Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVE not detected but present in database #980

Closed
Obanni opened this issue May 20, 2020 · 3 comments
Closed

CVE not detected but present in database #980

Obanni opened this issue May 20, 2020 · 3 comments
Labels

Comments

@Obanni
Copy link

Obanni commented May 20, 2020

Hello, I used Vuls to find the vulnerability CVE-2020-11651. However, it does not work, the version of the package and CVE is well found but nothing does not appear in the report.

Package

Package is found inside the /results/.json

"salt":{ "name":"salt", "version":"2017.7.5", "release":"1.el7", "newVersion":"", "newRelease":"", "arch":"noarch", "repository":"", "changelog":{ "contents":"", "method":"" } }, "salt-master":{ "name":"salt-master", "version":"2017.7.5", "release":"1.el7", "newVersion":"", "newRelease":"", "arch":"noarch", "repository":"", "changelog":{ "contents":"", "method":"" } }

CVE

CVE can be found in the cve.sqlite3

MicrosoftTeams-image

MicrosoftTeams-image (1)

OVAL

MicrosoftTeams-image (2)

Result

CVE is not detected and does not appear with $ ./report.sh | grep 2020-11651

Config

[servers]

[servers.x-x-x-x]
host = "x.x.x.x"
port = "22"
user = "root"
keyPath = "/root/.ssh/id_rsa"

[exploit]
type = "sqlite3"
sqlite3Path = "/vuls/go-exploitdb.sqlite3"

[cveDict]
type = "sqlite3"
sqlite3Path = "/vuls/cve.sqlite3"

[ovalDict]
type = "sqlite3"
sqlite3Path = "/vuls/oval.sqlite3"

@Obanni Obanni added the bug label May 20, 2020
@kotakanbe
Copy link
Member

Vuls uses OVAL data to scan RHEL and CentOS7.

CVE-2020-11651 is not in OVAL for Red Hat Enterprise Linux 7.

 ubuntu@dev  ~│work  curl https://www.redhat.com/security/data/oval/Red_Hat_Enterprise_Linux_7.xml | grep CVE-2020-11651
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100 15.6M    0 15.6M    0     0  25.5M      0 --:--:-- --:--:-- --:--:-- 25.5M
 ✗  ubuntu@dev  ~│work

https://access.redhat.com/security/cve/cve-2020-11651

image

According to the Red Hat page, CVE-2020-11651 does not seem to affect RHEL7.

@hachh
Copy link

hachh commented May 27, 2020

Hi,

I understand that CVE-2020-1165 does not affect RHEL7 product, but it affects saltstack that can be installed on RHEL7 with saltstask redhat repository.
So how are we supposed to detect this vulnerability ? Does it need specific database because this package is not included in RHEL repository ?

@kotakanbe
Copy link
Member

kotakanbe commented May 27, 2020

Yes, it's difficult without that database. I don't know if the database is public.

Or, try the following and let me know the results.
(I don't have that environment, so I want you to try it in your environment.)

Will CVE-2020-1165 be detected when the following command is issued?

yum --security updateinfo list updates
yum --security updateinfo updates

If CVE-2020-1165 can be detected above, it can be achieved by executing the above command on the server to be scanned. Additional implementation is needed though.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants