mirror of https://github.com/MISP/misp-modules
				
				
				
			
		
			
				
	
	
		
			42 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
			
		
		
	
	
			42 lines
		
	
	
		
			1.2 KiB
		
	
	
	
		
			Python
		
	
	
		
			Executable File
		
	
import json
 | 
						|
import requests
 | 
						|
 | 
						|
misperrors = {'error': 'Error'}
 | 
						|
mispattributes = {'input': ['vulnerability'], 'output': ['text']}
 | 
						|
moduleinfo = {'version': '0.2', 'author': 'Alexandre Dulaunoy', 'description': 'An expansion hover module to expand information about CVE id.', 'module-type': ['hover']}
 | 
						|
moduleconfig = []
 | 
						|
cveapi_url = 'https://cve.circl.lu/api/cve/'
 | 
						|
 | 
						|
 | 
						|
def handler(q=False):
 | 
						|
    if q is False:
 | 
						|
        return False
 | 
						|
    request = json.loads(q)
 | 
						|
    if not request.get('vulnerability'):
 | 
						|
        misperrors['error'] = 'Vulnerability id missing'
 | 
						|
        return misperrors
 | 
						|
 | 
						|
    r = requests.get(cveapi_url + request.get('vulnerability'))
 | 
						|
    if r.status_code == 200:
 | 
						|
        vulnerability = json.loads(r.text)
 | 
						|
        if vulnerability:
 | 
						|
            if vulnerability.get('summary'):
 | 
						|
                summary = vulnerability['summary']
 | 
						|
        else:
 | 
						|
            summary = 'Non existing CVE'
 | 
						|
    else:
 | 
						|
        misperrors['error'] = 'cve.circl.lu API not accessible'
 | 
						|
        return misperrors['error']
 | 
						|
 | 
						|
    r = {'results': [{'types': mispattributes['output'], 'values': summary}]}
 | 
						|
    return r
 | 
						|
 | 
						|
 | 
						|
def introspection():
 | 
						|
    return mispattributes
 | 
						|
 | 
						|
 | 
						|
def version():
 | 
						|
    moduleinfo['config'] = moduleconfig
 | 
						|
    return moduleinfo
 |