Skip to content

themichaelasher/cp_cve_search

Repository files navigation

Check Point CVE Search

Warning: I'm not a developer so a lot of help came from Google's Gemini. It's probably not the most securely developed tool.

This is a simple demo to search IPS Protections via the Infinity Portal and/or R82 management APIs.

More information can be found in the following documentation:

IPS Publication API and Infinity Portal

Smart-1 Cloud information:

Screenshots

    Initial Landing Page Landing Page
    API Status API Status
    Response from IPS Publication lookup IPS Publication Lookup
    Response from Smart-1 Cloud Smart-1 Cloud lookup
    CVE Protection is not found CVE Protection unavailable

Configuration

This application is configured entirely through environment variables. Before running the application, you must create a .env file in the root of the project.

  1. Create your API key via the Infinity Portal.

  2. Create a file named .env and add the following variables to the file, filling in your specific credentials:

    # --- .env file ---
    ## Environment variables in use for accessing the Infinity
    ## Portal IPS Publications API
    
    IP_REMOTE_URL=https://<API ENDPOINT>.portal.checkpoint.com
    IP_CLIENT_ID=<client id from Infinity Portal IPS Publications Account key>
    IP_ACCESS_ID=<access id from Infinity Portal IPS Publications Account key>
    
    ## These are the environment variables needed if Smart-1 Cloud  
    ## is expected to be searched as well.
    
    # S1C_URL="https://<smart-1-cloud-tenant-url>/context/"
    # S1C_APIKEY="user api key created from SmartConsole"

Running the application

### Method 1: Using Docker Compose
  • Rename the docker-compose.example.yml to docker-compose.yml
  • Build and run the container: (This will automatically load the .env file and map port 8080)
    docker-compose up -d
  • To stop the application, run:
    docker-compose down

Method 2: Running directly with Python

  1. Clone the repository
  2. Setup the python environment
user$ python -m venv venv
user$ . venv/bin/activate
(venv) user$ pip install -r requirements.txt
(venv) user$ python app.py
* Serving Flask app 'app'
 * Debug mode: off
WARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.
 * Running on all addresses (0.0.0.0)
 * Running on http://127.0.0.1:8080
Press CTRL+C to quit

The application will now be running and accessible at http://localhost:8080.

About

Web demo for using Check Point APIs to search for CVE protections.

Resources

Stars

Watchers

Forks