tenable / integration-jira-cloud

67 stars 53 forks source link

Bad Request Error - We can't create this issue for you right now #82

Closed romans8 closed 3 years ago

romans8 commented 3 years ago

Platform: K8's

2020-11-18 18:51:44,796 restfly.errors.BadRequestError ERROR [400: POST] https://domain.atlassian.net/rest/api/3/issue?update_history=False body=b'{"errorMessages":["We can\'t create this issue for you right now, it could be due to unsupported content you\'ve entered into one or more of the issue fields. If this situation persists, contact your administrator as they\'ll be able to access more specific information in the log file."],"errors":{}}'

After checking the jira logs I found nothing under system -> auditlog

romans8 commented 3 years ago

I tried deleting the project and trying again to get this error.

2020-11-18 20:35:14,830 restfly.errors.BadRequestError ERROR [400: POST] https://domain.atlassian.net/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10038":"Field \'customfield_10038\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10039":"Field \'customfield_10039\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10035":"Field \'customfield_10035\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10036":"Field \'customfield_10036\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10037":"Field \'customfield_10037\' cannot be set. It is not on the appropriate screen, or unknown."}}'

romans8 commented 3 years ago

When using the default Query ID: 406 this seems to run however I don't see any of the vulns copy over

SteveMcGrath commented 3 years ago

You have to provide the query ID of a quesry that you have defined within Tenable.sc. As for the original issue, can you please paste the output of a run of the integration with the --troubleshoot flag?

romans8 commented 3 years ago

Configuration File:

jira:
  address: <REDACTED>
  api_token: <REDACTED>
  api_username: <REDACTED>
log:
  filename: /log/tenable.log
  format: '%(asctime)-15s %(name)s %(levelname)s %(message)s'
  level: 30
project:
  leadAccountId: <REDACTED>
service:
  interval: 24
tenable:
  access_key: <REDACTED>
  address: <REDACTED>
  platform: tenable.sc
  query_id: 568
  secret_key: <REDACTED>
  tio_severities:
  - critical
  - high
  - medium
  - low

Debug Logs

2020-11-19 19:41:51,652 root INFO Tenable2JiraCloud Version 1.1.17
2020-11-19 19:41:51,652 root INFO Using configuration file /etc/tenable-jira/config.yaml
2020-11-19 19:41:51,655 root INFO Running on Python 3.7.3 Linux/x86_64
2020-11-19 19:41:51,657 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/system", "params": {}, "body": {}}
2020-11-19 19:41:51,660 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <TENABLE_SC_HOST>:443
2020-11-19 19:41:51,861 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/system HTTP/1.1" 200 None
2020-11-19 19:41:51,864 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/project/VULN", "params": {}, "body": {}}
2020-11-19 19:41:51,866 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <JIRA_CLOUD_HOST>:443
2020-11-19 19:41:52,448 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/project/VULN HTTP/1.1" 200 None
2020-11-19 19:41:52,451 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {}}
2020-11-19 19:41:52,803 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/field HTTP/1.1" 200 None
2020-11-19 19:41:52,876 tenable_jira.jira.Jira INFO Tenable Platform is customfield_10029 (existing)
2020-11-19 19:41:52,876 tenable_jira.jira.Jira INFO CVEs is customfield_10030 (existing)
2020-11-19 19:41:52,876 tenable_jira.jira.Jira INFO CVSSv2 Base Score is customfield_10031 (existing)
2020-11-19 19:41:52,876 tenable_jira.jira.Jira INFO CVSSv2 Temporal Score is customfield_10032 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO CVSSv3 Base Score is customfield_10033 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO CVSSv3 Temporal Score is customfield_10034 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Patch Publication Date is customfield_10035 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Tenable Plugin ID is customfield_10036 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Tenable Plugin Family is customfield_10037 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Tenable Plugin Name is customfield_10038 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Vulnerability Severity is customfield_10039 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Tenable Asset UUID is customfield_10040 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Tenable Asset Tags is customfield_10041 (existing)
2020-11-19 19:41:52,877 tenable_jira.jira.Jira INFO Device MAC Addresses is customfield_10042 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device IPv4 Addresses is customfield_10043 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device IPv6 Addresses is customfield_10044 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device Hostname is customfield_10045 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device NetBIOS Name is customfield_10046 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device DNS Name is customfield_10047 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Device Network ID is customfield_10048 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Vulnerability First Seen is customfield_10049 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Vulnerability Last Seen is customfield_10050 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Vulnerability Last Fixed is customfield_10051 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Vulnerability State is customfield_10052 (existing)
2020-11-19 19:41:52,878 tenable_jira.jira.Jira INFO Vulnerability Port is customfield_10053 (existing)
2020-11-19 19:41:52,879 tenable_jira.jira.Jira INFO Vulnerability Protocol is customfield_10054 (existing)
2020-11-19 19:41:52,879 tenable_jira.jira.Jira INFO Vulnerability Repository ID is customfield_10055 (existing)
2020-11-19 19:41:52,879 tenable_jira.jira.Jira INFO Vulnerability Repository Name is customfield_10056 (existing)
2020-11-19 19:41:52,879 tenable_jira.jira.Jira INFO Tenable VPR Score is customfield_10057 (existing)
2020-11-19 19:41:52,879 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issuetype", "params": {}, "body": {}}
2020-11-19 19:41:53,055 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/issuetype HTTP/1.1" 200 None
2020-11-19 19:41:53,057 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens", "params": {"startAt": -100, "maxResults": 100}, "body": {}}
2020-11-19 19:41:53,209 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens?startAt=-100&maxResults=100 HTTP/1.1" 200 None
2020-11-19 19:41:53,211 tenable_jira.transform.Tio2Jira INFO Using JIRA Screens [10011, 10012]
2020-11-19 19:41:53,212 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs", "params": {}, "body": {}}
2020-11-19 19:41:53,362 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs HTTP/1.1" 200 None
2020-11-19 19:41:53,363 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {}}
2020-11-19 19:41:53,532 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-19 19:41:53,534 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10011:10016
2020-11-19 19:41:53,535 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10011:10016
2020-11-19 19:41:53,536 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {}}
2020-11-19 19:41:53,919 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10011:10017
2020-11-19 19:41:53,922 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10011:10017
2020-11-19 19:41:53,923 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs", "params": {}, "body": {}}
2020-11-19 19:41:54,067 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs HTTP/1.1" 200 None
2020-11-19 19:41:54,070 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {}}
2020-11-19 19:41:54,214 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10012:10018
2020-11-19 19:41:54,217 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10012:10018
2020-11-19 19:41:54,218 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {}}
2020-11-19 19:41:54,366 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10012:10019
2020-11-19 19:41:54,368 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10012:10019
2020-11-19 19:41:54,369 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10012:10019
2020-11-19 19:41:54,369 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10012:10019
2020-11-19 19:41:54,369 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10012:10019
2020-11-19 19:41:54,369 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10012:10019
2020-11-19 19:41:54,369 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/query/568?fields=filters", "params": {}, "body": {}}
2020-11-19 19:41:54,473 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/query/568?fields=filters HTTP/1.1" 200 123
2020-11-19 19:41:54,474 tenable.sc.TenableSC DEBUG {"method": "POST", "url": "https://<TENABLE_SC_HOST>:443/rest/analysis", "params": {}, "body": {"type": "vuln", "sourceType": "cumulative", "query": {"tool": "vulndetails", "type": "vuln", "filters": [{"filterName": "lastSeen", "operator": "=", "value": "0-1605814914"}], "startOffset": 0, "endOffset": 1000}}}
2020-11-19 19:42:00,515 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "POST /rest/analysis HTTP/1.1" 200 None
2020-11-19 19:42:00,559 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"10150\""}}
2020-11-19 19:42:00,776 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/search HTTP/1.1" 200 None
2020-11-19 19:42:00,779 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10035": "-1", "customfield_10036": "10150", "customfield_10037": "Windows", "customfield_10038": "Windows NetBIOS / SMB Remote Host Information Disclosure", "customfield_10039": "Info", "summary": "[10150] Windows NetBIOS / SMB Remote Host Information Disclosure", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.\n\nNote that this plugin gathers information to be used in other plugins, but does not itself generate a report."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}}
2020-11-19 19:42:01,038 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None
2020-11-19 19:42:01,041 restfly.errors.BadRequestError ERROR [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10038":"Field \'customfield_10038\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10039":"Field \'customfield_10039\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10035":"Field \'customfield_10035\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10036":"Field \'customfield_10036\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10037":"Field \'customfield_10037\' cannot be set. It is not on the appropriate screen, or unknown."}}'
2020-11-19 19:42:01,041 root ERROR Caught the following Exception
Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 363, in _process_open_vuln
    i = self._jira.issues.upsert(fields=issue, jql=' and '.join(jql))
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 48, in upsert
    issue = self.create(**kwargs)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 20, in create
    json=kwargs
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 563, in post
    return self._request('POST', path, **kwargs)
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 477, in _request
    raise err(resp, retries=retries, func=self._error_func)
restfly.errors.BadRequestError: [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10038":"Field \'customfield_10038\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10039":"Field \'customfield_10039\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10035":"Field \'customfield_10035\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10036":"Field \'customfield_10036\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10037":"Field \'customfield_10037\' cannot be set. It is not on the appropriate screen, or unknown."}}'

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/cli.py", line 151, in cli
    ingest.ingest(observed_since)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 674, in ingest
    self.create_issues(vulns)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 477, in create_issues
    self._process_open_vuln(v, fid)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 366, in _process_open_vuln
    sys.exit(2)
SystemExit: 2

Available IssueTypes

10002: Task
10003: Sub-task
/-------------------------------NOTICE-----------------------------------\ The output above is helpful for us to troubleshoot exactly what is happening within the code and offer a diagnosis for how to correct. Please note that while some basic redaction has already been performed that we ask you to review the information you're about to send and ensure that nothing deemed sensitive is transmitted.
-- Copy of output saved to "issue_debug.md"

------------------------------------------------------------------------/

SteveMcGrath commented 3 years ago

Can you verify that you have the following permissions assigned to the user: https://github.com/tenable/integration-jira-cloud#permissions

romans8 commented 3 years ago

Yes validated the user has site admin.

settings - user management - groups - site-admins

SteveMcGrath commented 3 years ago

sadly based on conversations from atlassian support and some prior experiences with other folks, that may not be enough. you may need to explicitly define the permissions for that user.

romans8 commented 3 years ago

Vuln Management - Project Settings - Permissions - Actions - Edit Permissions

Add Single User to each: Assignable User Assign Issues Close Issues Create Issues Delete Issues Edit Issues Link Issues Modify Reporter Move Issues Resolve Issues Schedule Issues Set Issue Security Transition Issues

Still no go.

romans8 commented 3 years ago

When deleting the project it doesn't seem to clean up.

  1. Issue type schemes
  2. Issue type screen schemes
  3. Custom fields CVEs CVSSv2 Base Score CVSSv2 Temporal Score CVSSv3 Base Score CVSSv3 Temporal Score Device DNS Name Device IPv4 Addresses Device IPv6 Addresses Device Hostname Device MAC Addresses Device NetBIOS Name Device Network ID Tenable Asset UUID Tenable Platform Tenable Plugin Family Tenable Plugin ID Tenable Plugin Name Tenable VPR Score Vulnerability First Seen Vulnerability Last Seen Vulnerability Last Fixed Vulnerability State Vulnerability Port Vulnerability Protocol Vulnerability Repository ID Vulnerability Repository Name Vulnerability Severity

Is there a cleanup.py? That way it can be un-done then re-done?

To me the logs indicate it wasn't finished with creating the custom fields before it was interrupted. My terminal window may have terminated in the middle of the setup and now the checks think everything is ok and breaking when it's trying to create an issue. Hence why most of the custom fields are there. It had permissions at the time.

After manually cleaning up I reran the debug to get the same error.

romans8 commented 3 years ago

/ # tenable-jira /etc/tenable-jira/config.yaml --troubleshoot

Configuration File:

jira:
  address: <REDACTED>
  api_token: <REDACTED>
  api_username: <REDACTED>
log:
  filename: /log/tenable.log
  format: '%(asctime)-15s %(name)s %(levelname)s %(message)s'
  level: 30
project:
  leadAccountId: <REDACTED>
service:
  interval: 24
tenable:
  access_key: <REDACTED>
  address: <REDACTED>
  platform: tenable.sc
  query_id: 568
  secret_key: <REDACTED>
  tio_severities:
  - critical
  - high
  - medium
  - low

Debug Logs

2020-11-24 20:33:18,448 root INFO Tenable2JiraCloud Version 1.1.17
2020-11-24 20:33:18,448 root INFO Using configuration file /etc/tenable-jira/config.yaml
2020-11-24 20:33:18,452 root INFO Running on Python 3.7.3 Linux/x86_64
2020-11-24 20:33:18,454 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/system", "params": {}, "body": {}}
2020-11-24 20:33:18,457 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <TENABLE_SC_HOST>:443
2020-11-24 20:33:18,655 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/system HTTP/1.1" 200 None
2020-11-24 20:33:18,658 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/project/VULN", "params": {}, "body": {}}
2020-11-24 20:33:18,660 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <JIRA_CLOUD_HOST>:443
2020-11-24 20:33:19,154 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/project/VULN HTTP/1.1" 404 None
2020-11-24 20:33:19,158 restfly.errors.NotFoundError ERROR [404: GET] https://<JIRA_CLOUD_HOST>/rest/api/3/project/VULN body=b'{"errorMessages":["No project could be found with key \'VULN\'."],"errors":{}}'
2020-11-24 20:33:19,158 tenable_jira.jira.Jira INFO Creating Project VULN
2020-11-24 20:33:19,158 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/project", "params": {}, "body": {"key": "VULN", "name": "Vulnerability Management", "projectTypeKey": "business", "projectTemplateKey": "com.atlassian.jira-core-project-templates:jira-core-simplified-task-tracking", "description": "Managing vulnerabilities discovered from Tenable products.", "url": "https://tenable.com", "assigneeType": "UNASSIGNED", "leadAccountId": "5ac3d8c80fcea7426c43bd1e"}}
2020-11-24 20:33:19,963 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/project HTTP/1.1" 201 None
2020-11-24 20:33:19,964 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {}}
2020-11-24 20:33:20,195 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/field HTTP/1.1" 200 None
2020-11-24 20:33:20,200 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Platform", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:20,506 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:20,509 tenable_jira.jira.Jira INFO Tenable Platform is customfield_10058 (new)
2020-11-24 20:33:20,509 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "CVEs", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:20,822 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:20,826 tenable_jira.jira.Jira INFO CVEs is customfield_10059 (new)
2020-11-24 20:33:20,826 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "CVSSv2 Base Score", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:21,047 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:21,048 tenable_jira.jira.Jira INFO CVSSv2 Base Score is customfield_10060 (new)
2020-11-24 20:33:21,048 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "CVSSv2 Temporal Score", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:21,555 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:21,556 tenable_jira.jira.Jira INFO CVSSv2 Temporal Score is customfield_10061 (new)
2020-11-24 20:33:21,556 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "CVSSv3 Base Score", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:21,796 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:21,798 tenable_jira.jira.Jira INFO CVSSv3 Base Score is customfield_10062 (new)
2020-11-24 20:33:21,798 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "CVSSv3 Temporal Score", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:22,015 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:22,018 tenable_jira.jira.Jira INFO CVSSv3 Temporal Score is customfield_10063 (new)
2020-11-24 20:33:22,018 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Patch Publication Date", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:22,455 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:22,456 tenable_jira.jira.Jira INFO Patch Publication Date is customfield_10064 (new)
2020-11-24 20:33:22,457 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Plugin ID", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:22,681 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:22,684 tenable_jira.jira.Jira INFO Tenable Plugin ID is customfield_10065 (new)
2020-11-24 20:33:22,685 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Plugin Family", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:22,879 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:22,881 tenable_jira.jira.Jira INFO Tenable Plugin Family is customfield_10066 (new)
2020-11-24 20:33:22,881 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Plugin Name", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:23,112 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:23,114 tenable_jira.jira.Jira INFO Tenable Plugin Name is customfield_10067 (new)
2020-11-24 20:33:23,114 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Severity", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:23,334 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:23,335 tenable_jira.jira.Jira INFO Vulnerability Severity is customfield_10068 (new)
2020-11-24 20:33:23,335 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Asset UUID", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:23,528 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:23,532 tenable_jira.jira.Jira INFO Tenable Asset UUID is customfield_10069 (new)
2020-11-24 20:33:23,532 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable Asset Tags", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:23,742 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:23,746 tenable_jira.jira.Jira INFO Tenable Asset Tags is customfield_10070 (new)
2020-11-24 20:33:23,746 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device MAC Addresses", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:23,978 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:23,980 tenable_jira.jira.Jira INFO Device MAC Addresses is customfield_10071 (new)
2020-11-24 20:33:23,981 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device IPv4 Addresses", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:24,199 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:24,200 tenable_jira.jira.Jira INFO Device IPv4 Addresses is customfield_10072 (new)
2020-11-24 20:33:24,200 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device IPv6 Addresses", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:24,421 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:24,423 tenable_jira.jira.Jira INFO Device IPv6 Addresses is customfield_10073 (new)
2020-11-24 20:33:24,423 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device Hostname", "type": "com.atlassian.jira.plugin.system.customfieldtypes:labels", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:labelsearcher", "description": ""}}
2020-11-24 20:33:24,660 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:24,664 tenable_jira.jira.Jira INFO Device Hostname is customfield_10074 (new)
2020-11-24 20:33:24,664 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device NetBIOS Name", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:24,897 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:24,898 tenable_jira.jira.Jira INFO Device NetBIOS Name is customfield_10075 (new)
2020-11-24 20:33:24,898 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device DNS Name", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:25,124 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:25,127 tenable_jira.jira.Jira INFO Device DNS Name is customfield_10076 (new)
2020-11-24 20:33:25,128 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Device Network ID", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:25,354 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:25,357 tenable_jira.jira.Jira INFO Device Network ID is customfield_10077 (new)
2020-11-24 20:33:25,358 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability First Seen", "type": "com.atlassian.jira.plugin.system.customfieldtypes:datetime", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:datetimerange", "description": ""}}
2020-11-24 20:33:25,593 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:25,595 tenable_jira.jira.Jira INFO Vulnerability First Seen is customfield_10078 (new)
2020-11-24 20:33:25,596 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Last Seen", "type": "com.atlassian.jira.plugin.system.customfieldtypes:datetime", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:datetimerange", "description": ""}}
2020-11-24 20:33:25,827 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:25,829 tenable_jira.jira.Jira INFO Vulnerability Last Seen is customfield_10079 (new)
2020-11-24 20:33:25,829 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Last Fixed", "type": "com.atlassian.jira.plugin.system.customfieldtypes:datetime", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:datetimerange", "description": ""}}
2020-11-24 20:33:26,082 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:26,085 tenable_jira.jira.Jira INFO Vulnerability Last Fixed is customfield_10080 (new)
2020-11-24 20:33:26,085 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability State", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:26,295 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:26,297 tenable_jira.jira.Jira INFO Vulnerability State is customfield_10081 (new)
2020-11-24 20:33:26,297 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Port", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:26,529 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:26,535 tenable_jira.jira.Jira INFO Vulnerability Port is customfield_10082 (new)
2020-11-24 20:33:26,535 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Protocol", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:26,767 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:26,769 tenable_jira.jira.Jira INFO Vulnerability Protocol is customfield_10083 (new)
2020-11-24 20:33:26,769 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Repository ID", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:26,996 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:26,999 tenable_jira.jira.Jira INFO Vulnerability Repository ID is customfield_10084 (new)
2020-11-24 20:33:26,999 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Vulnerability Repository Name", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:27,217 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:27,219 tenable_jira.jira.Jira INFO Vulnerability Repository Name is customfield_10085 (new)
2020-11-24 20:33:27,219 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {"name": "Tenable VPR Score", "type": "com.atlassian.jira.plugin.system.customfieldtypes:readonlyfield", "searcherKey": "com.atlassian.jira.plugin.system.customfieldtypes:textsearcher", "description": ""}}
2020-11-24 20:33:27,449 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/field HTTP/1.1" 201 None
2020-11-24 20:33:27,462 tenable_jira.jira.Jira INFO Tenable VPR Score is customfield_10086 (new)
2020-11-24 20:33:27,463 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issuetype", "params": {}, "body": {}}
2020-11-24 20:33:27,621 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/issuetype HTTP/1.1" 200 None
2020-11-24 20:33:27,623 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens", "params": {"startAt": -100, "maxResults": 100}, "body": {}}
2020-11-24 20:33:27,776 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens?startAt=-100&maxResults=100 HTTP/1.1" 200 None
2020-11-24 20:33:27,779 tenable_jira.transform.Tio2Jira INFO Using JIRA Screens [10011, 10012]
2020-11-24 20:33:27,779 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs", "params": {}, "body": {}}
2020-11-24 20:33:27,925 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs HTTP/1.1" 200 None
2020-11-24 20:33:27,931 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {}}
2020-11-24 20:33:28,076 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,079 tenable_jira.transform.Tio2Jira INFO Adding CVEs to Screen 10011:10016
2020-11-24 20:33:28,080 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10059"}}
2020-11-24 20:33:28,236 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,239 tenable_jira.transform.Tio2Jira INFO Adding Tenable VPR Score to Screen 10011:10016
2020-11-24 20:33:28,239 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10086"}}
2020-11-24 20:33:28,397 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,399 tenable_jira.transform.Tio2Jira INFO Adding CVSSv2 Base Score to Screen 10011:10016
2020-11-24 20:33:28,400 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10060"}}
2020-11-24 20:33:28,556 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,559 tenable_jira.transform.Tio2Jira INFO Adding CVSSv2 Temporal Score to Screen 10011:10016
2020-11-24 20:33:28,560 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10061"}}
2020-11-24 20:33:28,718 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,721 tenable_jira.transform.Tio2Jira INFO Adding CVSSv3 Base Score to Screen 10011:10016
2020-11-24 20:33:28,721 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10062"}}
2020-11-24 20:33:28,871 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:28,874 tenable_jira.transform.Tio2Jira INFO Adding CVSSv3 Temporal Score to Screen 10011:10016
2020-11-24 20:33:28,874 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10063"}}
2020-11-24 20:33:29,046 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:29,048 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin ID to Screen 10011:10016
2020-11-24 20:33:29,048 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10065"}}
2020-11-24 20:33:29,201 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:29,203 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin Family to Screen 10011:10016
2020-11-24 20:33:29,204 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10066"}}
2020-11-24 20:33:29,362 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:29,363 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin Name to Screen 10011:10016
2020-11-24 20:33:29,363 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10067"}}
2020-11-24 20:33:29,521 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:29,524 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Severity to Screen 10011:10016
2020-11-24 20:33:29,524 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10068"}}
2020-11-24 20:33:29,682 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:29,685 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability First Seen to Screen 10011:10016
2020-11-24 20:33:29,685 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10078"}}
2020-11-24 20:33:30,048 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,051 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Last Seen to Screen 10011:10016
2020-11-24 20:33:30,051 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10079"}}
2020-11-24 20:33:30,295 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,302 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Last Fixed to Screen 10011:10016
2020-11-24 20:33:30,302 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10080"}}
2020-11-24 20:33:30,471 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,475 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability State to Screen 10011:10016
2020-11-24 20:33:30,476 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10081"}}
2020-11-24 20:33:30,655 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,658 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Port to Screen 10011:10016
2020-11-24 20:33:30,658 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10082"}}
2020-11-24 20:33:30,811 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,813 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Protocol to Screen 10011:10016
2020-11-24 20:33:30,814 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10083"}}
2020-11-24 20:33:30,970 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:30,974 tenable_jira.transform.Tio2Jira INFO Adding Patch Publication Date to Screen 10011:10016
2020-11-24 20:33:30,975 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {"fieldId": "customfield_10064"}}
2020-11-24 20:33:31,139 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,141 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {}}
2020-11-24 20:33:31,281 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,284 tenable_jira.transform.Tio2Jira INFO Adding Tenable Asset UUID to Screen 10011:10017
2020-11-24 20:33:31,284 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10069"}}
2020-11-24 20:33:31,439 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,444 tenable_jira.transform.Tio2Jira INFO Adding Tenable Asset Tags to Screen 10011:10017
2020-11-24 20:33:31,444 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10070"}}
2020-11-24 20:33:31,598 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,601 tenable_jira.transform.Tio2Jira INFO Adding Tenable Platform to Screen 10011:10017
2020-11-24 20:33:31,601 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10058"}}
2020-11-24 20:33:31,761 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,766 tenable_jira.transform.Tio2Jira INFO Adding Device Hostname to Screen 10011:10017
2020-11-24 20:33:31,766 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10074"}}
2020-11-24 20:33:31,929 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:31,933 tenable_jira.transform.Tio2Jira INFO Adding Device NetBIOS Name to Screen 10011:10017
2020-11-24 20:33:31,933 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10075"}}
2020-11-24 20:33:32,105 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,109 tenable_jira.transform.Tio2Jira INFO Adding Device DNS Name to Screen 10011:10017
2020-11-24 20:33:32,110 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10076"}}
2020-11-24 20:33:32,271 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,273 tenable_jira.transform.Tio2Jira INFO Adding Device IPv4 Addresses to Screen 10011:10017
2020-11-24 20:33:32,274 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10072"}}
2020-11-24 20:33:32,447 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,449 tenable_jira.transform.Tio2Jira INFO Adding Device IPv6 Addresses to Screen 10011:10017
2020-11-24 20:33:32,450 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10073"}}
2020-11-24 20:33:32,605 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,609 tenable_jira.transform.Tio2Jira INFO Adding Device MAC Addresses to Screen 10011:10017
2020-11-24 20:33:32,610 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10071"}}
2020-11-24 20:33:32,773 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,779 tenable_jira.transform.Tio2Jira INFO Adding Device Network ID to Screen 10011:10017
2020-11-24 20:33:32,779 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10077"}}
2020-11-24 20:33:32,946 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:32,953 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Repository ID to Screen 10011:10017
2020-11-24 20:33:32,953 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10084"}}
2020-11-24 20:33:33,107 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:33,109 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Repository Name to Screen 10011:10017
2020-11-24 20:33:33,110 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {"fieldId": "customfield_10085"}}
2020-11-24 20:33:33,260 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:33:33,264 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs", "params": {}, "body": {}}
2020-11-24 20:33:33,407 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs HTTP/1.1" 200 None
2020-11-24 20:33:33,408 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {}}
2020-11-24 20:33:33,553 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:33,556 tenable_jira.transform.Tio2Jira INFO Adding CVEs to Screen 10012:10018
2020-11-24 20:33:33,556 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10059"}}
2020-11-24 20:33:33,709 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:33,719 tenable_jira.transform.Tio2Jira INFO Adding Tenable VPR Score to Screen 10012:10018
2020-11-24 20:33:33,719 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10086"}}
2020-11-24 20:33:33,870 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:33,874 tenable_jira.transform.Tio2Jira INFO Adding CVSSv2 Base Score to Screen 10012:10018
2020-11-24 20:33:33,874 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10060"}}
2020-11-24 20:33:34,053 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,055 tenable_jira.transform.Tio2Jira INFO Adding CVSSv2 Temporal Score to Screen 10012:10018
2020-11-24 20:33:34,055 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10061"}}
2020-11-24 20:33:34,213 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,216 tenable_jira.transform.Tio2Jira INFO Adding CVSSv3 Base Score to Screen 10012:10018
2020-11-24 20:33:34,216 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10062"}}
2020-11-24 20:33:34,366 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,370 tenable_jira.transform.Tio2Jira INFO Adding CVSSv3 Temporal Score to Screen 10012:10018
2020-11-24 20:33:34,370 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10063"}}
2020-11-24 20:33:34,522 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,526 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin ID to Screen 10012:10018
2020-11-24 20:33:34,526 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10065"}}
2020-11-24 20:33:34,675 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,677 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin Family to Screen 10012:10018
2020-11-24 20:33:34,678 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10066"}}
2020-11-24 20:33:34,839 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:34,841 tenable_jira.transform.Tio2Jira INFO Adding Tenable Plugin Name to Screen 10012:10018
2020-11-24 20:33:34,841 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10067"}}
2020-11-24 20:33:35,002 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,005 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Severity to Screen 10012:10018
2020-11-24 20:33:35,005 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10068"}}
2020-11-24 20:33:35,164 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,168 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability First Seen to Screen 10012:10018
2020-11-24 20:33:35,168 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10078"}}
2020-11-24 20:33:35,329 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,330 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Last Seen to Screen 10012:10018
2020-11-24 20:33:35,331 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10079"}}
2020-11-24 20:33:35,476 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,478 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Last Fixed to Screen 10012:10018
2020-11-24 20:33:35,478 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10080"}}
2020-11-24 20:33:35,646 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,649 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability State to Screen 10012:10018
2020-11-24 20:33:35,649 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10081"}}
2020-11-24 20:33:35,821 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,825 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Port to Screen 10012:10018
2020-11-24 20:33:35,826 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10082"}}
2020-11-24 20:33:35,981 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:35,985 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Protocol to Screen 10012:10018
2020-11-24 20:33:35,985 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10083"}}
2020-11-24 20:33:36,159 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:36,163 tenable_jira.transform.Tio2Jira INFO Adding Patch Publication Date to Screen 10012:10018
2020-11-24 20:33:36,163 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {"fieldId": "customfield_10064"}}
2020-11-24 20:33:36,331 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:33:36,335 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {}}
2020-11-24 20:33:36,482 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:36,486 tenable_jira.transform.Tio2Jira INFO Adding Tenable Asset UUID to Screen 10012:10019
2020-11-24 20:33:36,486 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10069"}}
2020-11-24 20:33:36,647 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:36,650 tenable_jira.transform.Tio2Jira INFO Adding Tenable Asset Tags to Screen 10012:10019
2020-11-24 20:33:36,650 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10070"}}
2020-11-24 20:33:36,814 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:36,827 tenable_jira.transform.Tio2Jira INFO Adding Tenable Platform to Screen 10012:10019
2020-11-24 20:33:36,827 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10058"}}
2020-11-24 20:33:36,998 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:37,001 tenable_jira.transform.Tio2Jira INFO Adding Device Hostname to Screen 10012:10019
2020-11-24 20:33:37,001 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10074"}}
2020-11-24 20:33:37,158 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:37,159 tenable_jira.transform.Tio2Jira INFO Adding Device NetBIOS Name to Screen 10012:10019
2020-11-24 20:33:37,159 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10075"}}
2020-11-24 20:33:37,524 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:37,528 tenable_jira.transform.Tio2Jira INFO Adding Device DNS Name to Screen 10012:10019
2020-11-24 20:33:37,528 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10076"}}
2020-11-24 20:33:37,690 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:37,693 tenable_jira.transform.Tio2Jira INFO Adding Device IPv4 Addresses to Screen 10012:10019
2020-11-24 20:33:37,693 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10072"}}
2020-11-24 20:33:37,853 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:37,855 tenable_jira.transform.Tio2Jira INFO Adding Device IPv6 Addresses to Screen 10012:10019
2020-11-24 20:33:37,856 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10073"}}
2020-11-24 20:33:38,011 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:38,014 tenable_jira.transform.Tio2Jira INFO Adding Device MAC Addresses to Screen 10012:10019
2020-11-24 20:33:38,014 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10071"}}
2020-11-24 20:33:38,168 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:38,171 tenable_jira.transform.Tio2Jira INFO Adding Device Network ID to Screen 10012:10019
2020-11-24 20:33:38,171 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10077"}}
2020-11-24 20:33:38,324 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:38,327 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Repository ID to Screen 10012:10019
2020-11-24 20:33:38,327 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10084"}}
2020-11-24 20:33:38,493 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:38,501 tenable_jira.transform.Tio2Jira INFO Adding Vulnerability Repository Name to Screen 10012:10019
2020-11-24 20:33:38,501 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {"fieldId": "customfield_10085"}}
2020-11-24 20:33:38,669 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:33:38,671 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/query/568?fields=filters", "params": {}, "body": {}}
2020-11-24 20:33:38,673 urllib3.connectionpool DEBUG Resetting dropped connection: <TENABLE_SC_HOST>
2020-11-24 20:33:38,853 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/query/568?fields=filters HTTP/1.1" 200 123
2020-11-24 20:33:38,854 tenable.sc.TenableSC DEBUG {"method": "POST", "url": "https://<TENABLE_SC_HOST>:443/rest/analysis", "params": {}, "body": {"type": "vuln", "sourceType": "cumulative", "query": {"tool": "vulndetails", "type": "vuln", "filters": [{"filterName": "lastSeen", "operator": "=", "value": "0-1606250018"}], "startOffset": 0, "endOffset": 1000}}}
2020-11-24 20:33:44,777 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "POST /rest/analysis HTTP/1.1" 200 None
2020-11-24 20:33:44,817 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"10150\""}}
2020-11-24 20:33:45,063 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/search HTTP/1.1" 200 None
2020-11-24 20:33:45,067 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10064": "-1", "customfield_10065": "10150", "customfield_10066": "Windows", "customfield_10067": "Windows NetBIOS / SMB Remote Host Information Disclosure", "customfield_10068": "Info", "summary": "[10150] Windows NetBIOS / SMB Remote Host Information Disclosure", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.\n\nNote that this plugin gathers information to be used in other plugins, but does not itself generate a report."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}}
2020-11-24 20:33:45,315 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None
2020-11-24 20:33:45,316 restfly.errors.BadRequestError ERROR [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10064":"Field \'customfield_10064\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10065":"Field \'customfield_10065\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10066":"Field \'customfield_10066\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10067":"Field \'customfield_10067\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10068":"Field \'customfield_10068\' cannot be set. It is not on the appropriate screen, or unknown."}}'
2020-11-24 20:33:45,316 root ERROR Caught the following Exception
Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 363, in _process_open_vuln
    i = self._jira.issues.upsert(fields=issue, jql=' and '.join(jql))
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 48, in upsert
    issue = self.create(**kwargs)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 20, in create
    json=kwargs
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 563, in post
    return self._request('POST', path, **kwargs)
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 477, in _request
    raise err(resp, retries=retries, func=self._error_func)
restfly.errors.BadRequestError: [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10064":"Field \'customfield_10064\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10065":"Field \'customfield_10065\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10066":"Field \'customfield_10066\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10067":"Field \'customfield_10067\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10068":"Field \'customfield_10068\' cannot be set. It is not on the appropriate screen, or unknown."}}'

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/cli.py", line 151, in cli
    ingest.ingest(observed_since)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 674, in ingest
    self.create_issues(vulns)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 477, in create_issues
    self._process_open_vuln(v, fid)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 366, in _process_open_vuln
    sys.exit(2)
SystemExit: 2

Available IssueTypes

10002: Task
10003: Sub-task
/-------------------------------NOTICE-----------------------------------\ The output above is helpful for us to troubleshoot exactly what is happening within the code and offer a diagnosis for how to correct. Please note that while some basic redaction has already been performed that we ask you to review the information you're about to send and ensure that nothing deemed sensitive is transmitted.
-- Copy of output saved to "issue_debug.md"

------------------------------------------------------------------------/

romans8 commented 3 years ago

Setup-Only

/ # tenable-jira /etc/tenable-jira/config.yaml --setup-only --troubleshoot

Configuration File:

jira:
  address: <REDACTED>
  api_token: <REDACTED>
  api_username: <REDACTED>
log:
  filename: /log/tenable.log
  format: '%(asctime)-15s %(name)s %(levelname)s %(message)s'
  level: 30
project:
  leadAccountId: <REDACTED>
service:
  interval: 24
tenable:
  access_key: <REDACTED>
  address: <REDACTED>
  platform: tenable.sc
  query_id: 568
  secret_key: <REDACTED>
  tio_severities:
  - critical
  - high
  - medium
  - low

Debug Logs

2020-11-24 20:42:03,334 root INFO Tenable2JiraCloud Version 1.1.17
2020-11-24 20:42:03,334 root INFO Using configuration file /etc/tenable-jira/config.yaml
2020-11-24 20:42:03,337 root INFO Running on Python 3.7.3 Linux/x86_64
2020-11-24 20:42:03,338 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/system", "params": {}, "body": {}}
2020-11-24 20:42:03,342 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <TENABLE_SC_HOST>:443
2020-11-24 20:42:03,535 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/system HTTP/1.1" 200 None
2020-11-24 20:42:03,539 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/project/VULN", "params": {}, "body": {}}
2020-11-24 20:42:03,540 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <JIRA_CLOUD_HOST>:443
2020-11-24 20:42:03,939 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/project/VULN HTTP/1.1" 200 None
2020-11-24 20:42:03,943 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {}}
2020-11-24 20:42:04,150 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/field HTTP/1.1" 200 None
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO Tenable Platform is customfield_10058 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO CVEs is customfield_10059 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO CVSSv2 Base Score is customfield_10060 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO CVSSv2 Temporal Score is customfield_10061 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO CVSSv3 Base Score is customfield_10062 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO CVSSv3 Temporal Score is customfield_10063 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO Patch Publication Date is customfield_10064 (existing)
2020-11-24 20:42:04,152 tenable_jira.jira.Jira INFO Tenable Plugin ID is customfield_10065 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Tenable Plugin Family is customfield_10066 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Tenable Plugin Name is customfield_10067 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Vulnerability Severity is customfield_10068 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Tenable Asset UUID is customfield_10069 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Tenable Asset Tags is customfield_10070 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device MAC Addresses is customfield_10071 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device IPv4 Addresses is customfield_10072 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device IPv6 Addresses is customfield_10073 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device Hostname is customfield_10074 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device NetBIOS Name is customfield_10075 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device DNS Name is customfield_10076 (existing)
2020-11-24 20:42:04,153 tenable_jira.jira.Jira INFO Device Network ID is customfield_10077 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability First Seen is customfield_10078 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Last Seen is customfield_10079 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Last Fixed is customfield_10080 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability State is customfield_10081 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Port is customfield_10082 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Protocol is customfield_10083 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Repository ID is customfield_10084 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Vulnerability Repository Name is customfield_10085 (existing)
2020-11-24 20:42:04,154 tenable_jira.jira.Jira INFO Tenable VPR Score is customfield_10086 (existing)
2020-11-24 20:42:04,155 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issuetype", "params": {}, "body": {}}
2020-11-24 20:42:04,300 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/issuetype HTTP/1.1" 200 None
2020-11-24 20:42:04,302 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens", "params": {"startAt": -100, "maxResults": 100}, "body": {}}
2020-11-24 20:42:04,448 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens?startAt=-100&maxResults=100 HTTP/1.1" 200 None
2020-11-24 20:42:04,450 tenable_jira.transform.Tio2Jira INFO Using JIRA Screens [10011, 10012]
2020-11-24 20:42:04,450 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs", "params": {}, "body": {}}
2020-11-24 20:42:04,592 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs HTTP/1.1" 200 None
2020-11-24 20:42:04,602 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {}}
2020-11-24 20:42:04,748 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-24 20:42:04,751 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10011:10016
2020-11-24 20:42:04,751 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10011:10016
2020-11-24 20:42:04,751 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10011:10016
2020-11-24 20:42:04,752 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10011:10016
2020-11-24 20:42:04,753 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10011:10016
2020-11-24 20:42:04,753 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10011:10016
2020-11-24 20:42:04,753 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10011:10016
2020-11-24 20:42:04,753 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10011:10016
2020-11-24 20:42:04,753 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {}}
2020-11-24 20:42:04,896 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-24 20:42:04,899 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10011:10017
2020-11-24 20:42:04,899 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10011:10017
2020-11-24 20:42:04,899 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10011:10017
2020-11-24 20:42:04,899 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10011:10017
2020-11-24 20:42:04,900 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10011:10017
2020-11-24 20:42:04,900 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10011:10017
2020-11-24 20:42:04,900 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10011:10017
2020-11-24 20:42:04,900 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10011:10017
2020-11-24 20:42:04,901 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10011:10017
2020-11-24 20:42:04,901 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10011:10017
2020-11-24 20:42:04,901 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10011:10017
2020-11-24 20:42:04,901 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10011:10017
2020-11-24 20:42:04,901 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs", "params": {}, "body": {}}
2020-11-24 20:42:05,052 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs HTTP/1.1" 200 None
2020-11-24 20:42:05,054 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {}}
2020-11-24 20:42:05,215 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-24 20:42:05,217 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10012:10018
2020-11-24 20:42:05,217 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10012:10018
2020-11-24 20:42:05,217 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10012:10018
2020-11-24 20:42:05,218 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10012:10018
2020-11-24 20:42:05,219 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10012:10018
2020-11-24 20:42:05,219 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10012:10018
2020-11-24 20:42:05,219 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10012:10018
2020-11-24 20:42:05,219 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {}}
2020-11-24 20:42:05,357 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10012:10019
2020-11-24 20:42:05,360 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10012:10019
2020-11-24 20:42:05,361 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10012:10019
2020-11-24 20:42:05,361 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10012:10019
2020-11-24 20:42:05,361 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10012:10019
2020-11-24 20:42:05,361 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10012:10019
2020-11-24 20:42:05,361 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/query/568?fields=filters", "params": {}, "body": {}}
2020-11-24 20:42:05,471 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/query/568?fields=filters HTTP/1.1" 200 123
2020-11-24 20:42:05,472 tenable.sc.TenableSC DEBUG {"method": "POST", "url": "https://<TENABLE_SC_HOST>:443/rest/analysis", "params": {}, "body": {"type": "vuln", "sourceType": "cumulative", "query": {"tool": "vulndetails", "type": "vuln", "filters": [{"filterName": "lastSeen", "operator": "=", "value": "0-1606250525"}], "startOffset": 0, "endOffset": 1000}}}
2020-11-24 20:42:11,413 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "POST /rest/analysis HTTP/1.1" 200 None
2020-11-24 20:42:11,453 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"10150\""}}
2020-11-24 20:42:11,690 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/search HTTP/1.1" 200 None
2020-11-24 20:42:11,693 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10064": "-1", "customfield_10065": "10150", "customfield_10066": "Windows", "customfield_10067": "Windows NetBIOS / SMB Remote Host Information Disclosure", "customfield_10068": "Info", "summary": "[10150] Windows NetBIOS / SMB Remote Host Information Disclosure", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.\n\nNote that this plugin gathers information to be used in other plugins, but does not itself generate a report."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}}
2020-11-24 20:42:11,909 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None
2020-11-24 20:42:11,911 restfly.errors.BadRequestError ERROR [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10064":"Field \'customfield_10064\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10065":"Field \'customfield_10065\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10066":"Field \'customfield_10066\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10067":"Field \'customfield_10067\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10068":"Field \'customfield_10068\' cannot be set. It is not on the appropriate screen, or unknown."}}'
2020-11-24 20:42:11,911 root ERROR Caught the following Exception
Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 363, in _process_open_vuln
    i = self._jira.issues.upsert(fields=issue, jql=' and '.join(jql))
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 48, in upsert
    issue = self.create(**kwargs)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 20, in create
    json=kwargs
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 563, in post
    return self._request('POST', path, **kwargs)
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 477, in _request
    raise err(resp, retries=retries, func=self._error_func)
restfly.errors.BadRequestError: [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":[],"errors":{"customfield_10064":"Field \'customfield_10064\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10065":"Field \'customfield_10065\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10066":"Field \'customfield_10066\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10067":"Field \'customfield_10067\' cannot be set. It is not on the appropriate screen, or unknown.","customfield_10068":"Field \'customfield_10068\' cannot be set. It is not on the appropriate screen, or unknown."}}'

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/cli.py", line 151, in cli
    ingest.ingest(observed_since)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 674, in ingest
    self.create_issues(vulns)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 477, in create_issues
    self._process_open_vuln(v, fid)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 366, in _process_open_vuln
    sys.exit(2)
SystemExit: 2

Available IssueTypes

10002: Task
10003: Sub-task
/-------------------------------NOTICE-----------------------------------\ The output above is helpful for us to troubleshoot exactly what is happening within the code and offer a diagnosis for how to correct. Please note that while some basic redaction has already been performed that we ask you to review the information you're about to send and ensure that nothing deemed sensitive is transmitted.
-- Copy of output saved to "issue_debug.md"

------------------------------------------------------------------------/

romans8 commented 3 years ago

Also found this an validated everything here. https://developer.atlassian.com/cloud/jira/platform/rest/v3/intro/#expansion

Permissions Operation permissions Most operations in this API require permissions. The calling user must have the required permissions for an operation to use it. Note that for Connect apps, the app user must have the required permissions for the operation and the app must have scopes that permit the operation.

A permission can be granted to a group, project role, or issue role that the user is a member of, or granted directly to a user. See Permissions overview for details. The most common permissions are:

Administer the Cloud site: Users in the site-admins group have this permission. See Manage groups for details. Administer Jira: Granted by the Jira Administrators global permission. Users in the administrators group have this permission. See Manage groups and Managing global permissions for details. Administer a project in Jira: Granted by the Administer projects project permission for a project. This can be granted to a user, a group, a project role, and more. See Managing project permissions for details. Access a project in Jira: Granted by the Browse projects project permission for a project. This can be granted to a user, a group, a project role, and more. See Managing project permissions for details. Access Jira: Granted by the Jira Users global permission. Users in the [product]-users (for example, jira-software-users) group have this permission. See Manage groups and Managing global permissions for details.

romans8 commented 3 years ago

After talking to Atlassian. This isn't a permissions issue because there is nothing to indicate that in the logs. This is a missing custom fields issue.

romans8 commented 3 years ago

Provided by Atlassian Looking at the log that you've provided, it seems that you do not have those custom fields on the screens of the project VULN. We believe that adding the custom fields to those screens should fix your problem.

Basically, you'll need to access the screens associated with the Task issue type:

VULN: Task Management Create Issue Screen (7) VULN: Task Management Edit/View Issue Screen (7) Then, you should add these fields to those screens: Patch Publication Date, Tenable Plugin ID, Tenable Plugin Family, Tenable Plugin Name and Vulnerability Severity.

After that, try to use the integration again, and just let me know if you face any problem.

SteveMcGrath commented 3 years ago

and I had talked to atlassian in the past with another customer on the line, and their API doesn't do a good job of informing WHY the failure occurred. It blindly assumes that the field isn't there as the script doesnt have the permissions to know that the field is there.

The screens identified from the logs are 10011 and 10012. If those screens are NOT part of that project, then you should manually identify the screens as mentioned in https://github.com/tenable/integration-jira-cloud/issues/23#issuecomment-604631753 and try again. If they ARE the right screens, then the permissions need to be added. This is documented at https://github.com/tenable/integration-jira-cloud/issues/28 and if you note, they were experiencing the same issues until they added the permissions mentioned.

romans8 commented 3 years ago

Manually added what was asked to the screens.

/etc/tenable-jira # tenable-jira config.yaml --troubleshoot

Configuration File:

jira:
  address: <REDACTED>
  api_token: <REDACTED>
  api_username: <REDACTED>
log:
  filename: /log/tenable.log
  format: '%(asctime)-15s %(name)s %(levelname)s %(message)s'
  level: 30
project:
  leadAccountId: <REDACTED>
service:
  interval: 24
tenable:
  access_key: <REDACTED>
  address: <REDACTED>
  platform: tenable.sc
  query_id: 568
  secret_key: <REDACTED>
  tio_severities:
  - critical
  - high
  - medium
  - low

Debug Logs

2020-11-30 21:01:26,020 root INFO Tenable2JiraCloud Version 1.1.17
2020-11-30 21:01:26,020 root INFO Using configuration file config.yaml
2020-11-30 21:01:26,023 root INFO Running on Python 3.7.3 Linux/x86_64
2020-11-30 21:01:26,025 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/system", "params": {}, "body": {}}
2020-11-30 21:01:26,028 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <TENABLE_SC_HOST>:443
2020-11-30 21:01:26,221 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/system HTTP/1.1" 200 None
2020-11-30 21:01:26,229 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/project/VULN", "params": {}, "body": {}}
2020-11-30 21:01:26,231 urllib3.connectionpool DEBUG Starting new HTTPS connection (1): <JIRA_CLOUD_HOST>:443
2020-11-30 21:01:26,758 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/project/VULN HTTP/1.1" 200 None
2020-11-30 21:01:26,762 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/field", "params": {}, "body": {}}
2020-11-30 21:01:27,019 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/field HTTP/1.1" 200 None
2020-11-30 21:01:27,020 tenable_jira.jira.Jira INFO Tenable Platform is customfield_10058 (existing)
2020-11-30 21:01:27,020 tenable_jira.jira.Jira INFO CVEs is customfield_10059 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO CVSSv2 Base Score is customfield_10060 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO CVSSv2 Temporal Score is customfield_10061 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO CVSSv3 Base Score is customfield_10062 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO CVSSv3 Temporal Score is customfield_10063 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Patch Publication Date is customfield_10064 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Tenable Plugin ID is customfield_10065 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Tenable Plugin Family is customfield_10066 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Tenable Plugin Name is customfield_10067 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability Severity is customfield_10068 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Tenable Asset UUID is customfield_10069 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Tenable Asset Tags is customfield_10070 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device MAC Addresses is customfield_10071 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device IPv4 Addresses is customfield_10072 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device IPv6 Addresses is customfield_10073 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device Hostname is customfield_10074 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device NetBIOS Name is customfield_10075 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device DNS Name is customfield_10076 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Device Network ID is customfield_10077 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability First Seen is customfield_10078 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability Last Seen is customfield_10079 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability Last Fixed is customfield_10080 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability State is customfield_10081 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability Port is customfield_10082 (existing)
2020-11-30 21:01:27,021 tenable_jira.jira.Jira INFO Vulnerability Protocol is customfield_10083 (existing)
2020-11-30 21:01:27,022 tenable_jira.jira.Jira INFO Vulnerability Repository ID is customfield_10084 (existing)
2020-11-30 21:01:27,022 tenable_jira.jira.Jira INFO Vulnerability Repository Name is customfield_10085 (existing)
2020-11-30 21:01:27,022 tenable_jira.jira.Jira INFO Tenable VPR Score is customfield_10086 (existing)
2020-11-30 21:01:27,022 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issuetype", "params": {}, "body": {}}
2020-11-30 21:01:27,168 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/issuetype HTTP/1.1" 200 None
2020-11-30 21:01:27,171 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens", "params": {"startAt": -100, "maxResults": 100}, "body": {}}
2020-11-30 21:01:27,323 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens?startAt=-100&maxResults=100 HTTP/1.1" 200 None
2020-11-30 21:01:27,325 tenable_jira.transform.Tio2Jira INFO Using JIRA Screens [10011, 10012]
2020-11-30 21:01:27,326 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs", "params": {}, "body": {}}
2020-11-30 21:01:27,479 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs HTTP/1.1" 200 None
2020-11-30 21:01:27,482 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10016/fields", "params": {}, "body": {}}
2020-11-30 21:01:27,637 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10016/fields HTTP/1.1" 200 None
2020-11-30 21:01:27,640 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10011:10016
2020-11-30 21:01:27,640 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10011:10016
2020-11-30 21:01:27,641 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10011:10016
2020-11-30 21:01:27,642 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10011/tabs/10017/fields", "params": {}, "body": {}}
2020-11-30 21:01:27,802 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10011/tabs/10017/fields HTTP/1.1" 200 None
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10011:10017
2020-11-30 21:01:27,805 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10011:10017
2020-11-30 21:01:27,806 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs", "params": {}, "body": {}}
2020-11-30 21:01:27,945 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs HTTP/1.1" 200 None
2020-11-30 21:01:27,947 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10018/fields", "params": {}, "body": {}}
2020-11-30 21:01:28,103 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10018/fields HTTP/1.1" 200 None
2020-11-30 21:01:28,105 tenable_jira.transform.Tio2Jira INFO CVEs already exists in 10012:10018
2020-11-30 21:01:28,106 tenable_jira.transform.Tio2Jira INFO Tenable VPR Score already exists in 10012:10018
2020-11-30 21:01:28,106 tenable_jira.transform.Tio2Jira INFO CVSSv2 Base Score already exists in 10012:10018
2020-11-30 21:01:28,106 tenable_jira.transform.Tio2Jira INFO CVSSv2 Temporal Score already exists in 10012:10018
2020-11-30 21:01:28,106 tenable_jira.transform.Tio2Jira INFO CVSSv3 Base Score already exists in 10012:10018
2020-11-30 21:01:28,106 tenable_jira.transform.Tio2Jira INFO CVSSv3 Temporal Score already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Tenable Plugin ID already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Family already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Tenable Plugin Name already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Vulnerability Severity already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Vulnerability First Seen already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Seen already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Vulnerability Last Fixed already exists in 10012:10018
2020-11-30 21:01:28,107 tenable_jira.transform.Tio2Jira INFO Vulnerability State already exists in 10012:10018
2020-11-30 21:01:28,108 tenable_jira.transform.Tio2Jira INFO Vulnerability Port already exists in 10012:10018
2020-11-30 21:01:28,108 tenable_jira.transform.Tio2Jira INFO Vulnerability Protocol already exists in 10012:10018
2020-11-30 21:01:28,108 tenable_jira.transform.Tio2Jira INFO Patch Publication Date already exists in 10012:10018
2020-11-30 21:01:28,108 tenable_jira.jira.Jira DEBUG Request:{"method": "GET", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/screens/10012/tabs/10019/fields", "params": {}, "body": {}}
2020-11-30 21:01:28,263 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "GET /rest/api/3/screens/10012/tabs/10019/fields HTTP/1.1" 200 None
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Tenable Asset UUID already exists in 10012:10019
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Tenable Asset Tags already exists in 10012:10019
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Tenable Platform already exists in 10012:10019
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Device Hostname already exists in 10012:10019
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Device NetBIOS Name already exists in 10012:10019
2020-11-30 21:01:28,266 tenable_jira.transform.Tio2Jira INFO Device DNS Name already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Device IPv4 Addresses already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Device IPv6 Addresses already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Device MAC Addresses already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Device Network ID already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository ID already exists in 10012:10019
2020-11-30 21:01:28,267 tenable_jira.transform.Tio2Jira INFO Vulnerability Repository Name already exists in 10012:10019
2020-11-30 21:01:28,268 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://<TENABLE_SC_HOST>:443/rest/query/568?fields=filters", "params": {}, "body": {}}
2020-11-30 21:01:28,383 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "GET /rest/query/568?fields=filters HTTP/1.1" 200 123
2020-11-30 21:01:28,384 tenable.sc.TenableSC DEBUG {"method": "POST", "url": "https://<TENABLE_SC_HOST>:443/rest/analysis", "params": {}, "body": {"type": "vuln", "sourceType": "cumulative", "query": {"tool": "vulndetails", "type": "vuln", "filters": [{"filterName": "lastSeen", "operator": "=", "value": "0-1606770088"}], "startOffset": 0, "endOffset": 1000}}}
2020-11-30 21:01:34,237 urllib3.connectionpool DEBUG https://<TENABLE_SC_HOST>:443 "POST /rest/analysis HTTP/1.1" 200 None
2020-11-30 21:01:34,276 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"10150\""}}
2020-11-30 21:01:34,530 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/search HTTP/1.1" 200 None
2020-11-30 21:01:34,532 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https://<JIRA_CLOUD_HOST>/rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10064": "-1", "customfield_10065": "10150", "customfield_10066": "Windows", "customfield_10067": "Windows NetBIOS / SMB Remote Host Information Disclosure", "customfield_10068": "Info", "summary": "[10150] Windows NetBIOS / SMB Remote Host Information Disclosure", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote host is listening on UDP port 137 or TCP port 445, and replies to NetBIOS nbtscan or SMB requests.\n\nNote that this plugin gathers information to be used in other plugins, but does not itself generate a report."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}}
2020-11-30 21:01:34,800 urllib3.connectionpool DEBUG https://<JIRA_CLOUD_HOST>:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None
2020-11-30 21:01:34,803 restfly.errors.BadRequestError ERROR [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":["We can\'t create this issue for you right now, it could be due to unsupported content you\'ve entered into one or more of the issue fields. If this situation persists, contact your administrator as they\'ll be able to access more specific information in the log file."],"errors":{}}'
2020-11-30 21:01:34,803 root ERROR Caught the following Exception
Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 363, in _process_open_vuln
    i = self._jira.issues.upsert(fields=issue, jql=' and '.join(jql))
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 48, in upsert
    issue = self.create(**kwargs)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/jira/issues.py", line 20, in create
    json=kwargs
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 563, in post
    return self._request('POST', path, **kwargs)
  File "/usr/local/lib/python3.7/site-packages/restfly/session.py", line 477, in _request
    raise err(resp, retries=retries, func=self._error_func)
restfly.errors.BadRequestError: [400: POST] https://<JIRA_CLOUD_HOST>/rest/api/3/issue?update_history=False body=b'{"errorMessages":["We can\'t create this issue for you right now, it could be due to unsupported content you\'ve entered into one or more of the issue fields. If this situation persists, contact your administrator as they\'ll be able to access more specific information in the log file."],"errors":{}}'

During handling of the above exception, another exception occurred:

Traceback (most recent call last):
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/cli.py", line 151, in cli
    ingest.ingest(observed_since)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 674, in ingest
    self.create_issues(vulns)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 477, in create_issues
    self._process_open_vuln(v, fid)
  File "/usr/local/lib/python3.7/site-packages/tenable_jira/transform.py", line 366, in _process_open_vuln
    sys.exit(2)
SystemExit: 2

Available IssueTypes

10002: Task
10003: Sub-task
/-------------------------------NOTICE-----------------------------------\ The output above is helpful for us to troubleshoot exactly what is happening within the code and offer a diagnosis for how to correct. Please note that while some basic redaction has already been performed that we ask you to review the information you're about to send and ensure that nothing deemed sensitive is transmitted.
-- Copy of output saved to "issue_debug.md"

------------------------------------------------------------------------/

romans8 commented 3 years ago

Going to try to add the following to the config.

jira: ignore_errors: true

romans8 commented 3 years ago

Added the following to screens:

VULN: Task Management Create Issue Screen (7) VULN: Task Management Edit/View Issue Screen (7)

CVEs CVSSv2 Base Score CVSSv2 Temporal Score CVSSv3 Base Score CVSSv3 Temporal Score Device DNS Name Device IPv4 Addresses Device IPv6 Addresses Device Hostname Device MAC Addresses Device NetBIOS Name Device Network ID Tenable Asset UUID Tenable Platform Tenable Plugin Family Tenable Plugin ID Tenable Plugin Name Tenable VPR Score Vulnerability First Seen Vulnerability Last Seen Vulnerability Last Fixed Vulnerability State Vulnerability Port Vulnerability Protocol Vulnerability Repository ID Vulnerability Repository Name Vulnerability Severity

romans8 commented 3 years ago

2020-11-30 21:48:04,648 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:04,650 tenable_jira.jira.Jira INFO UPDATED VULN-94 [10.200.1.232/445/TCP] [137266] Security Updates for Internet Explorer (June 2020) 2020-11-30 21:48:04,651 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10410", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "7.6", "customfield_10061": "6.0", "customfield_10062": "7.5", "customfield_10063": "6.7", "customfield_10064": "1591722000", "customfield_10065": "137266", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (June 2020)", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "6.7", "summary": "[10.200.1.232/445/TCP] [137266] Security Updates for Internet Explorer (June 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when Internet Explorer improperly handles objects in memory.\n An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2020-1315)\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1219)\n\n - A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1213, CVE-2020-1214, CVE-2020-1215, CVE-2020-1216, CVE-2020-1230, CVE-2020-1260)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4561603\n -KB4561643\n -KB4561670\n -KB4561666"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-159"}}}} 2020-11-30 21:48:04,929 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10410?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:04,932 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"138460\""}} 2020-11-30 21:48:05,205 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:05,208 tenable_jira.jira.Jira INFO UPDATED VULN-160 [138460] KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update 2020-11-30 21:48:05,209 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10631", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-1085", "CVE-2020-1147", "CVE-2020-1267", "CVE-2020-1333", "CVE-2020-1346", "CVE-2020-1351", "CVE-2020-1354", "CVE-2020-1359", "CVE-2020-1360", "CVE-2020-1365", "CVE-2020-1371", "CVE-2020-1373", "CVE-2020-1374", "CVE-2020-1384", "CVE-2020-1389", "CVE-2020-1390", "CVE-2020-1396", "CVE-2020-1397", "CVE-2020-1400", "CVE-2020-1401", "CVE-2020-1402", "CVE-2020-1403", "CVE-2020-1407", "CVE-2020-1408", "CVE-2020-1409", "CVE-2020-1410", "CVE-2020-1412", "CVE-2020-1419", "CVE-2020-1421", "CVE-2020-1427", "CVE-2020-1428", "CVE-2020-1430", "CVE-2020-1432", "CVE-2020-1435", "CVE-2020-1436", "CVE-2020-1437", "CVE-2020-1438", "CVE-2020-1468"], "customfield_10060": "9.3", "customfield_10061": "8.1", "customfield_10062": "8.8", "customfield_10063": "8.4", "customfield_10064": "1594746000", "customfield_10065": "138460", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update", "customfield_10068": "High", "customfield_10086": "9.4", "summary": "[138460] KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4565539 or cumulative update 4565524. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory. (CVE-2020-1409)\n\n - An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1360)\n\n - A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1403)\n\n - A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n (CVE-2020-1374)\n\n - A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability:\n (CVE-2020-1436)\n\n - An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.\n (CVE-2020-1354, CVE-2020-1430)\n\n - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2020-1468)\n\n - An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.\n (CVE-2020-1365, CVE-2020-1371)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. (CVE-2020-1437)\n\n - An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.\n There are multiple ways an attacker could exploit this vulnerability: (CVE-2020-1397)\n\n - A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files. (CVE-2020-1410)\n\n - An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component handles objects in memory. (CVE-2020-1351)\n\n - An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points. An attacker who successfully exploited this vulnerability could overwrite a targeted file that would normally require elevated permissions.\n (CVE-2020-1333)\n\n - A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1408)\n\n - An elevation of privilege vulnerability exists when the Windows Modules Installer improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1346)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n (CVE-2020-1396)\n\n - An information disclosure vulnerability exists when Skype for Business is accessed via Internet Explorer. An attacker who exploited the vulnerability could cause the user to place a call without additional consent, leading to information disclosure of the user profile. For the vulnerability to be exploited, a user must click a specially crafted URL that prompts the Skype app.\n (CVE-2020-1432)\n\n - An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory. (CVE-2020-1402)\n\n - A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. (CVE-2020-1147)\n\n - An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-1359, CVE-2020-1384)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-1085)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-1412)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1400, CVE-2020-1401, CVE-2020-1407)\n\n - An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-1389, CVE-2020-1419)\n\n - This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests. (CVE-2020-1267)\n\n - A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take c..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4565539 or Cumulative Update KB4565524."}]}]}}}} 2020-11-30 21:48:05,454 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10631?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:05,455 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"138460\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:05,814 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:05,818 tenable_jira.jira.Jira INFO UPDATED VULN-96 [10.200.1.232/445/TCP] [138460] KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update 2020-11-30 21:48:05,818 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10412", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "9.3", "customfield_10061": "8.1", "customfield_10062": "8.8", "customfield_10063": "8.4", "customfield_10064": "1594746000", "customfield_10065": "138460", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "9.4", "summary": "[10.200.1.232/445/TCP] [138460] KB4565539: Windows 7 and Windows Server 2008 R2 July 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4565539 or cumulative update 4565524. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in the way that DirectWrite handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage. The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory. (CVE-2020-1409)\n\n - An elevation of privilege vulnerability exists when the Windows Profile Service improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1360)\n\n - A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1403)\n\n - A remote code execution vulnerability exists in the Windows Remote Desktop Client when a user connects to a malicious server. An attacker who successfully exploited this vulnerability could execute arbitrary code on the computer of the connecting client. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n (CVE-2020-1374)\n\n - A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts. For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely. For systems running Windows 10, an attacker who successfully exploited the vulnerability could execute code in an AppContainer sandbox context with limited privileges and capabilities. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability:\n (CVE-2020-1436)\n\n - An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.\n (CVE-2020-1354, CVE-2020-1430)\n\n - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2020-1468)\n\n - An elevation of privilege vulnerability exists when the Windows Event Logging Service improperly handles memory.\n (CVE-2020-1365, CVE-2020-1371)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Location Awareness Service handles objects in memory. An attacker who successfully exploited the vulnerability could allow an application with limited privileges on an affected system to execute code at a medium integrity level. (CVE-2020-1437)\n\n - An information disclosure vulnerability exists in Windows when the Windows Imaging Component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the user's system.\n There are multiple ways an attacker could exploit this vulnerability: (CVE-2020-1397)\n\n - A remote code execution vulnerability exists when Windows Address Book (WAB) improperly processes vcard files. (CVE-2020-1410)\n\n - An information disclosure vulnerability exists when the Windows Graphics component improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. An authenticated attacker could exploit this vulnerability by running a specially crafted application. The update addresses the vulnerability by correcting how the Windows Graphics Component handles objects in memory. (CVE-2020-1351)\n\n - An elevation of privilege vulnerability exists when Group Policy Services Policy Processing improperly handle reparse points. An attacker who successfully exploited this vulnerability could overwrite a targeted file that would normally require elevated permissions.\n (CVE-2020-1333)\n\n - A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted embedded fonts. An attacker who successfully exploited the vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1408)\n\n - An elevation of privilege vulnerability exists when the Windows Modules Installer improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1346)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles calls to Advanced Local Procedure Call (ALPC). An attacker who successfully exploited this vulnerability could run arbitrary code in the security context of the local system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.\n (CVE-2020-1396)\n\n - An information disclosure vulnerability exists when Skype for Business is accessed via Internet Explorer. An attacker who exploited the vulnerability could cause the user to place a call without additional consent, leading to information disclosure of the user profile. For the vulnerability to be exploited, a user must click a specially crafted URL that prompts the Skype app.\n (CVE-2020-1432)\n\n - An elevation of privilege vulnerability exists when the Windows ActiveX Installer Service improperly handles memory. (CVE-2020-1402)\n\n - A remote code execution vulnerability exists in .NET Framework, Microsoft SharePoint, and Visual Studio when the software fails to check the source markup of XML file input. An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the process responsible for deserialization of the XML content. (CVE-2020-1147)\n\n - An elevation of privilege vulnerability exists when the Windows Cryptography Next Generation (CNG) Key Isolation service improperly handles memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-1359, CVE-2020-1384)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-1373, CVE-2020-1390, CVE-2020-1427, CVE-2020-1428, CVE-2020-1438)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Function Discovery Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-1085)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-1412)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1400, CVE-2020-1401, CVE-2020-1407)\n\n - An information disclosure vulnerability exists when the Windows kernel fails to properly initialize a memory address. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-1389, CVE-2020-1419)\n\n - This security update corrects a denial of service in the Local Security Authority Subsystem Service (LSASS) caused when an authenticated attacker sends a specially crafted authentication request. A remote attacker who successfully exploited this vulnerability could cause a denial of service on the target system's LSASS service, which triggers an automatic reboot of the system. The security update addresses the vulnerability by changing the way that LSASS handles specially crafted authentication requests. (CVE-2020-1267)\n\n - A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take c..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4565539 or Cumulative Update KB4565524."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-160"}}}} 2020-11-30 21:48:06,103 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10412?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:06,107 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"138467\""}} 2020-11-30 21:48:06,460 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:06,461 tenable_jira.jira.Jira INFO UPDATED VULN-161 [138467] Security Updates for Internet Explorer (July 2020) 2020-11-30 21:48:06,461 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10632", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-1403", "CVE-2020-1432"], "customfield_10060": "7.6", "customfield_10061": "5.6", "customfield_10062": "7.5", "customfield_10063": "6.5", "customfield_10064": "1594746000", "customfield_10065": "138467", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (July 2020)", "customfield_10068": "High", "customfield_10086": "5.9", "summary": "[138467] Security Updates for Internet Explorer (July 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when Skype for Business is accessed via Internet Explorer. An attacker who exploited the vulnerability could cause the user to place a call without additional consent, leading to information disclosure of the user profile. For the vulnerability to be exploited, a user must click a specially crafted URL that prompts the Skype app.\n (CVE-2020-1432)\n\n - A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1403)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4565541\n -KB4565524\n -KB4565479\n -KB4565536"}]}]}}}} 2020-11-30 21:48:06,916 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10632?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:06,920 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"138467\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:07,333 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:07,335 tenable_jira.jira.Jira INFO UPDATED VULN-98 [10.200.1.232/445/TCP] [138467] Security Updates for Internet Explorer (July 2020) 2020-11-30 21:48:07,336 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10414", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "7.6", "customfield_10061": "5.6", "customfield_10062": "7.5", "customfield_10063": "6.5", "customfield_10064": "1594746000", "customfield_10065": "138467", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (July 2020)", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "5.9", "summary": "[10.200.1.232/445/TCP] [138467] Security Updates for Internet Explorer (July 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An information disclosure vulnerability exists when Skype for Business is accessed via Internet Explorer. An attacker who exploited the vulnerability could cause the user to place a call without additional consent, leading to information disclosure of the user profile. For the vulnerability to be exploited, a user must click a specially crafted URL that prompts the Skype app.\n (CVE-2020-1432)\n\n - A remote code execution vulnerability exists in the way that the VBScript engine handles objects in memory. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-1403)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4565541\n -KB4565524\n -KB4565479\n -KB4565536"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-161"}}}} 2020-11-30 21:48:07,585 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10414?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:07,588 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"139491\""}} 2020-11-30 21:48:07,883 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:07,885 tenable_jira.jira.Jira INFO UPDATED VULN-162 [139491] KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update 2020-11-30 21:48:07,885 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10633", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-1046", "CVE-2020-1337", "CVE-2020-1339", "CVE-2020-1377", "CVE-2020-1378", "CVE-2020-1379", "CVE-2020-1380", "CVE-2020-1383", "CVE-2020-1464", "CVE-2020-1467", "CVE-2020-1470", "CVE-2020-1472", "CVE-2020-1473", "CVE-2020-1474", "CVE-2020-1475", "CVE-2020-1476", "CVE-2020-1477", "CVE-2020-1478", "CVE-2020-1484", "CVE-2020-1485", "CVE-2020-1486", "CVE-2020-1489", "CVE-2020-1513", "CVE-2020-1515", "CVE-2020-1516", "CVE-2020-1517", "CVE-2020-1518", "CVE-2020-1519", "CVE-2020-1520", "CVE-2020-1529", "CVE-2020-1530", "CVE-2020-1534", "CVE-2020-1537", "CVE-2020-1538", "CVE-2020-1552", "CVE-2020-1554", "CVE-2020-1557", "CVE-2020-1558", "CVE-2020-1562", "CVE-2020-1564", "CVE-2020-1567", "CVE-2020-1570", "CVE-2020-1577", "CVE-2020-1579", "CVE-2020-1584", "CVE-2020-1587"], "customfield_10060": "9.3", "customfield_10061": "8.1", "customfield_10062": "7.8", "customfield_10063": "7.5", "customfield_10064": "1597165200", "customfield_10065": "139491", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update", "customfield_10068": "High", "customfield_10086": "10.0", "summary": "[139491] KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4571719 or cumulative update 4571729. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Codec handles objects. (CVE-2020-1339)\n\n - An elevation of privilege vulnerability exists in the way that the srmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1475)\n\n - An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.\n (CVE-2020-1577)\n\n - An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system (CVE-2020-1383)\n\n - A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory.\n An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory. (CVE-2020-1379, CVE-2020-1477, CVE-2020-1478, CVE-2020-1554)\n\n - An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1486)\n\n - An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory.\n (CVE-2020-1470, CVE-2020-1484, CVE-2020-1516)\n\n - An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.\n (CVE-2020-1489, CVE-2020-1513)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.\n (CVE-2020-1467)\n\n - A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory. (CVE-2020-1520)\n\n - An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.\n (CVE-2020-1519, CVE-2020-1538)\n\n - An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Work Folder Service handles file operations. (CVE-2020-1552)\n\n - An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory.\n (CVE-2020-1515)\n\n - An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. (CVE-2020-1517, CVE-2020-1518)\n\n - An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1584)\n\n - An elevation of privilege vulnerability exists when Windows Remote Access improperly handles memory.\n (CVE-2020-1530)\n\n - An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1537)\n\n - An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. (CVE-2020-1534)\n\n - An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. (CVE-2020-1472)\n\n - An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.\n (CVE-2020-1377, CVE-2020-1378)\n\n - An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1337)\n\n - An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system.\n (CVE-2020-1474, CVE-2020-1485)\n\n - An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory. (CVE-2020-1587)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1473, CVE-2020-1557, CVE-2020-1558, CVE-2020-1564)\n\n - A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. (CVE-2020-1046)\n\n - A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. (CVE-2020-1567)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1529)\n\n - A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.\n (CVE-2020-1380, CVE-2020-1570)\n\n - An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. (CVE-2020-1579)\n\n - An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. (CVE-2020-1476)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-1562)\n\n - A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploit..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4571719 or Cumulative Update KB4571729."}]}]}}}} 2020-11-30 21:48:08,154 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10633?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:08,161 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"139491\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:08,572 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:08,575 tenable_jira.jira.Jira INFO UPDATED VULN-100 [10.200.1.232/445/TCP] [139491] KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update 2020-11-30 21:48:08,583 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10416", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "9.3", "customfield_10061": "8.1", "customfield_10062": "7.8", "customfield_10063": "7.5", "customfield_10064": "1597165200", "customfield_10065": "139491", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "10.0", "summary": "[10.200.1.232/445/TCP] [139491] KB4571719: Windows 7 and Windows Server 2008 R2 August 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4571719 or cumulative update 4571729. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists when Windows Media Audio Codec improperly handles objects. An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Codec handles objects. (CVE-2020-1339)\n\n - An elevation of privilege vulnerability exists in the way that the srmsvc.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1475)\n\n - An information disclosure vulnerability exists when DirectWrite improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how DirectWrite handles objects in memory.\n (CVE-2020-1577)\n\n - An information disclosure vulnerability exists in RPC if the server has Routing and Remote Access enabled. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system (CVE-2020-1383)\n\n - A memory corruption vulnerability exists when Windows Media Foundation improperly handles objects in memory.\n An attacker who successfully exploited the vulnerability could install programs; view, change, or delete data; or create new accounts with full user rights. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Foundation handles objects in memory. (CVE-2020-1379, CVE-2020-1477, CVE-2020-1478, CVE-2020-1554)\n\n - An elevation of privilege vulnerability exists when the Windows kernel fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode.\n An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1486)\n\n - An elevation of privilege vulnerability exists when the Windows Work Folders Service improperly handles memory.\n (CVE-2020-1470, CVE-2020-1484, CVE-2020-1516)\n\n - An elevation of privilege vulnerability exists when the Windows CSC Service improperly handles memory.\n (CVE-2020-1489, CVE-2020-1513)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles hard links. An attacker who successfully exploited this vulnerability could overwrite a targeted file leading to an elevated status.\n (CVE-2020-1467)\n\n - A remote code execution vulnerability exists when the Windows Font Driver Host improperly handles memory. An attacker who successfully exploited the vulnerability would gain execution on a victim system. The security update addresses the vulnerability by correcting how the Windows Font Driver Host handles memory. (CVE-2020-1520)\n\n - An elevation of privilege vulnerability exists when the Windows UPnP Device Host improperly handles memory.\n (CVE-2020-1519, CVE-2020-1538)\n\n - An elevation of privilege vulnerability exists when the Windows Work Folder Service improperly handles file operations. An attacker who successfully exploited this vulnerability could run processes in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Work Folder Service handles file operations. (CVE-2020-1552)\n\n - An elevation of privilege vulnerability exists when the Windows Telephony Server improperly handles memory.\n (CVE-2020-1515)\n\n - An elevation of privilege vulnerability exists when the Windows File Server Resource Management Service improperly handles memory. (CVE-2020-1517, CVE-2020-1518)\n\n - An elevation of privilege vulnerability exists in the way that the dnsrslvr.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1584)\n\n - An elevation of privilege vulnerability exists when Windows Remote Access improperly handles memory.\n (CVE-2020-1530)\n\n - An elevation of privilege vulnerability exists when the Windows Remote Access improperly handles file operations. An attacker who successfully exploited this vulnerability could gain elevated privileges.\n (CVE-2020-1537)\n\n - An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. (CVE-2020-1534)\n\n - An elevation of privilege vulnerability exists when an attacker establishes a vulnerable Netlogon secure channel connection to a domain controller, using the Netlogon Remote Protocol (MS-NRPC). An attacker who successfully exploited the vulnerability could run a specially crafted application on a device on the network. (CVE-2020-1472)\n\n - An elevation of privilege vulnerability exists when the Windows Kernel API improperly handles registry objects in memory. An attacker who successfully exploited the vulnerability could gain elevated privileges on a targeted system. A locally authenticated attacker could exploit this vulnerability by running a specially crafted application. The security update addresses the vulnerability by helping to ensure that the Windows Kernel API properly handles objects in memory.\n (CVE-2020-1377, CVE-2020-1378)\n\n - An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1337)\n\n - An information disclosure vulnerability exists when the Windows Image Acquisition (WIA) Service improperly discloses contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system.\n (CVE-2020-1474, CVE-2020-1485)\n\n - An elevation of privilege vulnerability exists when the Windows Ancillary Function Driver for WinSock improperly handles memory. (CVE-2020-1587)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1473, CVE-2020-1557, CVE-2020-1558, CVE-2020-1564)\n\n - A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. (CVE-2020-1046)\n\n - A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. (CVE-2020-1567)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1529)\n\n - A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.\n (CVE-2020-1380, CVE-2020-1570)\n\n - An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. (CVE-2020-1579)\n\n - An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. (CVE-2020-1476)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-1562)\n\n - A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploit..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4571719 or Cumulative Update KB4571729."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-162"}}}} 2020-11-30 21:48:08,851 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10416?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:08,854 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"139498\""}} 2020-11-30 21:48:09,161 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:09,163 tenable_jira.jira.Jira INFO UPDATED VULN-163 [139498] Security Updates for Internet Explorer (August 2020) 2020-11-30 21:48:09,163 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10634", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-1380", "CVE-2020-1567", "CVE-2020-1570"], "customfield_10060": "7.6", "customfield_10061": "5.6", "customfield_10062": "7.5", "customfield_10063": "6.5", "customfield_10064": "1597165200", "customfield_10065": "139498", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (August 2020)", "customfield_10068": "High", "customfield_10086": "9.7", "summary": "[139498] Security Updates for Internet Explorer (August 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. (CVE-2020-1567)\n\n - A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.\n (CVE-2020-1380, CVE-2020-1570)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4571729\n -KB4571687\n -KB4571703\n -KB4571730"}]}]}}}} 2020-11-30 21:48:09,428 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10634?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:09,429 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"139498\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:09,840 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:09,842 tenable_jira.jira.Jira INFO UPDATED VULN-102 [10.200.1.232/445/TCP] [139498] Security Updates for Internet Explorer (August 2020) 2020-11-30 21:48:09,843 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10418", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "7.6", "customfield_10061": "5.6", "customfield_10062": "7.5", "customfield_10063": "6.5", "customfield_10064": "1597165200", "customfield_10065": "139498", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (August 2020)", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "9.7", "summary": "[10.200.1.232/445/TCP] [139498] Security Updates for Internet Explorer (August 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - A remote code execution vulnerability exists in the way that the MSHTML engine improperly validates input. An attacker could execute arbitrary code in the context of the current user. (CVE-2020-1567)\n\n - A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer. The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user.\n (CVE-2020-1380, CVE-2020-1570)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4571729\n -KB4571687\n -KB4571703\n -KB4571730"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-163"}}}} 2020-11-30 21:48:10,077 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10418?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:10,079 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"139598\""}} 2020-11-30 21:48:10,344 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:10,348 tenable_jira.jira.Jira INFO UPDATED VULN-164 [139598] Security Updates for Microsoft .NET Framework (August 2020) 2020-11-30 21:48:10,348 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10635", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-1046", "CVE-2020-1476"], "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "7.8", "customfield_10063": "6.8", "customfield_10064": "1597251600", "customfield_10065": "139598", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Microsoft .NET Framework (August 2020)", "customfield_10068": "High", "customfield_10086": "6.7", "summary": "[139598] Security Updates for Microsoft .NET Framework (August 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Microsoft .NET Framework installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. (CVE-2020-1476)\n\n - A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. (CVE-2020-1046)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released security updates for Microsoft .NET Framework."}]}]}}}} 2020-11-30 21:48:10,573 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10635?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:10,574 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"139598\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:10,970 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:10,973 tenable_jira.jira.Jira INFO UPDATED VULN-104 [10.200.1.232/445/TCP] [139598] Security Updates for Microsoft .NET Framework (August 2020) 2020-11-30 21:48:10,973 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10420", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "7.8", "customfield_10063": "6.8", "customfield_10064": "1597251600", "customfield_10065": "139598", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Microsoft .NET Framework (August 2020)", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "6.7", "summary": "[10.200.1.232/445/TCP] [139598] Security Updates for Microsoft .NET Framework (August 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Microsoft .NET Framework installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when ASP.NET or .NET web applications running on IIS improperly allow access to cached files. An attacker who successfully exploited this vulnerability could gain access to restricted files. (CVE-2020-1476)\n\n - A remote code execution vulnerability exists when Microsoft .NET Framework processes input. An attacker who successfully exploited this vulnerability could take control of an affected system. (CVE-2020-1046)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released security updates for Microsoft .NET Framework."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-164"}}}} 2020-11-30 21:48:11,232 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10420?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:11,234 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"139785\""}} 2020-11-30 21:48:11,448 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:11,450 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10064": "-1", "customfield_10065": "139785", "customfield_10066": "Windows", "customfield_10067": "DISM Package List (Windows)", "customfield_10068": "Info", "summary": "[139785] DISM Package List (Windows)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Using the Deployment Image Servicing Management tool, this plugin enumerates installed packages."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}} 2020-11-30 21:48:11,682 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None 2020-11-30 21:48:11,685 restfly.errors.BadRequestError ERROR [400: POST] https:///rest/api/3/issue?update_history=False body=b'{"errorMessages":["We can\'t create this issue for you right now, it could be due to unsupported content you\'ve entered into one or more of the issue fields. If this situation persists, contact your administrator as they\'ll be able to access more specific information in the log file."],"errors":{}}' 2020-11-30 21:48:11,687 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"140422\""}} 2020-11-30 21:48:11,688 urllib3.connectionpool DEBUG Resetting dropped connection: 2020-11-30 21:48:12,220 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:12,223 tenable_jira.jira.Jira INFO UPDATED VULN-165 [140422] KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update 2020-11-30 21:48:12,223 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10637", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-0648", "CVE-2020-0664", "CVE-2020-0718", "CVE-2020-0761", "CVE-2020-0782", "CVE-2020-0790", "CVE-2020-0836", "CVE-2020-0838", "CVE-2020-0856", "CVE-2020-0878", "CVE-2020-0911", "CVE-2020-0912", "CVE-2020-0921", "CVE-2020-0922", "CVE-2020-1012", "CVE-2020-1013", "CVE-2020-1030", "CVE-2020-1031", "CVE-2020-1038", "CVE-2020-1039", "CVE-2020-1052", "CVE-2020-1074", "CVE-2020-1083", "CVE-2020-1091", "CVE-2020-1097", "CVE-2020-1115", "CVE-2020-1228", "CVE-2020-1245", "CVE-2020-1250", "CVE-2020-1252", "CVE-2020-1256", "CVE-2020-1285", "CVE-2020-1319", "CVE-2020-1376", "CVE-2020-1491", "CVE-2020-1508", "CVE-2020-1559", "CVE-2020-1589", "CVE-2020-1593", "CVE-2020-1596", "CVE-2020-1598"], "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "8.8", "customfield_10063": "7.7", "customfield_10064": "1599584400", "customfield_10065": "140422", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update", "customfield_10068": "High", "customfield_10086": "9.0", "summary": "[140422] KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4577053 or cumulative update 4577051. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the Windows RSoP Service Application improperly handles memory. (CVE-2020-0648)\n\n - An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1030)\n\n - A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive.\n (CVE-2020-0836, CVE-2020-1228)\n\n - An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2020-0921, CVE-2020-1083)\n\n - A remote code execution vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account (CVE-2020-0718, CVE-2020-0761)\n\n - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1245)\n\n - A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects.\n An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects. (CVE-2020-1508, CVE-2020-1593)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1039, CVE-2020-1074)\n\n - An information disclosure vulnerability exists when the win32k component improperly provides kernel information.\n An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2020-1250)\n\n - An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1052)\n\n - An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. (CVE-2020-0912)\n\n - An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1598)\n\n - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-1589)\n\n - A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1285)\n\n - A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory.\n An attacker who successfully exploited the vulnerability could cause a target system to stop responding.\n (CVE-2020-1038)\n\n - A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls.. (CVE-2020-0790)\n\n - An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services improperly handle objects in memory. An attacker who successfully exploited this vulnerability could modify the cryptographic catalog. (CVE-2020-0782)\n\n - A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.\n An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory. (CVE-2020-1319)\n\n - An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory. (CVE-2020-1031)\n\n - A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-0922)\n\n - A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel. (CVE-2020-1596)\n\n - An elevation of privilege vulnerability exists in the way that fdSSDP.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1376)\n\n - An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Modules Installer handles objects in memory. (CVE-2020-0911)\n\n - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2020-1256)\n\n - An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-1115)\n\n - A remote code execution vulnerability exists when Windows improperly handles objects in memory.\n (CVE-2020-1252)\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-0878)\n\n - An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. There are multiple ways an attacker could exploit the vulnerability: (CVE-2020-1012)\n\n - An elevation of pr..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4577053 or Cumulative Update KB4577051."}]}]}}}} 2020-11-30 21:48:12,487 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10637?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:12,488 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"140422\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:12,894 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:12,896 tenable_jira.jira.Jira INFO UPDATED VULN-106 [10.200.1.232/445/TCP] [140422] KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update 2020-11-30 21:48:12,897 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10423", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "8.8", "customfield_10063": "7.7", "customfield_10064": "1599584400", "customfield_10065": "140422", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "9.0", "summary": "[10.200.1.232/445/TCP] [140422] KB4577053: Windows 7 and Windows Server 2008 R2 September 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4577053 or cumulative update 4577051. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the Windows RSoP Service Application improperly handles memory. (CVE-2020-0648)\n\n - An elevation of privilege vulnerability exists when the Windows Print Spooler service improperly allows arbitrary writing to the file system. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1030)\n\n - A denial of service vulnerability exists in Windows DNS when it fails to properly handle queries. An attacker who successfully exploited this vulnerability could cause the DNS service to become nonresponsive.\n (CVE-2020-0836, CVE-2020-1228)\n\n - An information disclosure vulnerability exists when the Microsoft Windows Graphics Component improperly handles objects in memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2020-0921, CVE-2020-1083)\n\n - A remote code execution vulnerability exists when Active Directory integrated DNS (ADIDNS) mishandles objects in memory. An authenticated attacker who successfully exploited the vulnerability could run arbitrary code in the context of the Local System Account (CVE-2020-0718, CVE-2020-0761)\n\n - An elevation of privilege vulnerability exists in Windows when the Win32k component fails to properly handle objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in kernel mode. An attacker could then install programs;\n view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1245)\n\n - A remote code execution vulnerability exists when Windows Media Audio Decoder improperly handles objects.\n An attacker who successfully exploited the vulnerability could take control of an affected system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit a malicious webpage. The security update addresses the vulnerability by correcting how Windows Media Audio Decoder handles objects. (CVE-2020-1508, CVE-2020-1593)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-1039, CVE-2020-1074)\n\n - An information disclosure vulnerability exists when the win32k component improperly provides kernel information.\n An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. (CVE-2020-1250)\n\n - An elevation of privilege vulnerability exists in the way that the ssdpsrv.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1052)\n\n - An elevation of privilege vulnerability exists when the Windows Function Discovery SSDP Provider improperly handles memory. (CVE-2020-0912)\n\n - An elevation of privilege vulnerability exists when the Windows Universal Plug and Play (UPnP) service improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1598)\n\n - An information disclosure vulnerability exists when the Windows kernel improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-1589)\n\n - A remote code execution vulnerability exists in the way that the Windows Graphics Device Interface (GDI) handles objects in the memory. An attacker who successfully exploited this vulnerability could take control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. (CVE-2020-1285)\n\n - A denial of service vulnerability exists when Windows Routing Utilities improperly handles objects in memory.\n An attacker who successfully exploited the vulnerability could cause a target system to stop responding.\n (CVE-2020-1038)\n\n - A local elevation of privilege vulnerability exists in how splwow64.exe handles certain calls. An attacker who successfully exploited the vulnerability could elevate privileges on an affected system from low-integrity to medium-integrity. This vulnerability by itself does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability (such as a remote code execution vulnerability or another elevation of privilege vulnerability) that is capable of leveraging the elevated privileges when code execution is attempted. The security update addresses the vulnerability by ensuring splwow64.exe properly handles these calls.. (CVE-2020-0790)\n\n - An elevation of privilege vulnerability exists when the Windows Cryptographic Catalog Services improperly handle objects in memory. An attacker who successfully exploited this vulnerability could modify the cryptographic catalog. (CVE-2020-0782)\n\n - A remote code execution vulnerability exists in the way that Microsoft Windows Codecs Library handles objects in memory. An attacker who successfully exploited this vulnerability could take control of the affected system.\n An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Exploitation of the vulnerability requires that a program process a specially crafted image file. The update addresses the vulnerability by correcting how Microsoft Windows Codecs Library handles objects in memory. (CVE-2020-1319)\n\n - An information disclosure vulnerability exists in the way that the Windows Server DHCP service improperly discloses the contents of its memory. (CVE-2020-1031)\n\n - A remote code execution vulnerability exists in the way that Microsoft COM for Windows handles objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-0922)\n\n - A information disclosure vulnerability exists when TLS components use weak hash algorithms. An attacker who successfully exploited this vulnerability could obtain information to further compromise a users's encrypted transmission channel. (CVE-2020-1596)\n\n - An elevation of privilege vulnerability exists in the way that fdSSDP.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions.\n (CVE-2020-1376)\n\n - An elevation of privilege vulnerability exists when Windows Modules Installer improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run arbitrary code in an elevated context. An attacker could exploit this vulnerability by running a specially crafted application on the victim system. The update addresses the vulnerability by correcting the way the Windows Modules Installer handles objects in memory. (CVE-2020-0911)\n\n - An information disclosure vulnerability exists when the Windows GDI component improperly discloses the contents of its memory. An attacker who successfully exploited the vulnerability could obtain information to further compromise the users system. There are multiple ways an attacker could exploit the vulnerability, such as by convincing a user to open a specially crafted document, or by convincing a user to visit an untrusted webpage.\n The security update addresses the vulnerability by correcting how the Windows GDI component handles objects in memory. (CVE-2020-1256)\n\n - An elevation of privilege vulnerability exists when the Windows Common Log File System (CLFS) driver improperly handles objects in memory. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-1115)\n\n - A remote code execution vulnerability exists when Windows improperly handles objects in memory.\n (CVE-2020-1252)\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-0878)\n\n - An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. There are multiple ways an attacker could exploit the vulnerability: (CVE-2020-1012)\n\n - An elevation of pr..."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4577053 or Cumulative Update KB4577051."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-165"}}}} 2020-11-30 21:48:13,164 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10423?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:13,169 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"140428\""}} 2020-11-30 21:48:13,483 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:13,485 tenable_jira.jira.Jira INFO UPDATED VULN-166 [140428] Security Updates for Internet Explorer (September 2020) 2020-11-30 21:48:13,485 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10638", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-0878", "CVE-2020-1012"], "customfield_10060": "6.8", "customfield_10061": "5.0", "customfield_10062": "8.8", "customfield_10063": "7.7", "customfield_10064": "1599584400", "customfield_10065": "140428", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (September 2020)", "customfield_10068": "Medium", "customfield_10086": "6.7", "summary": "[140428] Security Updates for Internet Explorer (September 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. There are multiple ways an attacker could exploit the vulnerability: (CVE-2020-1012)\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-0878)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4577010\n -KB4577051\n -KB4577064\n -KB4577066"}]}]}}}} 2020-11-30 21:48:13,686 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10638?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:13,687 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"140428\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:14,080 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:14,082 tenable_jira.jira.Jira INFO UPDATED VULN-108 [10.200.1.232/445/TCP] [140428] Security Updates for Internet Explorer (September 2020) 2020-11-30 21:48:14,082 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10425", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "6.8", "customfield_10061": "5.0", "customfield_10062": "8.8", "customfield_10063": "7.7", "customfield_10064": "1599584400", "customfield_10065": "140428", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Internet Explorer (September 2020)", "customfield_10068": "Medium", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "6.7", "summary": "[10.200.1.232/445/TCP] [140428] Security Updates for Internet Explorer (September 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Internet Explorer installation on the remote host is missing security updates. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists in the way that the Wininit.dll handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. There are multiple ways an attacker could exploit the vulnerability: (CVE-2020-1012)\n\n - A remote code execution vulnerability exists in the way that Microsoft browsers access objects in memory. The vulnerability could corrupt memory in a way that could allow an attacker to execute arbitrary code in the context of the current user. An attacker who successfully exploited the vulnerability could gain the same user rights as the current user. (CVE-2020-0878)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released the following security updates to address this issue: \n -KB4577010\n -KB4577051\n -KB4577064\n -KB4577066"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-166"}}}} 2020-11-30 21:48:14,295 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10425?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:14,297 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"140633\""}} 2020-11-30 21:48:14,521 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:14,525 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/issue", "params": {"update_history": false}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10064": "-1", "customfield_10065": "140633", "customfield_10066": "Windows", "customfield_10067": "CrowdStrike Falcon Sensor Installed (Windows)", "customfield_10068": "Info", "summary": "[140633] CrowdStrike Falcon Sensor Installed (Windows)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "CrowdStrike Falcon Sensor, an agent for the Falcon platform, is installed on the remote Windows host."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": ""}]}]}}}} 2020-11-30 21:48:14,799 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/issue?update_history=False HTTP/1.1" 400 None 2020-11-30 21:48:14,803 restfly.errors.BadRequestError ERROR [400: POST] https:///rest/api/3/issue?update_history=False body=b'{"errorMessages":["We can\'t create this issue for you right now, it could be due to unsupported content you\'ve entered into one or more of the issue fields. If this situation persists, contact your administrator as they\'ll be able to access more specific information in the log file."],"errors":{}}' 2020-11-30 21:48:14,804 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"141431\""}} 2020-11-30 21:48:14,806 urllib3.connectionpool DEBUG Resetting dropped connection: 2020-11-30 21:48:15,301 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:15,304 tenable_jira.jira.Jira INFO UPDATED VULN-167 [141431] KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update 2020-11-30 21:48:15,304 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10640", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-16863", "CVE-2020-16887", "CVE-2020-16889", "CVE-2020-16891", "CVE-2020-16897", "CVE-2020-16900", "CVE-2020-16902", "CVE-2020-16912", "CVE-2020-16914", "CVE-2020-16916", "CVE-2020-16920", "CVE-2020-16922", "CVE-2020-16923", "CVE-2020-16924", "CVE-2020-16935", "CVE-2020-16936", "CVE-2020-16937", "CVE-2020-16939", "CVE-2020-16940", "CVE-2020-16972", "CVE-2020-16973", "CVE-2020-16974", "CVE-2020-16975", "CVE-2020-16976"], "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "7.8", "customfield_10063": "6.8", "customfield_10064": "1602608400", "customfield_10065": "141431", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update", "customfield_10068": "High", "customfield_10086": "9.5", "summary": "[141431] KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4580387 or cumulative update 4580345. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. (CVE-2020-16920)\n\n - A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the Remote Desktop Service on the target system to stop responding. (CVE-2020-16863)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-16887)\n\n - An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. (CVE-2020-16940)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-16923)\n\n - An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.\n (CVE-2020-16914)\n\n - An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation. (CVE-2020-16902)\n\n - An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. (CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.\n (CVE-2020-16916, CVE-2020-16935)\n\n - An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.\n (CVE-2020-16937)\n\n - An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-16889)\n\n - A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.\n (CVE-2020-16922)\n\n - An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-16939)\n\n - An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory. (CVE-2020-16900)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-16924)\n\n - A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. (CVE-2020-16891)\n\n - An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-16897)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4580387 or Cumulative Update KB4580345."}]}]}}}} 2020-11-30 21:48:15,571 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10640?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:15,572 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"141431\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:15,951 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:15,954 tenable_jira.jira.Jira INFO UPDATED VULN-110 [10.200.1.232/445/TCP] [141431] KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update 2020-11-30 21:48:15,954 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10428", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "9.3", "customfield_10061": "6.9", "customfield_10062": "7.8", "customfield_10063": "6.8", "customfield_10064": "1602608400", "customfield_10065": "141431", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update", "customfield_10068": "High", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "9.5", "summary": "[10.200.1.232/445/TCP] [141431] KB4580387: Windows 7 and Windows Server 2008 R2 October 2020 Security Update", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The remote Windows host is missing security update 4580387 or cumulative update 4580345. It is, therefore, affected by multiple vulnerabilities :\n\n - An elevation of privilege vulnerability exists when the Windows Application Compatibility Client Library improperly handles registry operations. An attacker who successfully exploited this vulnerability could gain elevated privileges. (CVE-2020-16920)\n\n - A denial of service vulnerability exists in Windows Remote Desktop Service when an attacker connects to the target system using RDP and sends specially crafted requests. An attacker who successfully exploited this vulnerability could cause the Remote Desktop Service on the target system to stop responding. (CVE-2020-16863)\n\n - An elevation of privilege vulnerability exists in the way that the Windows Network Connections Service handles objects in memory. An attacker who successfully exploited the vulnerability could execute code with elevated permissions. (CVE-2020-16887)\n\n - An elevation of privilege vulnerability exists when the Windows User Profile Service (ProfSvc) improperly handles junction points. An attacker who successfully exploited this vulnerability could delete files and folders in an elevated context. (CVE-2020-16940)\n\n - A remote code execution vulnerability exists in the way that Microsoft Graphics Components handle objects in memory. An attacker who successfully exploited the vulnerability could execute arbitrary code on a target system. (CVE-2020-16923)\n\n - An information disclosure vulnerability exists in the way that the Windows Graphics Device Interface Plus (GDI+) handles objects in memory, allowing an attacker to retrieve information from a targeted system. By itself, the information disclosure does not allow arbitrary code execution; however, it could allow arbitrary code to be run if the attacker uses it in combination with another vulnerability.\n (CVE-2020-16914)\n\n - An elevation of privilege vulnerability exists in the Windows Installer when the Windows Installer fails to properly sanitize input leading to an insecure library loading behavior. A locally authenticated attacker could run arbitrary code with elevated system privileges. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. The security update addresses the vulnerability by correcting the input sanitization error to preclude unintended elevation. (CVE-2020-16902)\n\n - An elevation of privilege vulnerability exists when the Windows Backup Service improperly handles file operations. (CVE-2020-16912, CVE-2020-16936, CVE-2020-16972, CVE-2020-16973, CVE-2020-16974, CVE-2020-16975, CVE-2020-16976)\n\n - An elevation of privilege vulnerability exists when Windows improperly handles COM object creation. An attacker who successfully exploited the vulnerability could run arbitrary code with elevated privileges.\n (CVE-2020-16916, CVE-2020-16935)\n\n - An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.\n (CVE-2020-16937)\n\n - An information disclosure vulnerability exists when the Windows KernelStream improperly handles objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-16889)\n\n - A spoofing vulnerability exists when Windows incorrectly validates file signatures. An attacker who successfully exploited this vulnerability could bypass security features and load improperly signed files. In an attack scenario, an attacker could bypass security features intended to prevent improperly signed files from being loaded. The update addresses the vulnerability by correcting how Windows validates file signatures.\n (CVE-2020-16922)\n\n - An elevation of privilege vulnerability exists when Group Policy improperly checks access. An attacker who successfully exploited this vulnerability could run processes in an elevated context. (CVE-2020-16939)\n\n - An elevation of privilege vulnerability exists when the Windows Event System improperly handles objects in memory. (CVE-2020-16900)\n\n - A remote code execution vulnerability exists when the Windows Jet Database Engine improperly handles objects in memory. An attacker who successfully exploited this vulnerability could execute arbitrary code on a victim system. An attacker could exploit this vulnerability by enticing a victim to open a specially crafted file. The update addresses the vulnerability by correcting the way the Windows Jet Database Engine handles objects in memory. (CVE-2020-16924)\n\n - A remote code execution vulnerability exists when Windows Hyper-V on a host server fails to properly validate input from an authenticated user on a guest operating system. (CVE-2020-16891)\n\n - An information disclosure vulnerability exists when NetBIOS over TCP (NBT) Extensions (NetBT) improperly handle objects in memory. An attacker who successfully exploited this vulnerability could obtain information to further compromise the users system. (CVE-2020-16897)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Apply Security Only update KB4580387 or Cumulative Update KB4580345."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-167"}}}} 2020-11-30 21:48:16,215 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10428?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:16,220 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Task\" and status not in (Closed, Done, Resolved) and \"Tenable Plugin ID\" ~ \"141503\""}} 2020-11-30 21:48:16,530 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:16,533 tenable_jira.jira.Jira INFO UPDATED VULN-168 [141503] Security Updates for Microsoft .NET Framework (October 2020) 2020-11-30 21:48:16,533 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10641", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10002"}, "customfield_10059": ["CVE-2020-16937"], "customfield_10060": "4.0", "customfield_10061": "3.0", "customfield_10062": "4.7", "customfield_10063": "4.1", "customfield_10064": "1602608400", "customfield_10065": "141503", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Microsoft .NET Framework (October 2020)", "customfield_10068": "Medium", "customfield_10086": "4.4", "summary": "[141503] Security Updates for Microsoft .NET Framework (October 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Microsoft .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability :\n\n - An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.\n (CVE-2020-16937)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released security updates for Microsoft .NET Framework."}]}]}}}} 2020-11-30 21:48:16,735 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10641?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:16,737 tenable_jira.jira.Jira DEBUG Request:{"method": "POST", "url": "https:///rest/api/3/search", "params": {}, "body": {"jql": "project = \"VULN\" and issuetype = \"Sub-task\" and status not in (Closed, Done, Resolved) and \"Tenable Platform\" ~ \"Tenable.sc\" and \"Tenable Plugin ID\" ~ \"141503\" and \"Tenable Asset UUID\" is EMPTY and \"Device IPv4 Addresses\" = 10.200.1.232 and \"Device IPv6 Addresses\" is EMPTY and \"Vulnerability Port\" ~ \"445\" and \"Vulnerability Protocol\" ~ \"TCP\""}} 2020-11-30 21:48:17,167 urllib3.connectionpool DEBUG https://:443 "POST /rest/api/3/search HTTP/1.1" 200 None 2020-11-30 21:48:17,169 tenable_jira.jira.Jira INFO UPDATED VULN-112 [10.200.1.232/445/TCP] [141503] Security Updates for Microsoft .NET Framework (October 2020) 2020-11-30 21:48:17,169 tenable_jira.jira.Jira DEBUG Request:{"method": "PUT", "url": "https:///rest/api/3/issue/10430", "params": {"notifyUsers": "true", "overrideScreenSecurity": "false", "overrideEditableFlag": "false"}, "body": {"fields": {"project": {"key": "VULN"}, "issuetype": {"id": "10003"}, "customfield_10058": "Tenable.sc", "customfield_10060": "4.0", "customfield_10061": "3.0", "customfield_10062": "4.7", "customfield_10063": "4.1", "customfield_10064": "1602608400", "customfield_10065": "141503", "customfield_10066": "Windows : Microsoft Bulletins", "customfield_10067": "Security Updates for Microsoft .NET Framework (October 2020)", "customfield_10068": "Medium", "customfield_10072": ["10.200.1.232"], "customfield_10075": "FCSTONE\SUSIAALCNSWSCFE", "customfield_10078": "2020-10-27T00:02:47.000+0000", "customfield_10079": "2020-10-27T00:02:47.000+0000", "customfield_10082": "445", "customfield_10083": "TCP", "customfield_10084": "1", "customfield_10085": "Test Repo", "customfield_10086": "4.4", "summary": "[10.200.1.232/445/TCP] [141503] Security Updates for Microsoft .NET Framework (October 2020)", "description": {"version": 1, "type": "doc", "content": [{"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Description"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "The Microsoft .NET Framework installation on the remote host is missing a security update. It is, therefore, affected by the following vulnerability :\n\n - An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory.\n (CVE-2020-16937)"}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Solution"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "Microsoft has released security updates for Microsoft .NET Framework."}]}, {"type": "heading", "attrs": {"level": 1}, "content": [{"type": "text", "text": "Output"}]}, {"type": "paragraph", "content": [{"type": "text", "text": "No Output"}]}]}, "parent": {"key": "VULN-168"}}}} 2020-11-30 21:48:17,442 urllib3.connectionpool DEBUG https://:443 "PUT /rest/api/3/issue/10430?notifyUsers=true&overrideScreenSecurity=false&overrideEditableFlag=false HTTP/1.1" 204 0 2020-11-30 21:48:17,443 tenable.sc.TenableSC DEBUG {"method": "GET", "url": "https://:443/rest/query/568?fields=filters", "params": {}, "body": {}} 2020-11-30 21:48:17,444 urllib3.connectionpool DEBUG Resetting dropped connection: 2020-11-30 21:48:17,693 urllib3.connectionpool DEBUG https://:443 "GET /rest/query/568?fields=filters HTTP/1.1" 200 123 2020-11-30 21:48:17,696 tenable.sc.TenableSC DEBUG {"method": "POST", "url": "https://:443/rest/analysis", "params": {}, "body": {"type": "vuln", "sourceType": "patched", "query": {"tool": "vulndetails", "type": "vuln", "filters": [{"filterName": "lastMitigated", "operator": "=", "value": "0-1606772897"}], "startOffset": 0, "endOffset": 1000}}} 2020-11-30 21:48:23,405 urllib3.connectionpool DEBUG https://:443 "POST /rest/analysis HTTP/1.1" 200 220

SteveMcGrath commented 3 years ago

why are there 7 iterations of those screens?

romans8 commented 3 years ago

Moved the VUL-1 ticket to done without closing the subtask. It re-created the task but not the host/subtasks.

romans8 commented 3 years ago

I don't know why there are 7 iterations. I just ran the command with --troubleshoot. It's probably because that's all that was on the screen. The file has sensitive info so I pasted the screen output. I should just run the screen output to a file so I have the sanitized version.

SteveMcGrath commented 3 years ago

Moved the VUL-1 ticket to done without closing the subtask. It re-created the task but not the host/subtasks.

When you closed the parent w/o closing the sub-task, you effectively orphaned the sub-tasks. If you would like to prevent this, then you may want to create some workflows within Jira to do so.

I don't know why there are 7 iterations. I just ran the command with --troubleshoot. It's probably because that's all that was on the screen. The file has sensitive info so I pasted the screen output. I should just run the screen output to a file so I have the sanitized version.

If there is a numerical value next to the screen, that would lead me to believe that this project Key has existed in the past and the remnants of it were not cleaned up. I would suggest that you clean up the old ones and also hard-code the new ones into the config as mentioned in https://github.com/tenable/integration-jira-cloud/issues/23#issuecomment-604631753 .

romans8 commented 3 years ago

It appears to be working.