A small python script that enriches Vulnerability STIX Objects with other intel
Project description
Arango CVE Processor
Before you get started
Arango CVE Processor is built into Vulmatch which also handles the download of CVE objects (what you need for ACVEP to work). As such, Vulmatch is probably better suited to what you're looking for.
tl;dr
A small script that enriches CVEs to other sources with all data stored as STIX 2.1 objects.
Overview
Here at DOGESEC we work with a lot of CVE data across our products. cve2stix generates core STIX 2.1 Vulnerability objects from CVE data.
However, we have lots of other sources (EPSS, KEV, ATT&CK...) that we want to enrich this data with.
We built Arango CVE Processor to handle the generation and maintenance of these enrichments.
In short, Arango CVE Processor is a script that;
- reads the ingested CVE STIX data in ArangoDB
- creates STIX objects to represent the relationships between CVE and other datasets
Usage
Install the script
# clone the latest code
git clone https://github.com/muchdogesec/arango_cve_processor
# create a venv
cd arango_cve_processor
python3 -m venv arango_cve_processor-venv
source arango_cve_processor-venv/bin/activate
# install requirements
pip3 install -r requirements.txt
Configuration options
Arango CVE Processor has various settings that are defined in an .env file.
To create a template for the file:
cp .env.example .env
To see more information about how to set the variables, and what they do, read the .env.markdown file.
Run
python3 arango_cve_processor.py \
MODE \
--
MODE OPTIONS
The following modes are available;
cve-cwe- links vulnerability objects to CWE objects
cve-capec(relies oncve-cwerun first)- links vulnerability objects to CAPEC objects
cve-attack(relies oncve-capecrun first)- links vulnerability objects to ATT&CK objects
cve-epss- creates/updates report objects linked to CVE representing one of more EPSS score for the time range run
cve-kev(relies oncve-cwerun first)- creates/updates report objects linked to CVE representing CISA KEV data
cve-vulncheck-kev(relies oncve-cwerun first)- creates/updates report objects linked to CVE representing Vulncheck KEV data
cpematch- creates/updates grouping objects (and linked software objects) representing CPE Matches tied to CPEs.
All modes have varying options, however, the following are available in all modes
--database(required): the arangoDB database name where the objects you want to link are found. It must contain the collectionsnvd_cve_vertex_collectionandnvd_cve_edge_collection--ignore_embedded_relationships(optional, boolean). Default isfalse. iftruepassed, this will stop any embedded relationships from being generated. This is a stix2arango feature where STIX SROs will also be created for_refand_refsproperties inside each object (e.g. if_refproperty =identity--1234and SRO between the object with the_refproperty andidentity--1234will be created). See stix2arango docs for more detail if required, essentially this a wrapper for the same--ignore_embedded_relationshipssetting implemented by stix2arango--ignore_embedded_relationships_sro(optional): boolean, iftruepassed, will stop any embedded relationships from being generated from SRO objects (type=relationship). Default isfalse--ignore_embedded_relationships_smo(optional): boolean, iftruepassed, will stop any embedded relationships from being generated from SMO objects (type=marking-definition,extension-definition,language-content). Default isfalse
To see the options available for each mode you can run with the help flag (-h), e.g.,
python3 arango_cve_processor.py \
cve-epss -h
python3 arango_cve_processor.py \
cve-cwe -h
Examples
Process CVE -> CWE relationships for all CVEs modified after 2024-02-01
python3 arango_cve_processor.py \
cve-cwe \
--database vulmatch_database \
--modified_min 2024-02-01 \
--ignore_embedded_relationships true \
--ignore_embedded_relationships_sro true \
--ignore_embedded_relationships_smo true
Get all EPSS scores for CVEs for each day in 2024
python3 arango_cve_processor.py \
cve-epss \
--database vulmatch_database \
--start_date 2024-01-01 \
--end_date 2024-12-31 \
--ignore_embedded_relationships true \
--ignore_embedded_relationships_sro true \
--ignore_embedded_relationships_smo true
Update all CPE Matches modified after 2024-02-01
python3 arango_cve_processor.py \
cpematch \
--database vulmatch_database \
--updated_after 2024-02-01 \
--ignore_embedded_relationships true \
--ignore_embedded_relationships_sro true \
--ignore_embedded_relationships_smo true
Backfilling data
How it works
If you would like to know how the logic of this script works in detail, please consult the /docs directory.
Useful supporting tools
- To generate STIX 2.1 extensions: stix2 Python Lib
- STIX 2.1 specifications for objects: STIX 2.1 docs
- ArangoDB docs
Support
Minimal support provided via the DOGESEC community.
License
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file arango_cve_processor-1.3.0.tar.gz.
File metadata
- Download URL: arango_cve_processor-1.3.0.tar.gz
- Upload date:
- Size: 887.6 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
766aed86c000af440d9018446e9b423ec8981a651abc25ab9e54534dce39d63e
|
|
| MD5 |
8bed3ef823a31664b9365aebbc7e5a0f
|
|
| BLAKE2b-256 |
0a38bff7672b4fad77cca50ca98cb3568833a17520da5f0a59e0c5133946e566
|
Provenance
The following attestation bundles were made for arango_cve_processor-1.3.0.tar.gz:
Publisher:
create-release.yml on muchdogesec/arango_cve_processor
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
arango_cve_processor-1.3.0.tar.gz -
Subject digest:
766aed86c000af440d9018446e9b423ec8981a651abc25ab9e54534dce39d63e - Sigstore transparency entry: 586684839
- Sigstore integration time:
-
Permalink:
muchdogesec/arango_cve_processor@550ce4ae71bf4d6ad134d7c41bc943464be514f6 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/muchdogesec
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
create-release.yml@550ce4ae71bf4d6ad134d7c41bc943464be514f6 -
Trigger Event:
push
-
Statement type:
File details
Details for the file arango_cve_processor-1.3.0-py3-none-any.whl.
File metadata
- Download URL: arango_cve_processor-1.3.0-py3-none-any.whl
- Upload date:
- Size: 33.6 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
18bce1cd8338047b16d63d67a2b7424f15842ced3e4bd927ab76b13a14b3bbb7
|
|
| MD5 |
0e0010d1e6983571c941ca10e1b45810
|
|
| BLAKE2b-256 |
a4d26f8609cf1a76d8e3d901a35281d9cfa3741cda8b817ea1ba777ef25a74c0
|
Provenance
The following attestation bundles were made for arango_cve_processor-1.3.0-py3-none-any.whl:
Publisher:
create-release.yml on muchdogesec/arango_cve_processor
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
arango_cve_processor-1.3.0-py3-none-any.whl -
Subject digest:
18bce1cd8338047b16d63d67a2b7424f15842ced3e4bd927ab76b13a14b3bbb7 - Sigstore transparency entry: 586684846
- Sigstore integration time:
-
Permalink:
muchdogesec/arango_cve_processor@550ce4ae71bf4d6ad134d7c41bc943464be514f6 -
Branch / Tag:
refs/heads/main - Owner: https://github.com/muchdogesec
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
create-release.yml@550ce4ae71bf4d6ad134d7c41bc943464be514f6 -
Trigger Event:
push
-
Statement type: