From e1a1d055a9edd9a149134382242f1add995b30bb Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Fri, 30 Aug 2024 09:27:41 +0200 Subject: [PATCH 1/3] new: [vulnerability] first version of a taxonomy for vulnerabilities This taxonomy is originally maintained by MISP project and done for the vulnerability-lookup project https://github.com/cve-search/vulnerability-lookup The taxonomy will be extended and improved. Contributions are also very welcome. Thanks to @cedricbonhomme for the original discussions. --- vulnerability/machinetag.json | 66 +++++++++++++++++++++++++++++++++++ 1 file changed, 66 insertions(+) create mode 100644 vulnerability/machinetag.json diff --git a/vulnerability/machinetag.json b/vulnerability/machinetag.json new file mode 100644 index 0000000..8aa398d --- /dev/null +++ b/vulnerability/machinetag.json @@ -0,0 +1,66 @@ +{ + "namespace": "vulnerability", + "expanded": "vulnerability", + "description": "A taxonomy for describing vulnerabilities (software, hardware, or social) on different scales or with additional available information.", + "version": 1, + "predicates": [ + { + "value": "exploitability", + "expanded": "Exploitability", + "description": "Quantification of attack exploitability, providing a level of exploitation for the identified vulnerability.", + "exclusive": true + }, + { + "value": "information", + "expanded": "Information", + "description": "Complementary information related to the vulnerability." + } + ], + "values": [ + { + "predicate": "exploitability", + "entry": [ + { + "value": "industrialised", + "expanded": "Industrialised", + "description": "Existing vulnerability with detailed attack methods; multiple tools are available for exploitation." + }, + { + "value": "customised", + "expanded": "Customised", + "description": "Existing vulnerability with a detailed attack approach and one known custom tool available for exploitation." + }, + { + "value": "documented", + "expanded": "Documented", + "description": "Existing vulnerability is documented with an attack approach, but tools for exploitation are not available." + }, + { + "value": "theoretical", + "expanded": "Theoretical", + "description": "Publication describes a theoretical but no actual vulnerability is reported." + } + ] + }, + { + "predicate": "information", + "entry": [ + { + "value": "PoC", + "expanded": "Proof-of-Concept", + "description": "Reference to a proof-of-concept for exploiting the vulnerability." + }, + { + "value": "remediation", + "expanded": "Remediation", + "description": "Remediation to limit or block the exploitability of the vulnerability." + }, + { + "value": "annotation", + "expanded": "Annotation", + "description": "Annotation or clarification to a vulnerability." + } + ] + } + ] +} From 220c5637975d0fec7e1ca73c24dee1e7e751ce6c Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Fri, 30 Aug 2024 09:31:29 +0200 Subject: [PATCH 2/3] chg: [MANIFEST] updated --- MANIFEST.json | 13 +++++++++---- 1 file changed, 9 insertions(+), 4 deletions(-) diff --git a/MANIFEST.json b/MANIFEST.json index 2c7df46..f520aca 100644 --- a/MANIFEST.json +++ b/MANIFEST.json @@ -501,7 +501,7 @@ { "description": "Classification based on different categories. Based on https://www.sans.org/reading-room/whitepapers/incident/malware-101-viruses-32848", "name": "malware_classification", - "version": 2 + "version": 3 }, { "description": "classification for the identification of type of misinformation among websites. Source:False, Misleading, Clickbait-y, and/or Satirical News Sources by Melissa Zimdars 2019", @@ -511,7 +511,7 @@ { "description": "MISP taxonomy to infer with MISP behavior or operation.", "name": "misp", - "version": 12 + "version": 14 }, { "description": "MISP workflow taxonomy to support result of workflow execution.", @@ -748,12 +748,17 @@ "name": "vocabulaire-des-probabilites-estimatives", "version": 3 }, + { + "description": "A taxonomy for describing vulnerabilities (software, hardware, or social) on different scales or with additional available information.", + "name": "vulnerability", + "version": 1 + }, { "description": "Workflow support language is a common language to support intelligence analysts to perform their analysis on data and information.", "name": "workflow", - "version": 12 + "version": 14 } ], "url": "https://raw.githubusercontent.com/MISP/misp-taxonomies/main/", - "version": "20240304" + "version": "20240830" } From f467e5efe3a0fa4a980255f2b84a804e7e01f49e Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Fri, 30 Aug 2024 09:44:05 +0200 Subject: [PATCH 3/3] fix: [tools] path fixed --- tools/gen.sh | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tools/gen.sh b/tools/gen.sh index f2586a2..0e55f0f 100644 --- a/tools/gen.sh +++ b/tools/gen.sh @@ -1,7 +1,7 @@ python3 machinetag.py -a >a.txt asciidoctor a.txt asciidoctor-pdf -a allow-uri-read a.txt -cp a.html ../../misp-website-new/static/taxonomies.html -cp a.pdf ../../misp-website-new/static/taxonomies.pdf +cp a.html ../../misp-website/static/taxonomies.html +cp a.pdf ../../misp-website/static/taxonomies.pdf scp a.html circl@cpab.circl.lu:/var/www/nwww.circl.lu/doc/misp-taxonomies/index.html scp a.pdf circl@cpab.circl.lu://var/www/nwww.circl.lu/doc/misp-taxonomies/taxonomies.pdf