{"id":31770027,"url":"https://github.com/jfrog/jfrog-openssl-tools","last_synced_at":"2025-10-10T02:56:30.743Z","repository":{"id":63428408,"uuid":"560873113","full_name":"jfrog/jfrog-openssl-tools","owner":"jfrog","description":null,"archived":false,"fork":false,"pushed_at":"2022-11-02T14:51:39.000Z","size":7,"stargazers_count":15,"open_issues_count":0,"forks_count":2,"subscribers_count":3,"default_branch":"main","last_synced_at":"2024-10-23T00:41:48.705Z","etag":null,"topics":[],"latest_commit_sha":null,"homepage":null,"language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/jfrog.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2022-11-02T13:09:20.000Z","updated_at":"2024-05-24T08:30:07.000Z","dependencies_parsed_at":"2022-11-18T19:01:03.756Z","dependency_job_id":null,"html_url":"https://github.com/jfrog/jfrog-openssl-tools","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/jfrog/jfrog-openssl-tools","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-openssl-tools","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-openssl-tools/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-openssl-tools/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-openssl-tools/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/jfrog","download_url":"https://codeload.github.com/jfrog/jfrog-openssl-tools/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/jfrog%2Fjfrog-openssl-tools/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279002512,"owners_count":26083403,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-10T02:00:06.843Z","response_time":62,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":[],"created_at":"2025-10-10T02:56:24.691Z","updated_at":"2025-10-10T02:56:30.731Z","avatar_url":"https://github.com/jfrog.png","language":"Python","funding_links":[],"categories":[],"sub_categories":[],"readme":"# openssl-tools\n\n### Overview\nThis is a collection of simple utilities in the context of recently discovered CVE-2022-3602, CVE-2022-3786, allowing to answer the following questions:\n\n### 1. Does my server require client authentication\n\nRunning the following command\n```\npython openssl_req_client_cert.py HOST_NAME PORT\n```\nWill determine whether client authentication is required by the SSL server, in which case servers based on OpenSSL 3.0.0..3.0.6 will be vulnerable to CVEs above [https://jfrog.com/knowledge-base/upcoming-openssl-3-x-critical-vulnerability/]\n\nFor example:\n```\n|ψ\u003e python openssl_req_client_cert.py 127.0.0.1 12345\n127.0.0.1:12345 -\u003e Client certificate not required\n```\n\n### 2. Which files on a local machine contain OpenSSL code of vulnerable versions\n\nApplications running OpenSSL are easy to miss if the library is statically linked into an application binary. \nRunning the following command\n```\npython scan_vulnerable_openssl_code.py ROOT_DIR\n```\nWill recursively scan ROOT_DIR for ELF files, and report the files which include the pattern `ossl_punycode_decode` (indicative of versions \u003e=3.0.0), while files which in addition include the pattern `ripemd160_newctx` indicative of the updated version (3.0.7) are reported as such.\n\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjfrog%2Fjfrog-openssl-tools","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fjfrog%2Fjfrog-openssl-tools","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fjfrog%2Fjfrog-openssl-tools/lists"}