mirror of https://github.com/MISP/misp-modules
42 lines
1.2 KiB
Python
Executable File
42 lines
1.2 KiB
Python
Executable File
import json
|
|
import requests
|
|
|
|
misperrors = {'error': 'Error'}
|
|
mispattributes = {'input': ['vulnerability'], 'output': ['text']}
|
|
moduleinfo = {'version': '0.2', 'author': 'Alexandre Dulaunoy', 'description': 'An expansion hover module to expand information about CVE id.', 'module-type': ['hover']}
|
|
moduleconfig = []
|
|
cveapi_url = 'https://cve.circl.lu/api/cve/'
|
|
|
|
|
|
def handler(q=False):
|
|
if q is False:
|
|
return False
|
|
request = json.loads(q)
|
|
if not request.get('vulnerability'):
|
|
misperrors['error'] = 'Vulnerability id missing'
|
|
return misperrors
|
|
|
|
r = requests.get(cveapi_url + request.get('vulnerability'))
|
|
if r.status_code == 200:
|
|
vulnerability = json.loads(r.text)
|
|
if vulnerability:
|
|
if vulnerability.get('summary'):
|
|
summary = vulnerability['summary']
|
|
else:
|
|
summary = 'Non existing CVE'
|
|
else:
|
|
misperrors['error'] = 'cve.circl.lu API not accessible'
|
|
return misperrors['error']
|
|
|
|
r = {'results': [{'types': mispattributes['output'], 'values': summary}]}
|
|
return r
|
|
|
|
|
|
def introspection():
|
|
return mispattributes
|
|
|
|
|
|
def version():
|
|
moduleinfo['config'] = moduleconfig
|
|
return moduleinfo
|