From 4d599cda50f5327332d40feb08984db1a45d99f9 Mon Sep 17 00:00:00 2001 From: daniel_sagi Date: Sun, 15 Jul 2018 14:17:44 +0300 Subject: [PATCH] added classification for certificate hunting --- src/modules/hunting/certificates.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/src/modules/hunting/certificates.py b/src/modules/hunting/certificates.py index 69f20df..63f0239 100644 --- a/src/modules/hunting/certificates.py +++ b/src/modules/hunting/certificates.py @@ -1,4 +1,4 @@ -from ...core.types import Hunter, KubernetesCluster +from ...core.types import Hunter, KubernetesCluster, InformationDisclosure from ...core.events import handler from ...core.events.types import Vulnerability, Event, OpenPortEvent @@ -14,7 +14,7 @@ email_pattern = re.compile(r"([a-z0-9]+@[a-z0-9]+\.[a-z0-9]+)") class CertificateEmail(Vulnerability, Event): """Certificate includes an email address""" def __init__(self, email): - Vulnerability.__init__(self, KubernetesCluster, "Certificate includes email address: {0}".format(email)) + Vulnerability.__init__(self, KubernetesCluster, "Certificate includes email address: {0}".format(email), category=InformationDisclosure) @handler.subscribe(OpenPortEvent)