8cca4346a5
Add a new datasource that: - Receives HTTP requests from remediation components - Apply rules on them to determine whether they are malicious or not - Rules can be evaluated in-band (the remediation component will block the request directly) or out-band (the RC will let the request through, but crowdsec can still process the rule matches with scenarios) The PR also adds support for 2 new hub items: - appsec-configs: Configure the Application Security Engine (which rules to load, in which phase) - appsec-rules: a rule that is added in the Application Security Engine (can use either our own format, or seclang) --------- Co-authored-by: alteredCoder <kevin@crowdsec.net> Co-authored-by: Sebastien Blot <sebastien@crowdsec.net> Co-authored-by: mmetc <92726601+mmetc@users.noreply.github.com> Co-authored-by: Marco Mariani <marco@crowdsec.net>
66 lines
1.7 KiB
Go
66 lines
1.7 KiB
Go
package hubtest
|
|
|
|
import (
|
|
"bytes"
|
|
"errors"
|
|
"fmt"
|
|
"os"
|
|
"os/exec"
|
|
"strings"
|
|
"time"
|
|
|
|
log "github.com/sirupsen/logrus"
|
|
)
|
|
|
|
type NucleiConfig struct {
|
|
Path string `yaml:"nuclei_path"`
|
|
OutputDir string `yaml:"output_dir"`
|
|
CmdLineOptions []string `yaml:"cmdline_options"`
|
|
}
|
|
|
|
var NucleiTemplateFail = errors.New("Nuclei template failed")
|
|
|
|
func (nc *NucleiConfig) RunNucleiTemplate(testName string, templatePath string, target string) error {
|
|
tstamp := time.Now().Unix()
|
|
//templatePath is the full path to the template, we just want the name ie. "sqli-random-test"
|
|
tmp := strings.Split(templatePath, "/")
|
|
template := strings.Split(tmp[len(tmp)-1], ".")[0]
|
|
|
|
outputPrefix := fmt.Sprintf("%s/%s_%s-%d", nc.OutputDir, testName, template, tstamp)
|
|
|
|
args := []string{
|
|
"-u", target,
|
|
"-t", templatePath,
|
|
"-o", outputPrefix + ".json",
|
|
}
|
|
args = append(args, nc.CmdLineOptions...)
|
|
cmd := exec.Command(nc.Path, args...)
|
|
|
|
var out bytes.Buffer
|
|
var outErr bytes.Buffer
|
|
|
|
cmd.Stdout = &out
|
|
cmd.Stderr = &outErr
|
|
|
|
err := cmd.Run()
|
|
|
|
if err := os.WriteFile(outputPrefix+"_stdout.txt", out.Bytes(), 0644); err != nil {
|
|
log.Warningf("Error writing stdout: %s", err)
|
|
}
|
|
|
|
if err := os.WriteFile(outputPrefix+"_stderr.txt", outErr.Bytes(), 0644); err != nil {
|
|
log.Warningf("Error writing stderr: %s", err)
|
|
}
|
|
|
|
if err != nil {
|
|
log.Warningf("Error running nuclei: %s", err)
|
|
log.Warningf("Stdout saved to %s", outputPrefix+"_stdout.txt")
|
|
log.Warningf("Stderr saved to %s", outputPrefix+"_stderr.txt")
|
|
log.Warningf("Nuclei generated output saved to %s", outputPrefix+".json")
|
|
return err
|
|
} else if len(out.String()) == 0 {
|
|
//No stdout means no finding, it means our test failed
|
|
return NucleiTemplateFail
|
|
}
|
|
return nil
|
|
}
|