UI: Add vulnerability exploiters to the schema

This commit is contained in:
Ilija Lazoroski 2022-07-01 13:44:48 +02:00
parent c254a94fc0
commit 67aa7d95a3
2 changed files with 25 additions and 21 deletions

View File

@ -18,25 +18,19 @@ export const exploitationConfigurationSchema = {
'SSHExploiter',
'MSSQLExploiter'
]
}
},
'vulnerability': {
'title': 'Vulnerability Exploiters',
'type': 'object',
'properties': {
'vulnerability_classes': {
'title': 'Vulnerability Exploiters',
'type': 'array',
'uniqueItems': true,
'items': {
'$ref': '#/definitions/vulnerability_classes'
},
'default': [
'Log4ShellExploiter',
'HadoopExploiter'
]
}
}
},
'options': exploitationOptionsConfigurationSchema
},
'vulnerability': {
'title': 'Vulnerability Exploiters',
'type': 'array',
'uniqueItems': true,
'items': {
'$ref': '#/definitions/vulnerability_classes'
},
'default': [
'Log4ShellExploiter',
'HadoopExploiter'
]
},
'options': exploitationOptionsConfigurationSchema
}
};

View File

@ -101,6 +101,16 @@ export const vulnerabilityExploiters = {
'Apache Solr, Apache Tomcat, Logstash.',
'link': 'https://www.guardicore.com/infectionmonkey/docs/reference' +
'/exploiters/log4shell/'
},
{
'type': 'string',
'enum': ['HadoopExploiter'],
'title': 'Hadoop/Yarn Exploiter',
'safe': true,
'info': 'Remote code execution on HADOOP server with YARN and default settings. ' +
'Logic based on ' +
'https://github.com/vulhub/vulhub/tree/master/hadoop/unauthorized-yarn.',
'link': 'https://www.guardicore.com/infectionmonkey/docs/reference/exploiters/hadoop/'
}
]
}