minvws / nl-kat-coordination

OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanning software into a modular framework, accesses external databases such as shodan, and combines the information from all these sources into clear reports. It also includes lots of cat hair.
https://openkat.nl
European Union Public License 1.2
127 stars 58 forks source link

LeakIX findings do not show the host for which the vulnerability was found. #3211

Open stephanie0x00 opened 4 months ago

stephanie0x00 commented 4 months ago

Describe the bug When the LeakIX boefje retrieved data and parsed this into findings it shows the finding, however the host for which this finding is applicable, is missing in the Finding name. As can be shown below. You can see that for other issues the hostname is shown, but for the LeakIX boefje it shows the apache version. Snyk.io findings show up by saying: Snyk @Bootstrap 1.2.3 @Hostname (example, might be slightly different). Which would be a proper solution for LeakIX as well.

image

To Reproduce Steps to reproduce the behavior:

  1. Scan a host which contains findings with LeakIX (findings in the LeaxIX database, message me if you need a hostname).
  2. Observe that the findings are without the hostname.

Expected behavior Findings always contain the host to which it is applicable.

OpenKAT version main

underdarknl commented 4 months ago

The human readable name for each finding is produced with the following code:

return f"{finding_type} @ {ooi_reference.human_readable}"

In this the first part is the finding_type (eg, the specific cve, or the specific leakix type), followed by the name of the referenced part.

For CVE's and LeakIX findings, they reference the Software, and the software in turn (back)references the SoftwareInstance. The softwareInstance then contains a reference to the location (host, url, etc). The back-reference from software-instance to software is because there might be many locations where we found (in your case) Apache 2.4.57, All of which are susceptible to CVE-2023-30943.

Knowing which software instance to show from the vantage point of the Finding itself is impossible, since there might be many.