mirror of
https://github.com/aquasecurity/kube-hunter.git
synced 2026-05-09 10:47:10 +00:00
91 lines
3.5 KiB
Python
91 lines
3.5 KiB
Python
from __future__ import print_function
|
|
|
|
from prettytable import ALL, PrettyTable
|
|
|
|
from __main__ import config
|
|
from collector import services, vulnerabilities, services_lock, vulnerabilities_lock
|
|
|
|
EVIDENCE_PREVIEW = 40
|
|
MAX_TABLE_WIDTH = 20
|
|
|
|
|
|
class PlainReporter(object):
|
|
|
|
def get_report(self):
|
|
"""generates report tables"""
|
|
output = ""
|
|
|
|
vulnerabilities_lock.acquire()
|
|
vulnerabilities_len = len(services)
|
|
vulnerabilities_lock.release()
|
|
|
|
services_lock.acquire()
|
|
services_len = len(vulnerabilities)
|
|
services_lock.release()
|
|
|
|
if services_len:
|
|
output += self.nodes_table()
|
|
if not config.mapping:
|
|
output += self.services_table()
|
|
if vulnerabilities_len:
|
|
output += self.vulns_table()
|
|
else:
|
|
output += "\nNo vulnerabilities were found"
|
|
else:
|
|
print("\nKube Hunter couldn't find any clusters")
|
|
# print("\nKube Hunter couldn't find any clusters. {}".format("Maybe try with --active?" if not config.active else ""))
|
|
return output
|
|
|
|
def nodes_table(self):
|
|
nodes_table = PrettyTable(["Type", "Location"], hrules=ALL)
|
|
nodes_table.align = "l"
|
|
nodes_table.max_width = MAX_TABLE_WIDTH
|
|
nodes_table.padding_width = 1
|
|
nodes_table.sortby = "Type"
|
|
nodes_table.reversesort = True
|
|
nodes_table.header_style = "upper"
|
|
# TODO: replace with sets
|
|
id_memory = list()
|
|
services_lock.acquire()
|
|
for service in services:
|
|
if service.event_id not in id_memory:
|
|
nodes_table.add_row(["Node/Master", service.host])
|
|
id_memory.append(service.event_id)
|
|
nodes_ret = "\nNodes\n{}\n".format(nodes_table)
|
|
services_lock.release()
|
|
return nodes_ret
|
|
|
|
def services_table(self):
|
|
services_table = PrettyTable(["Service", "Location", "Description"], hrules=ALL)
|
|
services_table.align = "l"
|
|
services_table.max_width = MAX_TABLE_WIDTH
|
|
services_table.padding_width = 1
|
|
services_table.sortby = "Service"
|
|
services_table.reversesort = True
|
|
services_table.header_style = "upper"
|
|
services_lock.acquire()
|
|
for service in services:
|
|
services_table.add_row([service.get_name(), "{}:{}{}".format(service.host, service.port, service.get_path()), service.explain()])
|
|
detected_services_ret = "\nDetected Services\n{}\n".format(services_table)
|
|
services_lock.release()
|
|
return detected_services_ret
|
|
|
|
def vulns_table(self):
|
|
column_names = ["Location", "Category", "Vulnerability", "Description", "Evidence"]
|
|
vuln_table = PrettyTable(column_names, hrules=ALL)
|
|
vuln_table.align = "l"
|
|
vuln_table.max_width = MAX_TABLE_WIDTH
|
|
vuln_table.sortby = "Category"
|
|
vuln_table.reversesort = True
|
|
vuln_table.padding_width = 1
|
|
vuln_table.header_style = "upper"
|
|
|
|
vulnerabilities_lock.acquire()
|
|
for vuln in vulnerabilities:
|
|
row = ["{}:{}".format(vuln.host, vuln.port) if vuln.host else "", vuln.category.name, vuln.get_name(), vuln.explain()]
|
|
evidence = str(vuln.evidence)[:EVIDENCE_PREVIEW] + "..." if len(str(vuln.evidence)) > EVIDENCE_PREVIEW else str(vuln.evidence)
|
|
row.append(evidence)
|
|
vuln_table.add_row(row)
|
|
vulnerabilities_lock.release()
|
|
return "\nVulnerabilities\n{}\n".format(vuln_table)
|