summaryrefslogtreecommitdiff
path: root/community_modules/security
diff options
context:
space:
mode:
Diffstat (limited to 'community_modules/security')
-rw-r--r--community_modules/security/euvd_check.sh101
-rw-r--r--community_modules/security/euvd_check.tr.en17
-rw-r--r--community_modules/security/euvd_check.tr.es17
3 files changed, 135 insertions, 0 deletions
diff --git a/community_modules/security/euvd_check.sh b/community_modules/security/euvd_check.sh
new file mode 100644
index 0000000..2205a42
--- /dev/null
+++ b/community_modules/security/euvd_check.sh
@@ -0,0 +1,101 @@
+#!/bin/bash
+# Module: euvd_check
+# Description: Verifica si un host remoto está afectado por una vulnerabilidad EUVD consultando la base europea ENISA
+# License: GPLv3
+# Author: Luis GuLo
+# Version: 0.6.0
+# Dependencies: curl, jq, ssh, dpkg o rpm
+
+euvd_check_task() {
+ local host="$1"; shift
+ declare -A args
+ for arg in "$@"; do key="${arg%%=*}"; value="${arg#*=}"; args["$key"]="$value"; done
+
+ local enisa_id="${args[enisa_id]}"
+ local package="${args[package]}"
+ local become="${args[become]}"
+ local prefix=""
+ [ "$become" = "true" ] && prefix="sudo"
+
+ # 🌐 Cargar traducciones
+ local lang="${shflow_vars[language]:-es}"
+ local trfile="$(dirname "${BASH_SOURCE[0]}")/euvd_check.tr.${lang}"
+ declare -A tr
+ if [[ -f "$trfile" ]]; then while IFS='=' read -r k v; do tr["$k"]="$v"; done < "$trfile"; fi
+
+ if [[ -z "$enisa_id" || -z "$package" ]]; then
+ echo "${tr[missing_args]:-❌ [euvd_check] Faltan argumentos: enisa_id y package son obligatorios.}"
+ return 1
+ fi
+
+ echolog 1 "$(render_msg "${tr[start]}" "id=$enisa_id" "package=$package" "host=$host")"
+
+ local pkg_cmd=""
+ if ssh "$host" "command -v dpkg" &>/dev/null; then
+ pkg_cmd="dpkg -s"
+ echolog 1 "${tr[detected_dpkg]:-🔧 Gestor de paquetes detectado: dpkg}"
+ elif ssh "$host" "command -v rpm" &>/dev/null; then
+ pkg_cmd="rpm -q"
+ echolog 1 "${tr[detected_rpm]:-🔧 Gestor de paquetes detectado: rpm}"
+ else
+ echo "${tr[no_pkg]:-❌ [euvd_check] No se detectó gestor de paquetes compatible en el host}"
+ return 1
+ fi
+
+ local version_cmd="$pkg_cmd $package"
+ [[ "$become" = "true" ]] && version_cmd="sudo $version_cmd"
+
+ local version
+ version=$(ssh "$host" "$version_cmd" 2>/dev/null | grep -E 'Version|version|^'"$package" | head -n1 | awk '{print $2}')
+
+ if [[ -z "$version" ]]; then
+ echolog 1 "$(render_msg "${tr[version_fail]}" "package=$package" "host=$host")"
+ return 1
+ fi
+
+ echolog 1 "$(render_msg "${tr[version_ok]}" "version=$version")"
+
+ local enisa_url="https://euvdservices.enisa.europa.eu/api/enisaid?id=$enisa_id"
+ echolog 1 "$(render_msg "${tr[query_enisa]}" "id=$enisa_id")"
+ local response
+ response=$(curl -s -X GET "$enisa_url")
+
+ if ! echo "$response" | jq -e .description &>/dev/null; then
+ echolog 1 "$(render_msg "${tr[invalid_response]}" "id=$enisa_id")"
+ echolog 1 "$(render_msg "${tr[response_trunc]}" "snippet=$(echo "$response" | head -c 120 | tr '\n' ' ')")"
+ return 1
+ fi
+
+ local score desc aliases
+ score=$(echo "$response" | jq -r '.baseScore // empty')
+ desc=$(echo "$response" | jq -r '.description // empty')
+ aliases=$(echo "$response" | jq -r '.aliases[]?')
+
+ [[ -n "$score" ]] && echolog 1 "$(render_msg "${tr[score]}" "score=$score")"
+ echolog 2 "$(render_msg "${tr[desc]}" "desc=$desc")"
+ [[ -n "$aliases" ]] && echolog 1 "$(render_msg "${tr[aliases]}" "aliases=$aliases")"
+
+ if echo "$desc" | grep -iq "$package" && echo "$desc" | grep -q "$version"; then
+ echo "$(render_msg "${tr[vulnerable]}" "host=$host" "id=$enisa_id")"
+ return 1
+ else
+ echo "$(render_msg "${tr[safe]}" "host=$host" "id=$enisa_id")"
+ return 0
+ fi
+}
+
+check_dependencies_euvd_check() {
+ local lang="${shflow_vars[language]:-es}"
+ local trfile="$(dirname "${BASH_SOURCE[0]}")/euvd_check.tr.${lang}"
+ declare -A tr
+ if [[ -f "$trfile" ]]; then while IFS='=' read -r k v; do tr["$k"]="$v"; done < "$trfile"; fi
+
+ for cmd in ssh curl jq; do
+ if ! command -v "$cmd" &> /dev/null; then
+ echo "$(render_msg "${tr[missing_dep]}" "cmd=$cmd")"
+ return 1
+ fi
+ done
+ echo "${tr[deps_ok]:-✅ [euvd_check] ssh, curl y jq disponibles.}"
+ return 0
+}
diff --git a/community_modules/security/euvd_check.tr.en b/community_modules/security/euvd_check.tr.en
new file mode 100644
index 0000000..ae95dd0
--- /dev/null
+++ b/community_modules/security/euvd_check.tr.en
@@ -0,0 +1,17 @@
+missing_args=❌ [euvd_check] Missing arguments: enisa_id and package are required.
+start=🧬 [euvd_check] Checking {id} in package '{package}' on {host}...
+detected_dpkg=🔧 Package manager detected: dpkg
+detected_rpm=🔧 Package manager detected: rpm
+no_pkg=❌ [euvd_check] No compatible package manager detected on host
+version_fail=⚠️ [euvd_check] Could not detect installed version of '{package}' on {host}.
+version_ok=🔍 Installed version: {version}
+query_enisa=🌐 Querying ENISA for {id}...
+invalid_response=⚠️ [euvd_check] ENISA response does not contain valid data for {id}.
+response_trunc=🔍 Response (truncated): {snippet}
+score=📊 CVSS Score: {score}
+desc=📝 Description: {desc}
+aliases=🔗 Aliases: {aliases}
+vulnerable=❌ [euvd_check] Host {host} is vulnerable to {id}
+safe=✅ [euvd_check] Host {host} does not appear affected by {id}
+missing_dep=❌ [euvd_check] Command '{cmd}' is not available
+deps_ok=✅ [euvd_check] ssh, curl and jq are available.
diff --git a/community_modules/security/euvd_check.tr.es b/community_modules/security/euvd_check.tr.es
new file mode 100644
index 0000000..85e0315
--- /dev/null
+++ b/community_modules/security/euvd_check.tr.es
@@ -0,0 +1,17 @@
+missing_args=❌ [euvd_check] Faltan argumentos: enisa_id y package son obligatorios.
+start=🧬 [euvd_check] Verificando {id} en paquete '{package}' en {host}...
+detected_dpkg=🔧 Gestor de paquetes detectado: dpkg
+detected_rpm=🔧 Gestor de paquetes detectado: rpm
+no_pkg=❌ [euvd_check] No se detectó gestor de paquetes compatible en el host
+version_fail=⚠️ [euvd_check] No se pudo detectar la versión instalada de '{package}' en {host}.
+version_ok=🔍 Versión instalada: {version}
+query_enisa=🌐 Consultando ENISA para {id}...
+invalid_response=⚠️ [euvd_check] La respuesta de ENISA no contiene datos válidos para {id}.
+response_trunc=🔍 Respuesta (truncada): {snippet}
+score=📊 Puntuación CVSS: {score}
+desc=📝 Descripción: {desc}
+aliases=🔗 Alias: {aliases}
+vulnerable=❌ [euvd_check] Host {host} está vulnerable a {id}
+safe=✅ [euvd_check] Host {host} no parece afectado por {id}
+missing_dep=❌ [euvd_check] El comando '{cmd}' no está disponible
+deps_ok=✅ [euvd_check] ssh, curl y jq disponibles.