vFeed Usage / Cheat Sheet

What is vFeed

vfeed

Installation

On kali

apt-get install vfeed

Other

git clone https://github.com/toolswatch/vFeed.git

Register and download vfeed.db

Register here: http://www.vfeed.io/pricing/

Usage

help

python vfeedcli.py -h
 
usage: vfeedcli.py [-h] [-v] [-m Method CVE] [-e type CVE] [-s id]
 [--stats get_stats / get_latest] [-u] [--list] [--banner]
 [--migrate]
 
optional arguments:
 -h, --help show this help message and exit
 -v, --version show program's version number and exit
 -m Method CVE, --method Method CVE
 Invoking multiple vFeed methods.
 -e type CVE, --export type CVE
 Export to XML or JSON the CVE id
 -s id, --search id Search utility for CVE,CPE,CWE, OVAL or free text
 --stats get_stats / get_latest
 View the vFeed Database statistics
<span style="color: #ff0000;"> -u, --update Update the Vulnerability and Threat Database < deprecated </span>
 --list Enumerate the list of available methods
 --banner Print vFeed banner
 --migrate Migration to MongoDB

Show version

python vfeedcli.py -v
 
.:. vFeed - The Correlated Vulnerability and Threat Database .:. (ver 0.6.8)

Show statistics

python vfeedcli.py --stats get_stats
 
---------------------------------------------------------------
vFeed.db Statistics
Distinct values of CVEs and associated third party references
Database build (latest update date): 8222016
---------------------------------------------------------------
 
[+] Vulnerability Information and References
 [-] Common Vulnerability Enumeration (CVE): 78527
 [-] Affected Products or Common Platform Enumeration (CPE): 191239
 [-] Common Weakness Enumeration (CWE) types: 496
 [-] Common Attack Pattern Enumeration and Classification (CAPEC) types: 234
 [-] SecurityFocus BID: 33349
 [-] OSVDB - Open Source Vulnerability Database advisories: 22373
 [-] CERT.org Vulnerability Notes: 4275
 [-] DOD-CERT Information Assurance Vulnerability Alert (IAVA): 1168
 [-] Scip AG Security Advisories: 82392
 
[+] Third Party Vendors Patches and Advisories
 [-] IBM AIX APARs Patches Advisories: 2175
 [-] Suse Patches Advisories: 2365
 [-] Ubuntu Patches Advisories: 1966
 [-] VMware Patches Advisories: 97
 [-] Cisco Patches Advisories: 872
 [-] Debian Patches Advisories: 3109
 [-] Fedora Patches Advisories: 2887
 [-] Gentoo Patches Advisories: 1427
 [-] HP (Hewlett Packard) Patches Advisories: 2083
 [-] Mandriva Patches Advisories: 1697
 [-] Microsoft Bulletins Advisories: 1481
 [-] Microsoft KB Advisories: 2292
 [-] Redhat Patches Advisories: 4797
 [-] Redhat Bugzilla Advisories: 13686
 
[+] Exploits and Proof of Concepts
 [-] Exploit-DB Exploits: 3201
 [-] Metasploit Exploits / Modules: 1438
 [-] Milw0rm Exploits (Deprecated) : 5560
 [-] Saint Corporation Proof of Concepts and exploits: 970
 [-] D2 Elliot Web Exploitation Framework: 289
 
[+] Third Party Security Scanners Scripts
 [-] Nessus Security Scripts: 56677
 [-] OpenVAS Security Scripts: 27486
 [-] Nmap NSE scripts: 56
 [-] Open Vulnerability Assessment Language (OVAL) definitions: 26645
 
[+] Open Source Intrusion Detection Rules
 [-] Snort Detection Rules: 1344
 [-] Suricata Detection Rules: 5095

Show latest cve’s

python vfeedcli.py --stats get_latest 
---------------------------------------------------------------
vFeed.db Statistics : Latest added CVEs
607 total added new CVEs
---------------------------------------------------------------
CVE-2016-0266
CVE-2016-0280
CVE-2016-0281
CVE-2016-0361
CVE-2016-0380
CVE-2016-0635
CVE-2016-0760
CVE-2016-0782
CVE-2016-1238
CVE-2016-1276
CVE-2016-1278
<snip>

Show available methodes

python vfeedcli.py --list
 
Methods related to Class: CveExploit
 |--> get_d2
 |--> get_edb
 |--> get_milw0rm
 |--> get_msf
 |--> get_saint
Methods related to Class: CveInfo
 |--> get_capec
 |--> get_category
 |--> get_cpe
 |--> get_cve
 |--> get_cwe
 |--> get_wasc
Methods related to Class: CvePatches
 |--> get_aixapar
 |--> get_cisco
 |--> get_debian
 |--> get_fedora
 |--> get_gentoo
 |--> get_hp
 |--> get_kb
 |--> get_mandriva
 |--> get_ms
 |--> get_redhat
 |--> get_suse
 |--> get_ubuntu
 |--> get_vmware
Methods related to Class: CveRef
 |--> get_bid
 |--> get_certvn
 |--> get_iavm
 |--> get_osvdb
 |--> get_refs
 |--> get_scip
Methods related to Class: CveRisk
 |--> get_cvss
 |--> get_severity
 |--> top_alert
Methods related to Class: CveRules
 |--> get_snort
 |--> get_suricata
Methods related to Class: CveScanners
 |--> get_nessus
 |--> get_nmap
 |--> get_openvas
 |--> get_oval
Methods related to Class: ExportJson
 |--> json_dump

Call method

python vfeedcli.py -m <method> <cve>

Search

python vfeedcli.py -s <string>

Use case:
Which Tibco vulnerabilities can be detected with Nessus?

Listing all tibco cve can be done with the following:

/usr/share/vFeed# python vfeedcli.py -s cpe:/a:tibco:
[+] Gathering information ... 
 [+] cpe:/a:tibco:web_player_automation_services
 |-> CVE-2012-0690
 [+] cpe:/a:tibco:web_player:6.0.0
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:5.5.0
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:5.0.1
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:5.0.0
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:4.5.1
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:4.5.0
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:web_player:4.0.3
 |-> CVE-2014-2544
 [+] cpe:/a:tibco:vault:2.0.0
 |-> CVE-2015-5711
<snip>

Getting the CVE’s, sort unique and redirecting to file:

python vfeedcli.py -s cpe:/a:tibco: | grep CVE | cut -d " " -f2 | sort  -u -r > tibco_cves.txt
for x in $(cat tibco_cves.txt) ; do echo $x && python vfeedcli.py -m get_nessus $x ;done
 
CVE-2016-3628
null
CVE-2015-8090
null
CVE-2015-5713
null
CVE-2015-5712
null
CVE-2015-5711
null
CVE-2015-4555
null
CVE-2015-4554
null
CVE-2014-7195
null
CVE-2014-7194
null
CVE-2014-5286
null
CVE-2014-5285
[
 {
 "family": "CGI abuses", 
 "file": "tibco_spotfire_server_6_5_1.nasl", 
 "id": "78393", 
 "name": "TIBCO Spotfire Server Authentication Module Unspecified Privilege Escalation"
 }
]
 
<snip>

SQLite

You can also query the vfeed.db directly

sqlite3 vfeed.db 
SQLite version 3.14.1 2016-08-11 18:53:32
Enter ".help" for usage hints.
 
sqlite> .tables
capec_db map_cve_debian map_cve_osvdb 
capec_mit map_cve_exploitdb map_cve_oval 
cve_cpe map_cve_fedora map_cve_redhat 
cve_cwe map_cve_gentoo map_cve_saint 
cve_reference map_cve_hp map_cve_scip 
cwe_capec map_cve_iavm map_cve_snort 
cwe_category map_cve_mandriva map_cve_suricata 
cwe_db map_cve_milw0rm map_cve_suse 
cwe_wasc map_cve_ms map_cve_ubuntu 
map_cve_aixapar map_cve_msf map_cve_vmware 
map_cve_bid map_cve_mskb map_redhat_bugzilla
map_cve_certvn map_cve_nessus nvd_db 
map_cve_cisco map_cve_nmap stat_new_cve 
map_cve_d2 map_cve_openvas stat_vfeed_kpi 
 
sqlite> select * from map_cve_nessus limit 5;
 
nessus_script_id|nessus_script_file|nessus_script_name|nessus_script_family|cveid
44890|gentoo_GLSA-201001-01.nasl|GLSA-201001-01 : NTP: Denial of Service|Gentoo Local Security Checks|CVE-2009-3563
62747|seamonkey_2132.nasl|SeaMonkey < 2.13.2 Multiple Vulnerabilities|Windows|CVE-2012-4194
62747|seamonkey_2132.nasl|SeaMonkey < 2.13.2 Multiple Vulnerabilities|Windows|CVE-2012-4195
62747|seamonkey_2132.nasl|SeaMonkey < 2.13.2 Multiple Vulnerabilities|Windows|CVE-2012-4196
17713|php_5_1_5.nasl|PHP 5.1.x < 5.1.5 Multiple Vulnerabilities|CGI abuses|CVE-2006-1017