summaryrefslogtreecommitdiff
path: root/data
diff options
context:
space:
mode:
authorVictor Näslund <victor@sunet.se>2022-11-17 22:04:24 +0100
committerVictor Näslund <victor@sunet.se>2022-11-17 22:04:24 +0100
commit03735d4c6fc17193e5019d3bd595bad2ce41c61f (patch)
tree889e5b6615f62930ef2ebd1e36616a177fca539e /data
parenta276c55e8f1f7f2c5872a43485425dd85f1dfa9f (diff)
added tests
Diffstat (limited to 'data')
-rw-r--r--data/example_data_1.json57
-rw-r--r--data/example_data_3.json51
-rw-r--r--data/example_data_3_replace_test.json52
-rw-r--r--data/mongodb_container/Dockerfile2
4 files changed, 1 insertions, 161 deletions
diff --git a/data/example_data_1.json b/data/example_data_1.json
deleted file mode 100644
index 69f5d85..0000000
--- a/data/example_data_1.json
+++ /dev/null
@@ -1,57 +0,0 @@
-{
- "document_version": 1,
- "ip": "192.0.2.10",
- "port": 443,
- "whois_description": "SOMENET",
- "asn": "AS65001",
- "asn_country_code": "SE",
- "ptr": "host10.test.soc.sunet.se",
- "abuse_mail": "abuse@test.soc.sunet.se",
- "domain": "sunet.se",
- "timestamp": "2021-06-21T14:06:00Z",
- "display_name": "Apache 2.1.3",
- "description": "The Apache HTTP Server is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0.",
- "custom_data": {
- "subject_cn": {
- "data": "Apache",
- "display_name": "Subject Common Name"
- },
- "end_of_general_support": {
- "data": false,
- "display_name": "End of general support",
- "description": "Is the software currently supported?"
- }
- },
- "result": {
- "cve_2015_0049": {
- "display_name": "CVE-2015-0049",
- "vulnerable": false,
- "description": "Allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption)."
- },
- "cve_2015_0050": {
- "display_name": "CVE-2015-0050",
- "vulnerable": false
- },
- "cve_2015_0060": {
- "display_name": "CVE-2015-0060",
- "vulnerable": true,
- "reliability": 2
- },
- "cve_2015_0063": {
- "display_name": "CVE-2015-0063",
- "vulnerable": false
- },
- "insecure_cryptography": {
- "display_name": "Insecure cryptography",
- "vulnerable": true,
- "reliability": 5,
- "description": "Uses RSA instead of elliptic curve."
- },
- "possible_webshell": {
- "display_name": "Webshells (PST)",
- "investigation_needed": true,
- "reliability": 1,
- "description": "A webshell of type PST was confirmed at /test/webshell.php"
- }
- }
-}
diff --git a/data/example_data_3.json b/data/example_data_3.json
deleted file mode 100644
index 44d483b..0000000
--- a/data/example_data_3.json
+++ /dev/null
@@ -1,51 +0,0 @@
-{
- "document_version": 1,
- "ip": "192.0.2.28",
- "port": 111,
- "whois_description": "SOMENET",
- "asn": "AS65001",
- "asn_country_code": "SE",
- "ptr": "host111.test.soc.sunet.se",
- "abuse_mail": "abuse@test.soc.sunet.se",
- "domain": "sunet.se",
- "timestamp": "2021-06-30T15:00:00Z",
- "display_name": "VMware ESXi 6.7.0 build-17700523",
- "description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.",
- "custom_data": {
- "subject_cn": {
- "data": "VMware ESXi",
- "display_name": "Subject Common Name"
- },
- "end_of_general_support": {
- "data": true,
- "display_name": "End of general support",
- "description": "Is the software currently supported?"
- }
- },
- "result": {
- "cve_2019_0001": {
- "display_name": "CVE-2019-0001",
- "vulnerable": false
- },
- "cve_2015_0002": {
- "display_name": "CVE-2015-0002",
- "vulnerable": false,
- "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak."
- },
- "cve_2015_0003": {
- "display_name": "CVE-2015-0003",
- "vulnerable": true,
- "reliability": 2,
- "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
- },
- "cve_2015_0004": {
- "display_name": "CVE-2015-0004",
- "vulnerable": false
- },
- "cve_2015_0005": {
- "display_name": "CVE-2015-0005",
- "vulnerable": true,
- "reliability": 4
- }
- }
-}
diff --git a/data/example_data_3_replace_test.json b/data/example_data_3_replace_test.json
deleted file mode 100644
index 31cc64d..0000000
--- a/data/example_data_3_replace_test.json
+++ /dev/null
@@ -1,52 +0,0 @@
-{
- "_id": "6370498050845fac09e0fc01",
- "document_version": 2,
- "ip": "192.0.2.28",
- "port": 112,
- "whois_description": "SOMENET",
- "asn": "AS65001",
- "asn_country_code": "SE",
- "ptr": "host111.test.soc.sunet.se",
- "abuse_mail": "abuse@test.soc.sunet.se",
- "domain": "sunet.se",
- "timestamp": "2021-06-30T15:00:00Z",
- "display_name": "VMware ESXi 6.7.0 build-17700523",
- "description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.",
- "custom_data": {
- "subject_cn": {
- "data": "VMware ESXi",
- "display_name": "Subject Common Name"
- },
- "end_of_general_support": {
- "data": true,
- "display_name": "End of general support",
- "description": "Is the software currently supported?"
- }
- },
- "result": {
- "cve_2019_0001": {
- "display_name": "CVE-2019-0001",
- "vulnerable": false
- },
- "cve_2015_0002": {
- "display_name": "CVE-2015-0002",
- "vulnerable": false,
- "description": "There is a use of insufficiently random values vulnerability. An unauthenticated, remote attacker can guess information by a large number of attempts. Successful exploitation may cause information leak."
- },
- "cve_2015_0003": {
- "display_name": "CVE-2015-0003",
- "vulnerable": true,
- "reliability": 2,
- "description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
- },
- "cve_2015_0004": {
- "display_name": "CVE-2015-0004",
- "vulnerable": false
- },
- "cve_2015_0005": {
- "display_name": "CVE-2015-0005",
- "vulnerable": true,
- "reliability": 4
- }
- }
-}
diff --git a/data/mongodb_container/Dockerfile b/data/mongodb_container/Dockerfile
index 8e17161..16e6b1f 100644
--- a/data/mongodb_container/Dockerfile
+++ b/data/mongodb_container/Dockerfile
@@ -20,7 +20,7 @@ RUN find / -xdev -perm /6000 -type f -exec chmod a-s {} \; || true
COPY ./data/mongodb_entrypoint.sh /mongodb_entrypoint.sh
COPY ./data/init-mongodb.js /init-mongodb.js
COPY ./data/healthcheck-mongodb.js /healthcheck-mongodb.js
-COPY ./healthcheck.sh /healthcheck.sh
+COPY ./data/healthcheck.sh /healthcheck.sh
USER mongodb