Skip to content

chrismphilp/AutoInject

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

AutoInject

A software for automatically patching vulnerabilities.

Prerequisites

  • Ubuntu Trusty 14.04
  • CVE-Search
  • Mongo 3.2
  • Python - 3.3 or above

Sudo Permissions

Global sudo permissions must be given to all the files within to enable file changes to be made.

AutoInject/bin/

Running the package

Firstly, remove these lines from /cve-search/sbin/db_updater.py

{'name': "cpe", 'updater': "python3 " + os.path.join(runPath, "db_mgmt_cpe_dictionary.py")},
{'name': "cpeother", 'updater': "python3 " + os.path.join(runPath, "db_mgmt_cpe_other_dictionary.py")}

Secondly, you must provide sudo permissions for the AutoInject directory, as it will need to make file and folder changes.

Once done, the file_structure of the system must be ensured to be correct, with the base folder set to AutoInject, containing all of the system files. Alongside this directory the CVE-search folder must be placed so the eventual file layout is as follows.

/AutoInject
	/AutoInject
		\bin
		\file_store
		\static
		\templates
		__init__.py
	LICENSE
	README.md
	auto_inject_script
	setup.py
/CVE-Search 

Then, either run these commands:

export FLASK_APP=AutoInject
export FLASK_DEBUG=true
sudo pip3 install -e .
flask run

Or use the provided script:

auto_inject_script

These commands MUST BE RAN from the inner

/AutoInject
	/AutoInject
		\bin
		\file_store
		\static
		\templates
		__init__.py
	LICENSE
	README.md
	auto_inject_script <- Ran from HERE
	setup.py
/CVE-Search 

folder.

Once the application has launched, navigate to the documentation page located under the About heading for further information regarding the use of the application.

Releases

No releases published

Packages

No packages published