Skip to content

Commit e22cb38

Browse files
🎉 Add vulnerability Id to ssh-audit (#10979)
1 parent 7496e2a commit e22cb38

2 files changed

Lines changed: 3 additions & 0 deletions

File tree

dojo/tools/ssh_audit/parser.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,6 +53,8 @@ def get_findings(self, filename, test):
5353
description="\n".join(description),
5454
severity=severity,
5555
static_finding=False)
56+
finding.unsaved_vulnerability_ids = []
57+
finding.unsaved_vulnerability_ids.append(cvename)
5658
items.append(finding)
5759
finding.unsaved_endpoints = []
5860
endpoint = Endpoint(host=data["target"].split(":")[0], port=data["target"].split(":")[1])

unittests/tools/test_ssh_audit_parser.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ def test_parse_file_with_many_vuln_has_many_findings(self):
1717
self.assertEqual(findings[1].title, "SSH-2.0-OpenSSH_7.9p1 Debian-10+deb10u2_CVE-2020-15778")
1818
self.assertEqual(findings[0].severity, "High")
1919
self.assertEqual(findings[13].severity, "Medium")
20+
self.assertEqual("CVE-2021-41617", findings[0].unsaved_vulnerability_ids[0])
2021

2122
def test_parse_file_with_many_vuln_has_many_findings2(self):
2223
with open("unittests/scans/ssh_audit/many_vulns2.json", encoding="utf-8") as testfile:

0 commit comments

Comments
 (0)