Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

This should fix html_proofer for now #1

Merged
merged 5 commits into from
Dec 10, 2020
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
25 changes: 9 additions & 16 deletions .circleci/config.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,23 +8,16 @@ jobs:
- run: (cd /root/;rm -rf project;mkdir project)
- checkout
- run:
name: Build site www.divd.nl
name: Build en check
command: |
cd www.divd.nl;
jekyll build 2>&1|grep -v 'warning:';
cd ..
- run:
name: Build site csirt.divd.nl
command: |
cd csirt.divd.nl;
jekyll build 2>&1|grep -v 'warning:';
cd ..
- run:
name: Test HTML
command: |
gem install html-proofer &&
htmlproofer --allow-hash-href --url-ignore "/www.linkedin.com/in/","/#menu.*/" www.divd.nl/_site/ &&
htmlproofer --allow-hash-href csirt.divd.nl/_site/
for site in www.divd.nl csirt.divd.nl; do
(
echo "*** Building and checking $site ***";
cd $site;
jekyll build 2>&1|grep -v 'warning:';
./proof_html.sh
)
done
- save_cache:
key: jekyll-{{ .Environment.CIRCLE_SHA1 }}
paths:
Expand Down
2 changes: 1 addition & 1 deletion csirt.divd.nl/_layouts/bio.html
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
---
<h1>{{ page.author }}</h1>

<small><a href='#english'>English below</a></small>
<small><a href="#english">English below</a></small>

<br>
<br>
Expand Down
4 changes: 2 additions & 2 deletions csirt.divd.nl/_posts/20-01-19-Eerste-Citrix-patches.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Citrix heeft [zojuist bekend gemaakt](https://www.citrix.com/blogs/2020/01/19/vu

Het is belangrijk om voordat een systeem gepatched wordt, uit te sluiten dat deze al door aanvallers is overgenomen. Dit kan door het uitvoeren van forensisch onderzoek (zie [blog](/2020/01/15/How-to-check-your-Citrix-gateway/)), hiervoor is wel gedegen kennis nodig. Of door het systeem opnieuw schoon op te bouwen op basis van een schone [image van Citrix](https://www.citrix.com/downloads/citrix-adc/).

We hebben de [case pagine](/cases/202001-Citrix-ADC/) bijgewerkt.
We hebben de [case pagine](/DIVD-2020-00001/) bijgewerkt.

<hr>

Expand All @@ -19,4 +19,4 @@ Citrix [just released](https://www.citrix.com/blogs/2020/01/19/vulnerability-upd

It is important to make sure that a system is not compromised before it is patched. This can be done by either performing forensics analysis (see our [blog](/2020/01/15/How-to-check-your-Citrix-gateway/)), this requires in-depth knowledge. Or by reinstalling the system from scratch using a clean image [downloaded from the Citrix site](https://www.citrix.com/downloads/citrix-adc/).

We have updated the [case page](/cases/202001-Citrix-ADC/).
We have updated the [case page](/DIVD-2020-00001/).
4 changes: 2 additions & 2 deletions csirt.divd.nl/_posts/20-01-22-Citrix-en-wildcards.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,7 +9,7 @@ Er zijn wildcardcertificaten aanwezig op meer dan 450 van de 700 systemen die we

Het Security Meldpunt gaat beheerders waarvan de systemen op de lijst staan waarschuwen.

Meer informatie en de laatste stand van zaken met betrekking tot deze case is te vinden op [onze case pagina](/cases/202002-Wildcard-Certificaten-Citrix-ADC/)
Meer informatie en de laatste stand van zaken met betrekking tot deze case is te vinden op [onze case pagina](/DIVD-2020-00002/)

<hr>

Expand All @@ -19,4 +19,4 @@ There are wildcard certificates present on more than 450 of the 700 systems that

We are going to notify administrators of the systems on the list.

More information and the current status of this case can be found on [our case page](/cases/202002-Wildcard-Certificaten-Citrix-ADC/)
More information and the current status of this case can be found on [our case page](/DIVD-2020-00002/)
4 changes: 2 additions & 2 deletions csirt.divd.nl/_posts/20-01-27-BlueGate-POC.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ excerpt: Het Security Meldpunt adviseerd dringend patches uit te rollen en gaat

### Nederlands

Op 14 januari bracht Microsoft twee zeer kritieke updates uit met een [CVSS score van .8](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)) voor de Windows 2012, 2012R2, 2016 en 2019 Server platformen.
Op 14 januari bracht Microsoft twee zeer kritieke updates uit met een [CVSS score van .8](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3.0&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)) voor de Windows 2012, 2012R2, 2016 en 2019 Server platformen.

Deze patches verhelpen een kwetsbaarheid in Windows Remote Desktop Gateway (RD Gateway), een concurrent van Citrix. Misbruik van de kwetsbaarheid kan leiden tot onbeschikbaarheid (DoS, Denial of Service) en de mogelijkheid om willekeurige code op het systeem uit te voeren (RCE, Remote Command Execution).

Expand All @@ -33,7 +33,7 @@ Meer informatie en de laatste stand van zaken met betrekking tot deze case wordt

### English

On January 14th Microsoft released patches for two critical vulnerabilities found in Windows Server 2012, 2012R2, 2016 and 2019 with a [CVSS score off 9.8](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C))
On January 14th Microsoft released patches for two critical vulnerabilities found in Windows Server 2012, 2012R2, 2016 and 2019 with a [CVSS score off 9.8](https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?calculator&version=3.0&vector=(CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C))

Impact is both DOS (Denial Of Service) and RCE (Remote Command Execution), a functional impact can be a complete takeover of the system and it's information. Patches of January 2020 are effective and highly recommended to deploy asap.

Expand Down
2 changes: 1 addition & 1 deletion csirt.divd.nl/cases/DIVD-2020-00004.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@ author: Sander Spierenburg
excerpt: Een lijst met ruim 500k+ botnet slachtoffers is gepubliceerd / A list of Mirai botnet victims has been published exposing a total of 500K+ systems
redirect_from:
- /DIVD-2020-00004/
status : Open
status : Closed
---

| Our reference | [{{ page.divd }}]({{ page.divd }}) |
Expand Down
3 changes: 3 additions & 0 deletions csirt.divd.nl/cases/DIVD-2020-00005.md
Original file line number Diff line number Diff line change
Expand Up @@ -52,6 +52,7 @@ Wij gaan de lijst met Nederlandse systemen nader onderzoeken en de eigenaren van
|:-----:|-------------|
| 22-2-2020 | Security Meldpunt heeft een lijst ontvangen met 773 Nederlandse IP adressen. |
| 23-2-2020 | E-mail verstuurd aan 72 netwerkbeheerders |
| 3-12-2020 | Case Closed. |

![Ghostcat](/assets/images/ghostcat-logo-small.png "Image copyright Chaitin Tech")

Expand Down Expand Up @@ -89,5 +90,7 @@ We will further investigate the list of the Dutch systems and where necessary, i
|:-----:|-------------|
| 22-2-2020 | Security Hotline has received a list with 773 Dutch IP addresses. |
| 23-2-2020 | Email sent to 72 netwerk operators |
| 3-12-2020 | Case Closed. |


![Ghostcat](/assets/images/ghostcat-logo-small.png "Image copyright Chaitin Tech")
4 changes: 3 additions & 1 deletion csirt.divd.nl/cases/DIVD-2020-00006.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ lead: Sander Spierenburg
excerpt: Security Meldpunt vraagt uw aandacht voor een SMBv3 kwetsbaarheid en gaat netwerkbeheerders met publiek beschikbare SMBv3 servers met compressie waarschuwen / The Security hotline is asking your attention for a vulnerabilty in SMBv3 and is going to warn network operators of Dutch IPs that respond to SMBv3 handshakes and have encryption enabled
redirect_from:
- /DIVD-2020-00006/
status : Open
status : Closed
---

| Our reference | [{{ page.divd }}]({{ page.divd }}) |
Expand Down Expand Up @@ -69,6 +69,7 @@ Deze kwetsbaarheid is in potentie een ernstig probleem voor client systemen (voo
| 11-3-2020 | DIVD heeft in samenwerking met Mark Schloesser een internetwijde scan uitgevoerd en daarbij verscheidene SMBv3 systemen gevonden die compressie ondersteunen |
| 12-3-2020 | DIVD gaat netwerkbeheerders van Nederlandse IP adressen met dergelijke servers waarschuwen. De overige adressen worden via onze internationale partners afgehandeld. |
| 12-3-2020 | Microsoft heeft een out-of-band patch gepubliceerd. |
| 3-12-2020 | Case Closed. |

<hr>

Expand Down Expand Up @@ -119,3 +120,4 @@ This vulnerability is potentially a serious threat to client systems (Mainly Win
| 11-3-2020 | In cooperation with Mark Schloesser, DIVD has conducted an internet-wide scan for SMBv3 servers that support compression |
| 12-3-2020 | The Security Hotline will warn network operators of Dutch IP addresses that have such systems. Other Ip addresses will be dealt with through our international partners |
| 12-3-2020 | Microsoft has published an out-of-band patch for the vulnerability |
| 3-12-2020 | Case Closed. |
6 changes: 5 additions & 1 deletion csirt.divd.nl/cases/DIVD-2020-00009.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@ lead: Frank Breedijk
excerpt: Een datadump met informatie over meer dan 900 gecompromitteerde Pulse Secure VPN enterprise servers is publiek gemaakt. / A data dump with information of over 900 compromised Pulse Secure VPN enterprise servers has been released.
redirect_from:
- /DIVD-2020-00009/
status : Open
status : Closed
---

| Our reference | [{{ page.divd }}]({{ page.divd }}) |
Expand Down Expand Up @@ -41,6 +41,8 @@ Onderzoekers van het DIVD beschikken over de dataset van kwetsbare systemen en s
|:-----:|-------------|
| 04-08-2020| ZDnet publiceert artikel over dit lek |
| 05-08-2020 | Case geopened en meldingen verstuurd|
| 3-12-2020 | Case Closed. |


## Meer informatie
* [https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/](https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/)
Expand Down Expand Up @@ -72,6 +74,8 @@ Researchers at the DIVD have the dataset of vulnerable systems and notify admini
|:-----:|-------------|
| 04-08-2020| ZDnet publishes article about this breach |
| 05-08-2020 | Case opened and notifications sent|
| 3-12-2020 | Case Closed. |


## More information
* [https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/](https://www.zdnet.com/article/hacker-leaks-passwords-for-900-enterprise-vpn-servers/)
8 changes: 6 additions & 2 deletions csirt.divd.nl/cases/DIVD-2020-00010.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,12 @@ layout: case
title: DIVD-2020-00010 - wpDiscuz plugin Remote Code Excution
divd: DIVD-2020-00010
short: WordPress Plugin wpDiscuz has a vulnerability that alllows attackers to take over a complete system
author: Frank Breeidjk
author: Frank Breedijk
lead: Frank Breedijk
excerpt: In de WordPress Plugin wpDiscuz zit een kritieke kwetsbaarheid die aanvalles in staat stelt een systemen over te nemen / Wordpress plugin wpDiscuz has a critical vulnerability that allows an attacker to take over the system.
redirect_from:
- /DIVD-2020-00010/
status : Open
status : Closed
---

| Our reference | [{{ page.divd }}]({{ page.divd }}) |
Expand Down Expand Up @@ -37,6 +37,8 @@ Wij hebben een groot aantal .nl domainnamen gecontroleerd om vast te stellen of
| 30-06-2020 | Scan van .nl domeinnamen |
| 04-08-2020 | Manuele validatie van resultaten |
| 07-08-2020 | Notificaties |
| 3-12-2020 | Case Closed. |


## Meer informatie
* [WordFence 28-7-2020](https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/)
Expand Down Expand Up @@ -65,6 +67,8 @@ We have check a large number of .nl domain names to determine if wpDiscuz was in
| 30-06-2020 | Scan of .nl domain names |
| 04-08-2020 | Manual validation |
| 07-08-2020 | Notifications |
| 3-12-2020 | Case Closed. |


## More information
* [WordFence 28-7-2020](https://www.wordfence.com/blog/2020/07/critical-arbitrary-file-upload-vulnerability-patched-in-wpdiscuz-plugin/)
Expand Down
3 changes: 3 additions & 0 deletions csirt.divd.nl/cases/DIVD-2020-00012.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,8 @@ Onderzoekers van het DIVD verwerken de gelekte lijst en verifiëren of de op de
| 22-11-2020 | Bleeping Computer publiceert artikel |
| 23-11-2020 | Fortinet geeft een statement aan Bleeping Computer |
| 25-11-2020 | DIVD begonnen met verwerken van de lijst |
| 3-12-2020 | Eerste notificaties verstuurd |


## Meer informatie
* [Bleeping Computer 22-11-2020](https://www.bleepingcomputer.com/news/security/hacker-posts-exploits-for-over-49-000-vulnerable-fortinet-vpns/)
Expand Down Expand Up @@ -67,6 +69,7 @@ DIVD researchers are processing the list of vulnerable systems to verify if they
| 22-11-2020 | Bleeping Computer publishes article |
| 23-11-2020 | Fortinet issues a statement to Bleeping Computer |
| 25-11-2020 | DIVD started processing the list |
| 3-12-2020 | First notifications sent |

## More information
* [Bleeping Computer 22-11-2020](https://www.bleepingcomputer.com/news/security/hacker-posts-exploits-for-over-49-000-vulnerable-fortinet-vpns/)
Expand Down
5 changes: 5 additions & 0 deletions csirt.divd.nl/proof_html.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
#!/bin/bash
gem install html-proofer
htmlproofer \
--allow-hash-href \
--url-ignore="/www.linkedin.com/","/#english/","/x1sec.com/" _site
10 changes: 10 additions & 0 deletions csirt.divd.nl/test_it.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
#!/bin/bash

docker pull mrseccubus/github-pages:latest
docker run --volume="$PWD:/root/project:delegated" --entrypoint /bin/bash -ti mrseccubus/github-pages \
-c "
cd /root/project;
rm -rf _site/*;
jekyll build --future 2>&1 |grep -Ev 'rb:[0-9]+: warning';
./proof_html.sh
"
5 changes: 5 additions & 0 deletions www.divd.nl/proof_html.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
#!/bin/bash
gem install html-proofer
htmlproofer \
--allow-hash-href \
--url-ignore="/www.linkedin.com/","/#menu/" _site
18 changes: 18 additions & 0 deletions www.divd.nl/test_it.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,18 @@
#!/bin/bash

docker pull mrseccubus/github-pages:latest
while [ 1 ] ; do
docker run --volume="$PWD:/root/project:delegated" --entrypoint /bin/bash -ti mrseccubus/github-pages \
-c "
cd /root/project;
rm -rf _site/*;
jekyll build --future 2>&1 |grep -Ev 'rb:[0-9]+: warning';
./proof_html.sh
"
set -e
echo 'Press CTRL+C now to quit'
sleep 1
set +e
echo 'Restarting...'
done