-
-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
HTML toggles for false positives #21
Comments
Since White-listing CVEs wouldn't be the best idea, I would suggest doing the opposite and adding a Blacklist-Filter to the Report-Dashboard or to EMBAs html-report directly. |
I think this problem is mostly present for the Linux kernel. We ran an analysis and found a zillion CVEs. At the same time At the same time in the scan we did the from 10.0 severity issue we consider that only the one remotely exploitable are of relevance. This of course depends on the use for the firmware (quite a few bug where in the DVB subsystem). while brainstorming it would be nice to be able to store some of those choices.. |
Currently the EMBArk report is quite limited in this area. Instead, you can use the f20 log files with all the details from EMBA. You could just do a bit of grep to get all the remote exploits:
Another help is the final report which also shows you how many remote exploits are available: In the future we will include a csv report of f20 which will simplify things and probably can be used in EMBArk. |
Does it makes sense to load a CVE blacklist file from the config directory? |
Hi, we have used emba in several projects. In all cases we found issues where if we wanted to use the statistics it was required to make substantial changes to the report. We did not follow this approach but instead used emba as a good indicator of the state of the system. I will name a few problems I saw here
Overall perhaps adding the option to filter data(python/shell code) can be used to fix a few of those issues e.g. allowing to
In our setting we are writing the report using overleaf (latex) so .. a lot of work is still manual. As "user" I did not easily found/understood how to make such modifications to the system without building it all myself. |
it might also be possible to generate issues that are then for example imported into writehat https://github.com/blacklanternsecurity/writehat this could allow to remove / modify content "post" reporting. |
@keesj-exset can you provide example firmware for the additional version strings and the linux 2.4 false positive? These things should be fixable. |
This issue was originally reported in the EMBA area: e-m-b-a/emba#193
This is a tall order but would be nice for the roadmap
In most cases. the discoveries for the CVEs don't actually affect the product. For example, if I'm running a kernel version that has 200 CVE's and 7 exploits. When I look at those findings I notice the CVE's are just a raw version analysis but if you dig down into the CVE it can say stuff like "If IPV6 is enabled" "IF the following flag is enabled in x config". IT would be nice to have the ability to go into the HTML report and maybe toggle stuff off that you know is a false positive.
Kina like this project lets you do https://github.com/Guezone/SECMON.
The toggling could let you generate an XML or something that logs the CVE's that you could apply to your next scan --fpxml
The text was updated successfully, but these errors were encountered: