Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add extract_cve_from_tag to Shadowserver parser _config.py #2457

Merged
merged 3 commits into from
Feb 7, 2024

Conversation

th-certbund
Copy link
Contributor

"extract_cve_from_tag" returns a sorted comma separated list of CVEs included with "tag" in the Vulnerable-HTTP report, e.g.

extract_cve_from_tag("affected-software;cve-2023-12345;cve-2024-56789;ssl;ssl-freak;vpn")
-> "cve-2023-12345,cve-2024-56789"

to be stored in "extra.cve" by adding

     [
        "extra.cve",
        "tag",
        "extract_cve_from_tag"
     ],

to the intelmq.json schema.

@sebix sebix requested a review from elsif2 February 5, 2024 16:00
@elsif2
Copy link
Collaborator

elsif2 commented Feb 5, 2024

The functions map needs to be updated to include "extract_cve_from_tag".

cveset.add(t)

if not (len(cveset)):
return None;
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
return None;
return None

@sebix sebix added this to the 3.3.0 milestone Feb 6, 2024
@sebix sebix merged commit 76c08f9 into certtools:develop Feb 7, 2024
20 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants