From f4ff44012ec88100b5ac1c94da3ac34371e881aa Mon Sep 17 00:00:00 2001 From: "ori.agmon" Date: Tue, 2 Oct 2018 18:02:12 +0300 Subject: [PATCH] Solved some exception bugs & did some refactoring to code & Added event --- src/modules/discovery/etcd.py | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/src/modules/discovery/etcd.py b/src/modules/discovery/etcd.py index 2437e32..174bf31 100644 --- a/src/modules/discovery/etcd.py +++ b/src/modules/discovery/etcd.py @@ -23,6 +23,11 @@ class etcdRemoteVersionDisclosureEvent(Service, Event): """Remote version disclosure might give an attacker a valuable data to attack a cluster""" def __init__(self): Service.__init__(self, name="Etcd Remote version disclosure") +class etcdAccessEnabledWithoutAuthEvent(Service, Event): + """Remote version disclosure might give an attacker a valuable data to attack a cluster""" + def __init__(self): + Service.__init__(self, name="Etcd is accessible without authorization") + @handler.subscribe(OpenPortEvent, predicate= lambda p: p.port == 2379) @@ -76,6 +81,7 @@ class etcdRemoteAccess(Hunter): def execute(self): if (self.version_disclosure()): + self.publish_event(etcdAccessEnabledWithoutAuthEvent())#if version is accessible we can publish "no auth event". self.db_keys_disclosure() self.db_keys_write_access()