Skip to main content

A small python script that enriches Vulnerability STIX Objects with other intel

Project description

Arango CVE Processor

Before you get started

Arango CVE Processor is built into Vulmatch which also handles the download of CVE objects (what you need for ACVEP to work). As such, Vulmatch is probably better suited to what you're looking for.

tl;dr

A small script that enriches CVEs to other sources with all data stored as STIX 2.1 objects.

arango_cve_processor

Watch the demo.

Overview

Here at DOGESEC we work with a lot of CVE data across our products. cve2stix generates core STIX 2.1 Vulnerability objects from CVE data.

However, we have lots of other sources (EPSS, KEV, ATT&CK...) that we want to enrich this data with.

We built Arango CVE Processor to handle the generation and maintenance of these enrichments.

In short, Arango CVE Processor is a script that;

  1. reads the ingested CVE STIX data in ArangoDB
  2. creates STIX objects to represent the relationships between CVE and other datasets

Usage

Install the script

# clone the latest code
git clone https://github.com/muchdogesec/arango_cve_processor
# create a venv
cd arango_cve_processor
python3 -m venv arango_cve_processor-venv
source arango_cve_processor-venv/bin/activate
# install requirements
pip3 install -r requirements.txt

Configuration options

Arango CVE Processor has various settings that are defined in an .env file.

To create a template for the file:

cp .env.example .env

To see more information about how to set the variables, and what they do, read the .env.markdown file.

Run

python3 arango_cve_processor.py \
    --database DATABASE \
    --relationship RELATIONSHIP \
    --ignore_embedded_relationships BOOLEAN \
    --modified_min DATE \
    --cve_id CVE-NNNN-NNNN CVE-NNNN-NNNN

Where;

  • --database (required): the arangoDB database name where the objects you want to link are found. It must contain the collections nvd_cve_vertex_collection and nvd_cve_edge_collection
  • --relationship (optional, dictionary): you can apply updates to certain relationships at run time. Default is all. Note, you should ensure your database contains all the required seeded data. User can select from;
    • cve-cwe
    • cve-capec
    • cve-attack
    • cve-epss
    • cve-kev
    • cve-vulncheck-kev
    • cpematch
  • --ignore_embedded_relationships (optional, boolean). Default is false. if true passed, this will stop any embedded relationships from being generated. This is a stix2arango feature where STIX SROs will also be created for _ref and _refs properties inside each object (e.g. if _ref property = identity--1234 and SRO between the object with the _ref property and identity--1234 will be created). See stix2arango docs for more detail if required, essentially this a wrapper for the same --ignore_embedded_relationships setting implemented by stix2arango
  • --ignore_embedded_relationships_sro (optional): boolean, if true passed, will stop any embedded relationships from being generated from SRO objects (type = relationship). Default is false
  • --ignore_embedded_relationships_smo (optional): boolean, if true passed, will stop any embedded relationships from being generated from SMO objects (type = marking-definition, extension-definition, language-content). Default is false
  • --modified_min (optional, date in format YYYY-MM-DD). By default arango_cve_processor will consider all CVEs in the database specified with the property _is_latest==true (that is; the latest version of the object). Using this flag with a modified time value will further filter the results processed by arango_cve_processor to STIX objects with a modified time >= to the value specified. This is useful when you don't want to process data for very old CVEs in the database.
    • NOTE: for cpematch, this is the modified time reported by the CPE Match API (it has nothing to do with CVE)
  • --created_min (optional, date in format YYYY-MM-DD). Same as modified_min but considers created date.
    • NOTE: this does not work with cpematch
  • --cve_id (optional, CVE ID): will only process the relationships for the CVE passed, otherwise all CVEs will be considered.
    • NOTE: this does not work with cpematch

Examples

Process CVE -> CWE relationships for all CVEs modified after 2023-01-01 and only created embedded relationships from SDOs and SCOs...

python3 arango_cve_processor.py \
  --database arango_cve_processor_standard_tests_database \
  --relationship cve-cwe \
  --modified_min 2024-02-01 \
  --ignore_embedded_relationships true \
  --ignore_embedded_relationships_sro true \
  --ignore_embedded_relationships_smo true

Get all EPSS scores for CVEs

python3 arango_cve_processor.py \
  --database arango_cve_processor_standard_tests_database \
  --relationship cve-epss \
  --ignore_embedded_relationships false \
  --ignore_embedded_relationships_sro true \
  --ignore_embedded_relationships_smo true

Update all CPE Matches modified after 2024-02-01

python3 arango_cve_processor.py \
  --database arango_cve_processor_standard_tests_database \
  --relationship cpematch \
  --modified_min 2024-02-01 \
  --ignore_embedded_relationships false \
  --ignore_embedded_relationships_sro true \
  --ignore_embedded_relationships_smo true

Backfilling data

stix2arango contains a set of utility scripts that can be used to backfill all the datasources required for this test.

How it works

If you would like to know how the logic of this script works in detail, please consult the /docs directory.

Useful supporting tools

Support

Minimal support provided via the DOGESEC community.

License

Apache 2.0.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

arango_cve_processor-1.1.6.tar.gz (457.7 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

arango_cve_processor-1.1.6-py3-none-any.whl (31.1 kB view details)

Uploaded Python 3

File details

Details for the file arango_cve_processor-1.1.6.tar.gz.

File metadata

  • Download URL: arango_cve_processor-1.1.6.tar.gz
  • Upload date:
  • Size: 457.7 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? Yes
  • Uploaded via: twine/6.1.0 CPython/3.12.9

File hashes

Hashes for arango_cve_processor-1.1.6.tar.gz
Algorithm Hash digest
SHA256 60c674f7b0cbfddfbb0218d3b34fee0f8c032b78b85eeca5553c8a813ca8be18
MD5 8ba5ff205a4c63b57ad7e9ef3b19b569
BLAKE2b-256 b4e50b1e90fa17bfb387b050e22333346b7e4b1c41aeae9ced735d0e1c7d62eb

See more details on using hashes here.

Provenance

The following attestation bundles were made for arango_cve_processor-1.1.6.tar.gz:

Publisher: create-release.yml on muchdogesec/arango_cve_processor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

File details

Details for the file arango_cve_processor-1.1.6-py3-none-any.whl.

File metadata

File hashes

Hashes for arango_cve_processor-1.1.6-py3-none-any.whl
Algorithm Hash digest
SHA256 c8f93798e5c1f61e7e43f2e70ef1593fd5a47e0f0547add53b373b07ceb7866b
MD5 7259c134ebeff65624a4218b015f7621
BLAKE2b-256 917daeb30327fc1789f7f76cce1bd05b63769ebffdcd6855ce472ca04f6ea01f

See more details on using hashes here.

Provenance

The following attestation bundles were made for arango_cve_processor-1.1.6-py3-none-any.whl:

Publisher: create-release.yml on muchdogesec/arango_cve_processor

Attestations: Values shown here reflect the state when the release was signed and may no longer be current.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page