Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement automatic verification of CVE exploitation #2

Open
olegbck opened this issue Nov 6, 2024 · 0 comments
Open

Implement automatic verification of CVE exploitation #2

olegbck opened this issue Nov 6, 2024 · 0 comments

Comments

@olegbck
Copy link
Collaborator

olegbck commented Nov 6, 2024

Currently, there is no method to verify whether a CVE has been successfully exploited. A solution would be to introduce the mandatory parameter "verify" to cvex.yml with a string that CVEX would have to find in logs (outputs of commands, pcaps, strace logs, ProcessMonitor logs):

blueprint: windows10-windows10
windows1:
  trace: "nginx"
  playbook: "windows1.yml"
  verify: "string to find in logs of windows1"
windows2:
  command: "curl https://windows1/index.html?cat=(select*from(select(sleep(15)))a)"
  verify: "string to find in logs of windows2"

For example, "verify" can be:

  • "is vulnerable" that would print an exploit
  • "uid=0(root) gid=0(root) groups=0(root)" that would print an exploit
  • "root:x:0:0:root:/root:/bin/bash" that would be present in the pcap when an exploit downloads /etc/passwd
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant