Skip to content

Commit 1731e7d

Browse files
authored
Burp Enterprise: Support newer format (#11220)
* Burp Enterprise: Support newer format * Forgot partially updated test * Add other tests * Correct tests
1 parent 742ecf2 commit 1731e7d

6 files changed

Lines changed: 7633 additions & 199 deletions

File tree

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
60628ca4667641350d3d1854d1a6f863ce2ddeefa4f6e5df83f7e11a700cde0e
1+
58e2f6cb0ed2c041fe2741d955b72cb7540bfb0923f489d6324717fcf00039da

dojo/settings/settings.dist.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1744,6 +1744,8 @@ def saml2_attrib_map_format(dict):
17441744
"ELSA": "https://linux.oracle.com/errata/&&.html", # e.g. https://linux.oracle.com/errata/ELSA-2024-12714.html
17451745
"ELBA": "https://linux.oracle.com/errata/&&.html", # e.g. https://linux.oracle.com/errata/ELBA-2024-7457.html
17461746
"RXSA": "https://errata.rockylinux.org/", # e.g. https://errata.rockylinux.org/RXSA-2024:4928
1747+
"CAPEC": "https://capec.mitre.org/data/definitions/&&.html", # e.g. https://capec.mitre.org/data/definitions/157.html
1748+
"CWE": "https://cwe.mitre.org/data/definitions/&&.html", # e.g. https://cwe.mitre.org/data/definitions/79.html
17471749
"TEMP": "https://security-tracker.debian.org/tracker/", # e.g. https://security-tracker.debian.org/tracker/TEMP-0841856-B18BAF
17481750
}
17491751
# List of acceptable file types that can be uploaded to a given object via arbitrary file upload

dojo/templatetags/display_tags.py

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -781,7 +781,12 @@ def vulnerability_url(vulnerability_id):
781781
for key in settings.VULNERABILITY_URLS:
782782
if vulnerability_id.upper().startswith(key):
783783
if "&&" in settings.VULNERABILITY_URLS[key]:
784-
return settings.VULNERABILITY_URLS[key].split("&&")[0] + str(vulnerability_id) + settings.VULNERABILITY_URLS[key].split("&&")[1]
784+
# Process specific keys specially if need
785+
if key in ["CAPEC", "CWE"]:
786+
vuln_id = str(vulnerability_id).replace(f"{key}-", "")
787+
else:
788+
vuln_id = str(vulnerability_id)
789+
return f'{settings.VULNERABILITY_URLS[key].split("&&")[0]}{vuln_id}{settings.VULNERABILITY_URLS[key].split("&&")[1]}'
785790
return settings.VULNERABILITY_URLS[key] + str(vulnerability_id)
786791
return ""
787792

0 commit comments

Comments
 (0)