summaryrefslogtreecommitdiff
path: root/tests
diff options
context:
space:
mode:
authorVictor Näslund <victor@sunet.se>2022-11-19 19:06:38 +0100
committerVictor Näslund <victor@sunet.se>2022-11-19 19:06:38 +0100
commited22012bf1dfce0d9ab925d39e9eafd0f941f960 (patch)
tree4e62a679db31f3f45f67499a46723d00cc9f01ef /tests
parent220653827c2df98cdbc8e94423e549edb4231d2f (diff)
Updated schema with tags and better logic for the 'result' tag, lets force descriptionvictor_updates
Diffstat (limited to 'tests')
-rw-r--r--tests/data/example_data_1.json9
-rw-r--r--tests/data/example_data_1_replace_test.json9
-rw-r--r--tests/data/example_data_3.json8
-rw-r--r--tests/data/example_data_3_replace_test.json8
4 files changed, 26 insertions, 8 deletions
diff --git a/tests/data/example_data_1.json b/tests/data/example_data_1.json
index 69f5d85..b0adb8a 100644
--- a/tests/data/example_data_1.json
+++ b/tests/data/example_data_1.json
@@ -1,5 +1,6 @@
{
- "document_version": 1,
+ "document_version": 2,
+ "tags": ["dev", "hide"],
"ip": "192.0.2.10",
"port": 443,
"whois_description": "SOMENET",
@@ -35,7 +36,9 @@
"cve_2015_0060": {
"display_name": "CVE-2015-0060",
"vulnerable": true,
- "reliability": 2
+ "reliability": 2,
+ "severity": 2,
+ "description": "Allows local users to cause a denial of service (system hang) via a crafted application, aka Windows Font Driver Denial of Service Vulnerability."
},
"cve_2015_0063": {
"display_name": "CVE-2015-0063",
@@ -45,12 +48,14 @@
"display_name": "Insecure cryptography",
"vulnerable": true,
"reliability": 5,
+ "severity": 3,
"description": "Uses RSA instead of elliptic curve."
},
"possible_webshell": {
"display_name": "Webshells (PST)",
"investigation_needed": true,
"reliability": 1,
+ "severity": 3,
"description": "A webshell of type PST was confirmed at /test/webshell.php"
}
}
diff --git a/tests/data/example_data_1_replace_test.json b/tests/data/example_data_1_replace_test.json
index f56d82c..4d07181 100644
--- a/tests/data/example_data_1_replace_test.json
+++ b/tests/data/example_data_1_replace_test.json
@@ -1,5 +1,6 @@
{
"document_version": 2,
+ "tags": ["dev", "hide"],
"ip": "192.0.2.10",
"port": 444,
"whois_description": "SOMENET",
@@ -9,7 +10,7 @@
"abuse_mail": "abuse@test.soc.sunet.se",
"domain": "sunet.se",
"timestamp": "2021-06-21T14:06:00Z",
- "display_name": "Apache 2.1.3",
+ "display_name": "Apache 2.1.4",
"description": "The Apache HTTP Server is a free and open-source cross-platform web server software, released under the terms of Apache License 2.0.",
"custom_data": {
"subject_cn": {
@@ -35,7 +36,9 @@
"cve_2015_0060": {
"display_name": "CVE-2015-0060",
"vulnerable": true,
- "reliability": 2
+ "reliability": 2,
+ "severity": 3,
+ "description": "Allows local users to cause a denial of service (system hang) via a crafted application, aka Windows Font Driver Denial of Service Vulnerability."
},
"cve_2015_0063": {
"display_name": "CVE-2015-0063",
@@ -45,12 +48,14 @@
"display_name": "Insecure cryptography",
"vulnerable": true,
"reliability": 5,
+ "severity": 2,
"description": "Uses RSA instead of elliptic curve."
},
"possible_webshell": {
"display_name": "Webshells (PST)",
"investigation_needed": true,
"reliability": 1,
+ "severity": 1,
"description": "A webshell of type PST was confirmed at /test/webshell.php"
}
}
diff --git a/tests/data/example_data_3.json b/tests/data/example_data_3.json
index 44d483b..897f9d3 100644
--- a/tests/data/example_data_3.json
+++ b/tests/data/example_data_3.json
@@ -1,5 +1,6 @@
{
- "document_version": 1,
+ "document_version": 3,
+ "tags": ["notify", "display"],
"ip": "192.0.2.28",
"port": 111,
"whois_description": "SOMENET",
@@ -36,6 +37,7 @@
"display_name": "CVE-2015-0003",
"vulnerable": true,
"reliability": 2,
+ "severity": 4,
"description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
},
"cve_2015_0004": {
@@ -45,7 +47,9 @@
"cve_2015_0005": {
"display_name": "CVE-2015-0005",
"vulnerable": true,
- "reliability": 4
+ "severity": 4,
+ "reliability": 4,
+ "description": "Allows local users to cause a denial of service (system hang) via a crafted application, aka Windows Font Driver Denial of Service Vulnerability."
}
}
}
diff --git a/tests/data/example_data_3_replace_test.json b/tests/data/example_data_3_replace_test.json
index 31cc64d..5f09020 100644
--- a/tests/data/example_data_3_replace_test.json
+++ b/tests/data/example_data_3_replace_test.json
@@ -1,6 +1,7 @@
{
"_id": "6370498050845fac09e0fc01",
"document_version": 2,
+ "tags": ["dev"],
"ip": "192.0.2.28",
"port": 112,
"whois_description": "SOMENET",
@@ -10,7 +11,7 @@
"abuse_mail": "abuse@test.soc.sunet.se",
"domain": "sunet.se",
"timestamp": "2021-06-30T15:00:00Z",
- "display_name": "VMware ESXi 6.7.0 build-17700523",
+ "display_name": "VMware ESXi 6.7.1 build-17700523",
"description": "VMware ESXi is an enterprise-class, type-1 hypervisor developed by VMware for deploying and serving virtual computers. As a type-1 hypervisor, ESXi is not a software application that is installed on an operating system; instead, it includes and integrates vital OS components, such as a kernel.",
"custom_data": {
"subject_cn": {
@@ -37,6 +38,7 @@
"display_name": "CVE-2015-0003",
"vulnerable": true,
"reliability": 2,
+ "severity": 4,
"description": "A carefully crafted request body can cause a read to a random memory area which could cause the process to crash."
},
"cve_2015_0004": {
@@ -46,7 +48,9 @@
"cve_2015_0005": {
"display_name": "CVE-2015-0005",
"vulnerable": true,
- "reliability": 4
+ "severity": 5,
+ "reliability": 4,
+ "description": "Allows local users to cause a denial of service (system hang) via a crafted application, aka Windows Font Driver Denial of Service Vulnerability."
}
}
}