修改高权限执行基线扫描模式

This commit is contained in:
song 2023-03-31 17:34:29 +08:00
parent 0bbdcde4e3
commit f8f544c53f
2 changed files with 0 additions and 407 deletions

View File

@ -1,122 +0,0 @@
{
"RCServerUUID": "7bf6e2ea-3973-46f3-84ef-923cf0c5ec81",
"RCServerName": "123",
"RCFamily": "RCFamily",
"RCRelease": "RCRelease",
"RCContainer": "RCContainer",
"RCExploredType": "BaseLine",
"RCExploredTimeAt": "2023-03-31T17:27:44.989450739+08:00",
"RCExploredMode": "RCExploredMode",
"RCExploredVersion": "RCExploredVersion",
"RCExploredRevision": "RCExploredRevision",
"RCExploredBy": "RCExploredBy",
"RCExploredVia": "RCExploredVia",
"RCExploredIPv4Addrs": [
"0.0.0.0"
],
"RCExploredIPv6Addrs": [
"0.0.0.0"
],
"RCReportedAt": "2023-03-31T17:27:45.253086186+08:00",
"RCReportedVersion": "RCReportedVersion",
"RCReportedBy": "RCReportedBy",
"RCElapsedTime": 263635639,
"RCErrors": "RCErrors",
"RCWarnings": "RCWarnings",
"RCExploredVulns": [
{
"VICFormatVer": 0,
"VICId": "checkEmpty",
"VICBelong": "baseline",
"VICPocHazardLevel": "",
"VICSource": "",
"VICSiteInfo": {
"Name": "检测空口令账户",
"Severity": "",
"Description": "",
"ScopeOfInfluence": "",
"References": null,
"SiteClassification": {
"CvssMetrics": "",
"CvssScore": 0,
"CveId": "",
"CweId": "",
"CnvdId": "",
"KveId": ""
},
"Tags": null
},
"VICSiteRequests": {
"ImArray": [
{
"Inter": "",
"InterArgs": null,
"Exec": "awk",
"Args": [
"-F: ",
"'length($2)==0 {print $1}' /etc/shadow"
]
}
],
"ExpireTime": 0,
"Inter": [
""
],
"Condition": "None"
}
},
{
"VICFormatVer": 0,
"VICId": "CheckFileJurisdiction",
"VICBelong": "baseline",
"VICPocHazardLevel": "",
"VICSource": "",
"VICSiteInfo": {
"Name": "检测root目录下存在777权限的文件",
"Severity": "",
"Description": "",
"ScopeOfInfluence": "",
"References": null,
"SiteClassification": {
"CvssMetrics": "",
"CvssScore": 0,
"CveId": "",
"CweId": "",
"CnvdId": "",
"KveId": ""
},
"Tags": null
},
"VICSiteRequests": {
"ImArray": [
{
"Inter": "",
"InterArgs": null,
"Exec": "find",
"Args": [
"/root",
"-perm 777"
]
}
],
"ExpireTime": 0,
"Inter": [
""
],
"Condition": "None"
}
}
],
"RCReunningKernelInfo": {
"RKRelease": "0.0",
"RKVersion": "0.0",
"RKRebootRequired": false
},
"RCPackages": "RCPackages",
"RCSrcPackages": "RCSrcPackages",
"RCOptional": "RCOptional",
"RCExecPocNums": 10,
"RCRepairedNums": 4,
"RCNotFixedNums": 2,
"RCNotExecPocNums": 4
}

View File

@ -1,285 +0,0 @@
{
"RCServerUUID": "4a40f8a2-efe7-4c06-9cd9-b324df3f6fba",
"RCServerName": "123",
"RCFamily": "RCFamily",
"RCRelease": "RCRelease",
"RCContainer": "RCContainer",
"RCExploredType": "System",
"RCExploredTimeAt": "2023-03-31T17:27:24.95322199+08:00",
"RCExploredMode": "RCExploredMode",
"RCExploredVersion": "RCExploredVersion",
"RCExploredRevision": "RCExploredRevision",
"RCExploredBy": "RCExploredBy",
"RCExploredVia": "RCExploredVia",
"RCExploredIPv4Addrs": [
"0.0.0.0"
],
"RCExploredIPv6Addrs": [
"0.0.0.0"
],
"RCReportedAt": "2023-03-31T17:27:44.987731282+08:00",
"RCReportedVersion": "RCReportedVersion",
"RCReportedBy": "RCReportedBy",
"RCElapsedTime": 20034509421,
"RCErrors": "RCErrors",
"RCWarnings": "RCWarnings",
"RCExploredVulns": [
{
"VICFormatVer": 0,
"VICId": "CVE-2022-1292",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://github.com/alcaparra/CVE-2022-1292",
"VICSiteInfo": {
"Name": "OpenSSL是Openssl团队的一个开源的能够实现安全套接层SSLv2/v3和安全传输层TLSv1协议的通用加密库。该产品支持多种加密算法包括对称密码、哈希算法、安全散列算法等。",
"Severity": "critical",
"Description": "OpenSSL 存在操作系统命令注入漏洞该漏洞源于c_rehash 脚本未正确清理 shell 元字符导致命令注入。攻击者利用该漏洞执行任意命令。",
"ScopeOfInfluence": "OpenSSL 1.0.2 OpenSSL 1.1.1 OpenSSL 3.x",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-1292",
"https://git.openssl.org/gitweb/?p=openssl.git;a=commitdiff;h=1ad73b4d27bd8c1b369a3cd453681d3a4f1bb9b2"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CvssScore": 9.8,
"CveId": "CVE-2022-1292",
"CweId": "CWE-78",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"命令执行",
"命令注入"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-0714",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "medium",
"Description": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.",
"ScopeOfInfluence": "vim \u003c 8.2.4436",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
"https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CvssScore": 5.5,
"CveId": "CVE-2022-0714",
"CweId": "CWE-787,CWE-122",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"cve2022",
"缓冲区错误"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-0359",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "high",
"Description": "vim 存在安全漏洞该漏洞源于在8.2之前的vim中基于堆的缓冲区溢出。",
"ScopeOfInfluence": "vim \u003c 8.2",
"References": [
"https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0359"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CvssScore": 7.8,
"CveId": "CVE-2022-0359",
"CweId": "CWE-787,CWE-122",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"cve2022",
"缓冲区溢出"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-0413",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "high",
"Description": "vim 存在资源管理错误漏洞,该漏洞源于这个漏洞允许攻击者可利用该漏洞输入一个特别制作的文件,导致崩溃或代码执行。",
"ScopeOfInfluence": "vim \u003c 8.2",
"References": [
"https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a",
"https://nvd.nist.gov/vuln/detail/CVE-2022-0413"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CvssScore": 7.8,
"CveId": "CVE-2022-0413",
"CweId": "CWE-416",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"资源管理错误",
"拒绝服务"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-1771",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "Medium",
"Description": "Vim 8.2.4975 之前版本存在安全漏洞,该漏洞源于可能存在基于堆栈的缓冲区溢出问题。",
"ScopeOfInfluence": "vim \u003c 8.2.4975",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-1771"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CvssScore": 5.5,
"CveId": "CVE-2022-1771",
"CweId": "CWE-674",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"cve2022",
"缓冲区溢出"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-0572",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "high",
"Description": "vim 存在安全漏洞该漏洞源于在8.2之前的GitHub库vim中基于堆的缓冲区溢出",
"ScopeOfInfluence": "vim \u003c 8.2",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
"https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CvssScore": 7.8,
"CveId": "CVE-2022-0572",
"CweId": "CWE-787,CWE-122",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"cve2022",
"缓冲区错误"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
},
{
"VICFormatVer": 0,
"VICId": "CVE-2022-0351",
"VICBelong": "system",
"VICPocHazardLevel": "low",
"VICSource": "https://huntr.dev/bounties/8b36db58-b65c-4298-be7f-40b9e37fd161/",
"VICSiteInfo": {
"Name": "Vim是一款基于UNIX平台的编辑器。",
"Severity": "high",
"Description": "vim 存在缓冲区错误漏洞,该漏洞源于 vim 在缓冲区开始之前访问内存位置。。",
"ScopeOfInfluence": "vim \u003c 8.2",
"References": [
"https://nvd.nist.gov/vuln/detail/CVE-2022-0351",
"https://github.com/vim/vim/commit/fe6fb267e6ee5c5da2f41889e4e0e0ac5bf4b89d"
],
"SiteClassification": {
"CvssMetrics": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CvssScore": 7.8,
"CveId": "CVE-2022-0351",
"CweId": "CWE-119,CWE-786",
"CnvdId": "None",
"KveId": "None"
},
"Tags": [
"cve2022",
"拒绝服务",
"缓冲区错误"
]
},
"VICSiteRequests": {
"ImArray": null,
"ExpireTime": 0,
"Inter": null,
"Condition": ""
}
}
],
"RCReunningKernelInfo": {
"RKRelease": "0.0",
"RKVersion": "0.0",
"RKRebootRequired": false
},
"RCPackages": "RCPackages",
"RCSrcPackages": "RCSrcPackages",
"RCOptional": "RCOptional",
"RCExecPocNums": 25,
"RCRepairedNums": 18,
"RCNotFixedNums": 7,
"RCNotExecPocNums": 0
}