moved parameterised_website from vulnerabilities to services

This commit is contained in:
thomashaw
2017-05-01 14:44:32 +01:00
parent 4d6d2a1ed1
commit 815a5915e6
27 changed files with 12 additions and 14 deletions

View File

@@ -1,7 +1,7 @@
<?xml version="1.0"?>
<vulnerability xmlns="http://www.github/cliffe/SecGen/vulnerability"
<service xmlns="http://www.github/cliffe/SecGen/service"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://www.github/cliffe/SecGen/vulnerability">
xsi:schemaLocation="http://www.github/cliffe/SecGen/service">
<name>Random Parameterised Website</name>
<author>Thomas Shaw</author>
@@ -9,8 +9,6 @@
<description>Parameterised website filled with SecGen generated content.</description>
<type>webapp</type>
<privilege>info_leak</privilege>
<access>remote</access>
<platform>linux</platform>
<read_fact>strings_to_leak</read_fact>
@@ -97,4 +95,4 @@
<module_path>modules/services/unix/http/apache</module_path>
</requires>
</vulnerability>
</service>

View File

@@ -11,7 +11,7 @@
<!-- comment describes using pseudo code (C#-like methods with named optional arguments) -->
<!-- vulnerability_nfs_share_leak(strings_to_leak: encoder_flag_generator() CONCAT encoder_ascii_reversable(strings_to_encode: encoder_flag_generator()) CONCAT ...) -->
<vulnerability name="Random Parameterised Website">
<service name="Random Parameterised Website">
<input into="visible_tabs">
<generator type="html_snippet_generator" >
<input into="heading">
@@ -122,7 +122,7 @@
</input>
</generator>
</input>
</vulnerability>
</service>
<!-- Remote privilege escalation -->
<vulnerability read_fact="strings_to_leak" access="remote" privilege="user_rwx">

View File

@@ -120,7 +120,7 @@
<!-- FEED GENERATED 'BUSINESS' DATA ABOVE INTO VULNERABILITY MODULES. -->
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
<input into="business_name">
<datastore>business_name</datastore>
</input>
@@ -145,7 +145,7 @@
<input into="product_name">
<datastore>product_name</datastore>
</input>
</vulnerability>
</service>
<network type="private_network" range="dhcp"/>
</system>

View File

@@ -9,7 +9,7 @@
<system_name>web_server</system_name>
<base platform="linux"/>
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website"/>
<service module_path="vulnerabilities/unix/webapp/parameterised_website"/>
<network type="private_network" range="dhcp"/>
</system>

View File

@@ -89,7 +89,7 @@
</generator>
</input>
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
<input into="business_name">
<datastore>business_name</datastore>
</input>
@@ -121,7 +121,7 @@
<input into="product_name" into_datastore="product_name">
<generator type="product"/>
</input>
</vulnerability>
</service>
<vulnerability privilege="user_rwx" access="remote" type="^((?!webapp).)*$">
<input into="business_domain">
@@ -182,7 +182,7 @@
</input>
</vulnerability>
<vulnerability module_path="vulnerabilities/unix/webapp/parameterised_website">
<service module_path="vulnerabilities/unix/webapp/parameterised_website">
<input into="host_acceptable_use_policy">
<value>true</value>
</input>
@@ -221,7 +221,7 @@
<input into="product_name">
<datastore>product_name</datastore>
</input>
</vulnerability>
</service>
<service/>
<service/>