Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

How is server/json mode expected to work for windows ? #1886

Open
maxenced opened this issue Mar 26, 2024 · 1 comment
Open

How is server/json mode expected to work for windows ? #1886

maxenced opened this issue Mar 26, 2024 · 1 comment
Labels

Comments

@maxenced
Copy link

Hi,

With latest (as of march 2024) version of vuls + gost (+gocve-dict and goval-dict), I can't find a way to get results for windows, using server mode + json. The sample provided at https://vuls.io/docs/en/usage-server.html#windows-1 is missing the packages list. I tried something like this : windows3.json but still don't get any result (even when moving all KBs as unapplied).

Anyone has a working example ?

@MaineK00n
Copy link
Collaborator

MaineK00n commented Mar 26, 2024

@maxenced

Thanks for the good questions!
This was a mistake in the document.
Referring to your json, you should change it as follows.

26c26
<   "release": "Windows 10 Version 22H2 for x64-based System",
---
>   "release": "Windows 10 Version 22H2 for x64-based Systems",

Running the corrected document, it looks like this

$ cat windows.json
{
  "family": "windows",
  "release": "Windows 10 Version 22H2 for x64-based Systems",
  "runningKernel": {
    "version": "10.0.19045.2546"
  },
  "windowsKB": {
    "applied": [
      "5020030"
    ],
    "unapplied": [
      "5022834"
    ]
  }
}

$ curl -X POST -H "Content-Type: application/json" -d @windows.json http://127.0.0.1:5515/vuls | jq
[
  {
    "jsonVersion": 0,
    "lang": "",
    "serverUUID": "",
    "serverName": "",
    "family": "windows",
    "release": "Windows 10 Version 22H2 for x64-based Systems",
    "container": {
      "containerID": "",
      "name": "",
      "image": "",
      "type": "",
      "uuid": ""
    },
    "platform": {
      "name": "",
      "instanceID": ""
    },
    "scannedAt": "0001-01-01T00:00:00Z",
    "scanMode": "",
    "scannedVersion": "",
    "scannedRevision": "",
    "scannedBy": "",
    "scannedVia": "",
    "reportedAt": "2024-03-26T19:10:17.762998304+09:00",
    "reportedVersion": "",
    "reportedRevision": "",
    "reportedBy": "",
    "errors": null,
    "warnings": null,
    "scannedCves": {
      "ADV220005": {
        "cveID": "ADV220005",
        "confidences": [
          {
            "score": 100,
            "detectionMethod": "WindowsUpdateSearch"
          }
        ],
        "distroAdvisories": [
          {
            "advisoryID": "KB5022282",
            "severity": "",
            "issued": "0001-01-01T00:00:00Z",
            "updated": "0001-01-01T00:00:00Z",
            "description": "Microsoft Knowledge Base"
          }
        ],
        "cveContents": {
          "microsoft": [
            {
              "type": "microsoft",
              "cveID": "ADV220005",
              "title": "Guidance on Microsoft Signed Drivers Being Used Maliciously",
...

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants