Conversation
|
@magl0 hi, when will the review start? |
|
Hi @hh-hunter, thank you for your contribution! Could you please provide a testbed for this detector? |
|
Hi @hh-hunter, Thanks for your collaboration! Here are a few points to improve the code:
Thanks again for your efforts! |
|
ok |
@RaulDoyensec I have finished , please review. |
|
Testbed in google/security-testbeds#118 |
|
Hi @hh-hunter, Sorry for the delay in the response, here are some notes about your modifications:
return DetectionReportList.newBuilder()
.addAllDetectionReports(
matchedServices.stream()
.filter(NetworkServiceUtils::isWebService)
.filter(this::isWebmin) // Create a function to dynamically detect Webmin services (verifying HTML patterns for Webmin)
.filter(this::isServiceVulnerable)
.map(networkService -> buildDetectionReport(targetInfo, networkService))
.collect(toImmutableList()))
.build();
}
Regards. |
|
@RaulDoyensec I've finished modifying it according to your suggestion, please review |
|
Hey @hh-hunter, I tested your recent changes for the plugin, but it looks like the tests aren't passing. Specifically, the test that handles the vulnerable case ( Regards. |
|
Hi @hh-hunter, This vulnerability is too old and the testbed is difficult to setup again. Closing this issue. ~tooryx |
Hey,
this PR for the Vuln Detector Plugin for CVE-2019-15017 (see Issue #82)
In order to verify the vulnerability, I used two different docker environments, one for the vulnerable version and the other for the fixed version
Vulnerable image:
Safe image:
Please let me know what else to do next?
Finally, I have another question. If the target is https, but the certificate is invalid, how can I skip the certificate verification?