https://github.com/athiththan11/wso2-cve-extractor
CLI Tool to extract the related WSO2 Security Advisory information of CVE
https://github.com/athiththan11/wso2-cve-extractor
cve scraper wso2
Last synced: 2 months ago
JSON representation
CLI Tool to extract the related WSO2 Security Advisory information of CVE
- Host: GitHub
- URL: https://github.com/athiththan11/wso2-cve-extractor
- Owner: athiththan11
- License: apache-2.0
- Created: 2021-01-25T14:22:22.000Z (over 4 years ago)
- Default Branch: main
- Last Pushed: 2021-03-13T17:30:46.000Z (about 4 years ago)
- Last Synced: 2025-01-01T07:27:05.701Z (4 months ago)
- Topics: cve, scraper, wso2
- Language: JavaScript
- Homepage:
- Size: 17.6 KB
- Stars: 0
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# WSO2 CVE Extractor
A command line tool to extract (scrape) CVE information from NVD and related `WSO2 Security Advisory` information.
## Build, Install & Run
### Build & Install
Clone or download the repo and execute the following command (from the root directory) to install relevant dependencies.
```sh
npm install
```### Run
You can run the tool by following either methods
#### Method 01
Execute the following command (from the root directory) to link the tool with the shell
```sh
npm link
```and use the following command pattern to execute the tool
```sh
wso2-cve-extractor [list of CVEs] [--save]
```For example:
- Execute the following command to scrape the CVE and WSO2 Security Advisory information of `CVE-2020-24589`
```sh
wso2-cve-extractor CVE-2020-24589
```- Execute the following command to scrape multiple CVEs
```sh
wso2-cve-extractor CVE-2020-24589 CVE-2020-25600
```- Execute the following command to scrape and save the output in a JSON file
```sh
wso2-cve-extractor CVE-2020-24589 CVE-2020-25600 --save
```#### Method 02
Execute the following command from the root directory
```sh
node index.js CVE-2020-24589
```## Output
Extracted information is presented in JSON format. Given below is a sample output
```json
[
{ "cve": "CVE-2020-24600", "info": false },
{
"cve": "CVE-2020-24595",
"info": {
"name": "CVE-2020-24595",
"nvd": {
"description": "Mitel MiCloud Management Portal before 6.1 SP5 could allow an attacker, by sending a crafted request, to retrieve sensitive information due to insufficient access control.",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2020-24595"
},
"cwes": ["CWE-863"]
}
},
{
"cve": "CVE-2020-24589",
"info": {
"name": "CVE-2020-24589",
"nvd": {
"description": "The Management Console in WSO2 API Manager through 3.1.0 and API Microgateway 2.2.0 allows XML External Entity injection (XXE) attacks.",
"link": "https://nvd.nist.gov/vuln/detail/CVE-2020-24589",
"wso2": "https://docs.wso2.com/display/Security/Security+Advisory+WSO2-2020-0742"
},
"wso2": {
"published": "Published: 17th August 2020",
"products": ["WSO2 API Manager : 3.1.0 or earlier", "WSO2 API Microgateway : 2.2.0"],
"git": [
"https://github.com/wso2/carbon-governance/pull/341",
"https://github.com/wso2/carbon-governance/pull/340",
"https://github.com/wso2/carbon-governance/pull/339"
]
},
"cwes": ["CWE-776"]
}
}
]
```