue * fix creation of new ticket after updating existing one * final fixes, added extra line in template * added vulnerability criticality as label in order to be able to filter
80 lines
3.4 KiB
Python
80 lines
3.4 KiB
Python
#!/usr/bin/python
|
|
# -*- coding: utf-8 -*-
|
|
__author__ = 'Austin Taylor'
|
|
|
|
|
|
from vulnwhisp.vulnwhisp import vulnWhisperer
|
|
from vulnwhisp.utils.cli import bcolors
|
|
from vulnwhisp.base.config import vwConfig
|
|
import os
|
|
import argparse
|
|
import sys
|
|
|
|
def isFileValid(parser, arg):
|
|
if not os.path.exists(arg):
|
|
parser.error("The file %s does not exist!" % arg)
|
|
else:
|
|
return arg
|
|
|
|
def main():
|
|
|
|
parser = argparse.ArgumentParser(description=""" VulnWhisperer is designed to create actionable data from\
|
|
your vulnerability scans through aggregation of historical scans.""")
|
|
parser.add_argument('-c', '--config', dest='config', required=False, default='frameworks.ini',
|
|
help='Path of config file', type=lambda x: isFileValid(parser, x.strip()))
|
|
parser.add_argument('-s', '--section', dest='section', required=False,
|
|
help='Section in config')
|
|
parser.add_argument('--source', dest='source', required=False,
|
|
help='JIRA required only! Source scanner to report')
|
|
parser.add_argument('-n', '--scanname', dest='scanname', required=False,
|
|
help='JIRA required only! Scan name from scan to report')
|
|
parser.add_argument('-v', '--verbose', dest='verbose', action='store_true', default=True,
|
|
help='Prints status out to screen (defaults to True)')
|
|
parser.add_argument('-u', '--username', dest='username', required=False, default=None, type=lambda x: x.strip(), help='The NESSUS username')
|
|
parser.add_argument('-p', '--password', dest='password', required=False, default=None, type=lambda x: x.strip(), help='The NESSUS password')
|
|
args = parser.parse_args()
|
|
|
|
try:
|
|
if args.config and not args.section:
|
|
|
|
print('{yellow}WARNING: {warning}{endc}'.format(yellow=bcolors.WARNING,
|
|
warning='No section was specified, vulnwhisperer will scrape enabled modules from config file. \
|
|
\nPlease specify a section using -s. \
|
|
\nExample vuln_whisperer -c config.ini -s nessus',
|
|
endc=bcolors.ENDC))
|
|
config = vwConfig(config_in=args.config)
|
|
enabled_sections = config.get_enabled()
|
|
|
|
for section in enabled_sections:
|
|
vw = vulnWhisperer(config=args.config,
|
|
profile=section,
|
|
verbose=args.verbose,
|
|
username=args.username,
|
|
password=args.password,
|
|
source=args.source,
|
|
scanname=args.scanname)
|
|
|
|
vw.whisper_vulnerabilities()
|
|
sys.exit(1)
|
|
|
|
else:
|
|
vw = vulnWhisperer(config=args.config,
|
|
profile=args.section,
|
|
verbose=args.verbose,
|
|
username=args.username,
|
|
password=args.password,
|
|
source=args.source,
|
|
scanname=args.scanname)
|
|
|
|
vw.whisper_vulnerabilities()
|
|
sys.exit(1)
|
|
|
|
except Exception as e:
|
|
if args.verbose:
|
|
print('{red} ERROR: {error}{endc}'.format(red=bcolors.FAIL, error=e, endc=bcolors.ENDC))
|
|
sys.exit(2)
|
|
|
|
|
|
if __name__ == '__main__':
|
|
main()
|