forked from bitsadmin/wesng
-
Notifications
You must be signed in to change notification settings - Fork 0
/
wes.py
executable file
·1013 lines (821 loc) · 40.5 KB
/
wes.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
#!/usr/bin/python3
#
# This software is provided under the BSD 3-Clause License.
# See the accompanying LICENSE file for more information.
#
# Windows Exploit Suggester - Next Generation
#
# Author: Arris Huijgen (@bitsadmin)
# Website: https://github.com/bitsadmin
from __future__ import print_function
import sys, csv, re, argparse, os, zipfile, io
import logging
from collections import Counter, OrderedDict
import copy
# Python 2 compatibility
if sys.version_info.major == 2:
from urllib import urlretrieve
ModuleNotFoundError = ImportError
else:
from urllib.request import urlretrieve
# Check availability of the chardet library:
# "The universal character encoding detector"
try:
import chardet
# Using chardet library to determine the approperiate encoding
def charset_convert(data):
encoding = chardet.detect(data)
data = data.decode(encoding['encoding'], 'ignore')
if sys.version_info.major == 2:
data = data.encode(sys.getfilesystemencoding())
return data
except (ImportError, ModuleNotFoundError):
# Parse everything as ASCII
def charset_convert(data):
data = data.decode('ascii', 'ignore')
if sys.version_info.major == 2:
data = data.encode(sys.getfilesystemencoding())
return data
logging.warning(
'chardet module not installed. In case of encoding '
'errors, install chardet using: pip{} install chardet'.format(sys.version_info.major))
# By default show plain output without color
def colored(text, color):
return text
def configure_color():
# Check availability of the termcolor library
try:
global colored
from termcolor import colored
except (ImportError, ModuleNotFoundError):
logging.warning('termcolor module not installed. To show colored output, '
'install termcolor using: pip{} install termcolor'.format(sys.version_info.major))
pass
# Also check availability of the colorama library in case of Windows
try:
if os.name == 'nt':
import colorama
colorama.init()
except (ImportError, ModuleNotFoundError):
logging.warning('colorama module not installed. To show colored output in Windows, '
'install colorama using: pip{} install colorama'.format(sys.version_info.major))
pass
class WesException(Exception):
pass
# Application details
TITLE = 'Windows Exploit Suggester'
VERSION = 1.05
RELEASE = ''
WEB_URL = 'https://github.com/bitsadmin/wesng/'
BANNER = '%s %s ( %s )'
FILENAME = 'wes.py'
# Mapping table between build numbers and versions to correctly identify
# the Windows 10/11/Server 2016/2019/2022 version specified in the systeminfo output
buildnumbers = OrderedDict([
(10240, 1507),
(10586, 1511),
(14393, 1607),
(15063, 1703),
(16299, 1709),
(17134, 1803),
(17763, 1809),
(18362, 1903),
(18363, 1909),
(19041, 2004),
(19042, '20H2'),
(19043, '21H1'),
(19044, '21H2'), # Windows 10
(19045, '22H2'),
(20348, '21H2'), # Windows Server 2022
(22000, '21H2'), # Windows 11
(22621, '22H2'),
(22631, '23H2'),
(26100, '24H2')
])
def main():
args = parse_arguments()
# Configure output coloring
if hasattr(args, 'showcolor') and args.showcolor:
configure_color()
# Application banner
print(BANNER % (colored(TITLE, 'green'), colored('%.2f' % VERSION, 'yellow'), colored(WEB_URL, 'blue')))
# Update definitions
if hasattr(args, 'perform_update') and args.perform_update:
print(colored('[+] Updating definitions', 'green'))
urlretrieve('https://raw.githubusercontent.com/bitsadmin/wesng/master/definitions.zip', 'definitions.zip')
cves, date = load_definitions('definitions.zip')
print(colored('[+] Obtained definitions created at ', 'green') + '%s' % colored(date, 'yellow'))
return
# Update application
if hasattr(args, 'perform_wesupdate') and args.perform_wesupdate:
print(colored('[+] Updating wes.py', 'green'))
urlretrieve('https://raw.githubusercontent.com/bitsadmin/wesng/master/wes.py', 'wes.py')
print(colored('[+] Updated to the latest version. Relaunch wes.py to use.', 'green'))
return
# Show tree of supersedes (for debugging purposes)
if hasattr(args, 'debugsupersedes') and args.debugsupersedes:
cves, date = load_definitions('definitions.zip')
productfilter = args.debugsupersedes[0]
supersedes = args.debugsupersedes[1:]
filtered = []
for cve in cves:
if productfilter not in cve['AffectedProduct']:
continue
filtered.append(cve)
debug_supersedes(filtered, supersedes, 0, args.verbosesupersedes)
return
# Show version
if hasattr(args, 'showversion') and args.showversion:
cves, date = load_definitions('definitions.zip')
print('Wes.py version: %.2f' % VERSION)
print('Database version: %s' % date)
return
# Using the list of missing patches as a base
if hasattr(args, 'missingpatches') and args.missingpatches:
print(colored('[+] Loading definitions', 'green'))
cves, date = load_definitions('definitions.zip')
# Obtain IDs of missing patches from file
print(colored('[+] Loading missing patches from file', 'green'))
missingpatches = []
with open(args.missingpatches, 'r') as f:
missingpatches = f.read()
missingpatches = list(filter(None, [mp.upper().replace('KB', '') for mp in missingpatches.splitlines()]))
# Obtain all records matching the IDs of the missing patches
found = list(filter(lambda c: c['BulletinKB'] in missingpatches, cves))
os_names, os_name = get_operatingsystems(found, args.operating_system)
# Perform filter on operating system
if os_name:
print(colored('[+] Filtering vulnerabilities for "%s"' % os_name, 'green'))
found = list(filter(lambda c: os_name in c['AffectedProduct'], found))
# Deduplicate results ignoring differences in the Supersedes attribute
for f in found:
f['Supersedes'] = ''
found = [dict(t) for t in {tuple([t for t in d.items()]) for d in found}]
# Append missing patches from missing.txt which are not included in the definitions.zip
foundkbs = set([kb['BulletinKB'] for kb in found])
difference = foundkbs.symmetric_difference(missingpatches)
for diff in difference:
found.append({'DatePosted': '', 'CVE': '', 'BulletinKB': diff, 'Title': '', 'AffectedProduct': '',
'AffectedComponent': '', 'Severity': '', 'Impact': '', 'Supersedes': '', 'Exploits': ''})
if os_name and 'Windows Server' in os_name:
print(colored('[+] Filtering duplicate vulnerabilities', 'green'))
found = filter_duplicates(found)
# Prepare variables for summary
sp = None
kbs = found
# Using systeminfo.txt or qfe.txt with list of installed patches as a base
else:
missingpatches = None
cves = None
os_names = None
# Use input from qfe
if hasattr(args, 'qfefile') and args.qfefile:
# If an operating_system digit is provided or no OS has been provided, load defitions to
# respectively retrieve the OS or show the list of OSs
if (hasattr(args, 'operating_system') and args.operating_system and args.operating_system.isdigit()) or \
(not hasattr(args, 'operating_system') or not args.operating_system):
# Load definitions to compile list of OSs
print(colored('[+] Loading definitions', 'green'))
cves, date = load_definitions(args.definitions)
print(' - Creation date of definitions: %s' % date)
# Propose/select OS name
os_names, os_name = get_operatingsystems(cves, args.operating_system)
if not args.operating_system:
# Print possible operating systems
list_operatingsystems(os_names)
# Quit script
print(colored('[I] Rerun the script providing the --os parameter and the index or name of the OS you want to filter on.', 'yellow'))
exit(0)
else:
productfilter = os_name
# Read KBs from QFE file
print(colored('[+] Parsing quick fix engineering (qfe) output', 'green'))
with open(args.qfefile, 'rb') as f:
qfe_data = f.read()
qfe_data = charset_convert(qfe_data)
hotfixes = get_hotfixes(qfe_data)
# Parse encoding of systeminfo.txt input
else:
print(colored('[+] Parsing systeminfo output', 'green'))
systeminfo_data = open(args.systeminfo, 'rb').read()
try:
productfilter, win, mybuild, version, arch, hotfixes = determine_product(systeminfo_data)
except WesException as e:
print(colored('[-] ' + str(e), 'red'))
exit(1)
# Add explicitly specified patches
manual_hotfixes = list(set([patch.upper().replace('KB', '') for patch in args.installedpatch]))
# Display summary
# OS info
info = colored('[+] Operating System', 'green')
if hasattr(args, 'systeminfo') and args.systeminfo:
info += ('\n'
' - Name: %s\n'
' - Generation: %s\n'
' - Build: %s\n'
' - Version: %s\n'
' - Architecture: %s') % (productfilter, win, mybuild, version, arch)
elif os_name:
info += '\n - Selected Operating System: %s' % os_name
# Hotfixes
if hotfixes:
info += '\n - Installed hotfixes (%d): %s' % (len(hotfixes), ', '.join(['KB%s' % kb for kb in hotfixes]))
else:
info += '\n - Installed hotfixes: None'
if manual_hotfixes:
info += '\n - Manually specified hotfixes (%d): %s' % (len(manual_hotfixes),
', '.join(['KB%s' % kb for kb in manual_hotfixes]))
print(info)
# Append manually specified KBs to list of hotfixes
hotfixes = list(set(hotfixes + manual_hotfixes))
hotfixes_orig = copy.deepcopy(hotfixes)
# Load definitions from definitions.zip (default) or user-provided location
# Only in case they haven't been loaded yet when the --qfe parameter has been provided
if not cves:
print(colored('[+] Loading definitions', 'green'))
cves, date = load_definitions(args.definitions)
print(' - Creation date of definitions: %s' % date)
# Determine missing patches
try:
print(colored('[+] Determining missing patches', 'green'))
filtered, found = determine_missing_patches(productfilter, cves, hotfixes)
except WesException as e:
print(colored('[-] ' + str(e), 'red'))
exit(1)
# If -d parameter is specified, use the most recent patch installed as
# reference point for the system's patching status
if args.usekbdate:
print(colored('[+] Filtering old vulnerabilities', 'green'))
recentkb = get_most_recent_kb(found)
if recentkb:
print(' - Most recent KB installed is KB%s released at %s\n'
' - Filtering all KBs released before this date' % (recentkb['BulletinKB'], recentkb['DatePosted']))
recentdate = int(recentkb['DatePosted'])
found = list(filter(lambda kb: int(kb['DatePosted']) >= recentdate, found))
if 'Windows Server' in productfilter:
print(colored('[+] Filtering duplicate vulnerabilities', 'green'))
found = filter_duplicates(found)
# If specified, hide results containing the user-specified string
# in the AffectedComponent and AffectedProduct attributes
if args.hiddenvuln or args.only_exploits or args.impacts or args.severities:
print(colored('[+] Applying display filters', 'green'))
filtered = apply_display_filters(found, args.hiddenvuln, args.only_exploits, args.impacts, args.severities)
else:
filtered = found
# In case the list of missing patches is specified,
# we don't need to search for supersedes in the MS Update Catalog
if not args.missingpatches:
# If specified, lookup superseded KBs in the Microsoft Update Catalog
# and remove CVEs if a superseded KB is installed.
if args.muc_lookup:
from muc_lookup import apply_muc_filter # ony import if necessary since it needs MechanicalSoup
print(colored('[!] Looking up superseded hotfixes in the Microsoft Update Catalog', 'yellow'))
filtered = apply_muc_filter(filtered, hotfixes_orig)
# Split up list of KBs and the potential Service Packs/Cumulative updates available
kbs, sp = get_patches_servicepacks(filtered, cves, productfilter)
# Display results
if len(filtered) > 0:
print(colored('[!] Found vulnerabilities!', 'yellow'))
if args.outputfile:
store_results(args.outputfile, filtered)
verb = 'Saved'
print_summary(kbs, sp)
else:
print_results(filtered)
verb = 'Displaying'
print_summary(kbs, sp)
if not args.operating_system and os_names and len(os_names) > 1:
# Print possible operating systems
list_operatingsystems(os_names)
print(colored('[I] Additional filter can be applied using the --os parameter', 'yellow'))
print(colored('[+] Done. ', 'green') + '%s %s of the %s vulnerabilities found.' % (verb, colored(len(filtered), 'yellow'), colored(len(found), 'yellow')))
else:
print(colored('[-] Done. No vulnerabilities found\n', 'green'))
# Load definitions.zip containing a CSV with vulnerabilities collected by the WES collector module
# and a file determining the minimum wes.py version the definitions are compatible with.
def load_definitions(definitions):
with zipfile.ZipFile(definitions, 'r') as definitionszip:
files = definitionszip.namelist()
# Version_X.XX.txt
versions = list(filter(lambda f: f.startswith('Version'), files))
versionsfile = versions[0]
dbversion = float(re.search(r'Version_(.*)\.txt', versionsfile, re.MULTILINE | re.IGNORECASE).group(1))
if dbversion > VERSION:
raise WesException(
'Definitions require at least version %.2f of wes.py. '
'Please update using wes.py --update-wes.' % dbversion)
# CVEs_yyyyMMdd.csv
# DatePosted,CVE,BulletinKB,Title,AffectedProduct,AffectedComponent,Severity,Impact,Supersedes,Exploits
cvesfiles = list(filter(lambda f: f.startswith('CVEs'), files))
cvesfile = cvesfiles[0]
cvesdate = cvesfile.split('.')[0].split('_')[1]
f = io.TextIOWrapper(definitionszip.open(cvesfile, 'r'))
cves = csv.DictReader(filter(lambda row: row[0] != '#', f), delimiter=str(','), quotechar=str('"'))
# Custom_yyyyMMdd.csv
customfiles = list(filter(lambda f: f.startswith('Custom'), files))
customfile = customfiles[0]
f = io.TextIOWrapper(definitionszip.open(customfile, 'r'))
custom = csv.DictReader(filter(lambda row: row[0] != '#', f), delimiter=str(','), quotechar=str('"'))
# Merge official and custom list of CVEs
merged = [cve for cve in cves] + [c for c in custom]
return merged, cvesdate
# Hide results based on filter(s) specified by the user. This can either be to only display results with
# public exploits, results with a given impact or results containing the user specified string(s) in
# the AffectedComponent or AffectedProduct attributes.
def apply_display_filters(found, hiddenvulns, only_exploits, impacts, severities):
# --hide 'Product 1' 'Product 2'
hiddenvulns = list(map(lambda s: s.lower(), hiddenvulns))
impacts = list(map(lambda s: s.lower(), impacts))
severities = list(map(lambda s: s.lower(), severities))
filtered = []
for cve in found:
add = True
for hidden in hiddenvulns:
if hidden in cve['AffectedComponent'].lower() or hidden in cve['AffectedProduct'].lower() or hidden in cve['Title'].lower():
add = False
break
for impact in impacts:
if not impact in cve['Impact'].lower():
add = False
else:
add = True
break
for severity in severities:
if not severity in cve['Severity'].lower():
add = False
else:
add = True
break
if add:
filtered.append(cve)
# --exploits-only
if only_exploits:
filtered = list(filter(lambda res: res['Exploits'], filtered))
return filtered
# Filter duplicate CVEs for the Windows Server operating systems which often have a
# 'Windows Server 2XXX' and a 'Windows Server 2XXX (Server Core installation)' CVE that are exactly the same
def filter_duplicates(found):
cves = list(set([cve['CVE'] for cve in found]))
newfound = []
# Iterate over unique CVEs
for cve in cves:
coreresults = list(filter(lambda cr: cr['CVE'] == cve and 'Server Core' in cr['AffectedProduct'], found))
# If no 'Server Core' results for CVE, just add all records matching the CVE
if len(coreresults) == 0:
normalresults = list(filter(lambda nr: nr['CVE'] == cve, found))
for n in normalresults:
newfound.append(n)
continue
# In case 'Server Core' records are found, identify matching non-core results
for r in coreresults:
regularcounterparts = list(filter(lambda c:
'Server Core' not in c['AffectedProduct'] and
c['CVE'] == r['CVE'] and
c['BulletinKB'] == r['BulletinKB'] and
c['Title'] == r['Title'] and
c['AffectedComponent'] == r['AffectedComponent'] and
c['Severity'] == r['Severity'] and
c['Impact'] == r['Impact'] and
c['Exploits'] == r['Exploits'], found))
# If non-'Server Core' counterparts are found, add these
if len(regularcounterparts) >= 1:
for rc in regularcounterparts:
newfound.append(rc)
# Otherwise, add the 'Server Core' CVE
else:
newfound.append(r)
return newfound
# Filter CVEs that are applicable to this system
def determine_missing_patches(productfilter, cves, hotfixes):
filtered = []
# Product with a Service Pack
if 'Service Pack' in productfilter:
for cve in cves:
if productfilter not in cve['AffectedProduct']:
continue
cve['Relevant'] = True
filtered.append(cve)
if cve['Supersedes']:
hotfixes.append(cve['Supersedes'])
# Make sure that if the productfilter does not contain a Service Pack, we don't list the versions of that OS
# which include a Service Pack in the product name
else:
productfilter_sp = productfilter + ' Service Pack'
for cve in cves:
if productfilter not in cve['AffectedProduct'] or productfilter_sp in cve['AffectedProduct']:
continue
cve['Relevant'] = True
filtered.append(cve)
if cve['Supersedes']:
hotfixes.append(cve['Supersedes'])
# Collect patches that are already superseeded and
# merge these with the patches found installed on the system
hotfixes = ';'.join(set(hotfixes))
marked = set()
mark_superseeded_hotfix(filtered, hotfixes, marked)
# Check if left over KBs contain overlaps, for example a separate security hotfix
# which is also contained in a monthly rollup update
check = filter(lambda cve: cve['Relevant'], filtered)
supersedes = set([x['Supersedes'] for x in check])
checked = filter(lambda cve: cve['BulletinKB'] in supersedes, check)
for c in checked:
c['Relevant'] = False
# Final results
found = list(filter(lambda cve: cve['Relevant'], filtered))
for f in found:
del f['Relevant']
return filtered, found
# Function which recursively marks KBs as irrelevant whenever they are superseeded
def mark_superseeded_hotfix(filtered, superseeded, marked):
# Locate all CVEs for KB
for ssitem in superseeded.split(';'):
foundSuperseeded = filter(lambda cve: cve['Relevant'] and cve['BulletinKB'] == ssitem, filtered)
for ss in foundSuperseeded:
ss['Relevant'] = False
# In case there is a child, recurse (depth first)
if ss['Supersedes'] and ss['Supersedes'] not in marked:
marked.add(ss['Supersedes'])
mark_superseeded_hotfix(filtered, ss['Supersedes'], marked)
# Determine Windows version based on the systeminfo input file provided
def determine_product(systeminfo):
systeminfo = charset_convert(systeminfo)
# Fixup for 7_sp1_x64_enterprise_fr_systeminfo_powershell.txt
systeminfo = systeminfo.replace('\xA0', '\x20')
# OS Version
regex_version = re.compile(r'.*?((\d+\.?){3}) ((Service Pack (\d)|N\/\w|.+) )?[ -\xa5]+ (\d+).*', re.MULTILINE | re.IGNORECASE)
systeminfo_matches = regex_version.findall(systeminfo)
if len(systeminfo_matches) == 0:
raise WesException('Not able to detect OS version based on provided input file\n In case you used the missingkbs script, use: wes.py -m missing.txt')
systeminfo_matches = systeminfo_matches[0]
mybuild = int(systeminfo_matches[5])
servicepack = systeminfo_matches[4]
# OS Name
win_matches = re.findall(r'.*?Microsoft[\(R\)]{0,3} Windows[\(R\)?]{0,3} ?(Serverr? )?(\d+\.?\d?( R2)?|XP|VistaT).*', systeminfo, re.MULTILINE | re.IGNORECASE)
if len(win_matches) == 0:
raise WesException('Not able to detect OS name based on provided input file')
win = win_matches[0][1]
# System Type
archs = re.findall(r'.*?([\w\d]+?)-based PC.*', systeminfo, re.MULTILINE | re.IGNORECASE)
if len(archs) > 0:
arch = archs[0]
else:
logging.warning('Cannot determine system\'s architecture. Assuming x64')
arch = 'x64'
# Hotfix(s)
hotfixes = get_hotfixes(systeminfo)
# Determine Windows 10/11 version based on build
version = None
for build in buildnumbers:
if mybuild == build:
version = buildnumbers[build]
break
if mybuild > build:
version = buildnumbers[build]
else:
break
# Compile name for product filter
# Architecture
if win not in ['XP', 'VistaT', '2003', '2003 R2']:
if arch == 'X86':
arch = '32-bit'
elif arch == 'x64':
arch = 'x64-based'
# Client OSs
if win == 'XP':
productfilter = 'Microsoft Windows XP'
if arch != 'X86':
productfilter += ' Professional %s Edition' % arch
if servicepack:
productfilter += ' Service Pack %s' % servicepack
elif win == 'VistaT':
productfilter = 'Windows Vista'
if arch != 'x86':
productfilter += ' %s Edition' % arch
if servicepack:
productfilter += ' Service Pack %s' % servicepack
elif win == '7':
productfilter = 'Windows %s for %s Systems' % (win, arch)
if servicepack:
productfilter += ' Service Pack %s' % servicepack
elif win == '8':
productfilter = 'Windows %s for %s Systems' % (win, arch)
elif win == '8.1':
productfilter = 'Windows %s for %s Systems' % (win, arch)
elif win == '10':
productfilter = 'Windows %s Version %s for %s Systems' % (win, version, arch)
elif win == '11':
productfilter = 'Windows %s Version %s for %s Systems' % (win, version, arch)
# Server OSs
elif win == '2003':
if arch == 'X86':
arch = ''
elif arch == 'x64':
arch = ' x64 Edition'
pversion = '' if version is None else ' ' + version
productfilter = 'Microsoft Windows Server %s%s%s' % (win, arch, pversion)
# elif win == '2003 R2':
# Not possible to distinguish between Windows Server 2003 and Windows Server 2003 R2 based on the systeminfo output
# See: https://serverfault.com/q/634149
# Even though in the definitions there is a distinction though between 2003 and 2003 R2, there are only around 50
# KBs specificly for 2003 R2 (x86/x64) and almost 6000 KBs for 2003 (x86/x64)
elif win == '2008':
pversion = '' if version is None else ' ' + version
productfilter = 'Windows Server %s for %s Systems%s' % (win, arch, pversion)
elif win == '2008 R2':
pversion = '' if version is None else ' ' + version
productfilter = 'Windows Server %s for %s Systems%s' % (win, arch, pversion)
elif win == '2012':
productfilter = 'Windows Server %s' % win
elif win == '2012 R2':
productfilter = 'Windows Server %s' % win
elif win == '2016':
productfilter = 'Windows Server %s' % win
elif win == '2019':
productfilter = 'Windows Server %s' % win
elif win == '2022':
productfilter = 'Windows Server %s' % win
else:
raise WesException('Failed assessing Windows version {}'.format(win))
return productfilter, win, mybuild, version, arch, hotfixes
# Extract hotfixes from provided text file
def get_hotfixes(text):
hotfix_matches = re.findall(r'.*KB\d+.*', text, re.MULTILINE | re.IGNORECASE)
hotfixes = []
for match in hotfix_matches:
hotfixes.append(re.search(r'.*KB(\d+).*', match, re.MULTILINE | re.IGNORECASE).group(1))
return hotfixes
# Debugging feature to list hierarchy of superseeded KBs according to the definitions file
def debug_supersedes(cves, kbs, indent, verbose):
for kb in kbs:
# Determine KBs superseeded by provided KB
foundkbs = list(filter(lambda k: k['BulletinKB'] == kb, cves))
# Extract date and title
titles = []
for f in foundkbs:
titles.append(f['Title'])
titles = list(set(filter(None, titles)))
titles.sort()
kbdate = foundkbs[0]['DatePosted'] if foundkbs else '????????'
kbtitle = titles[0] if titles else ''
# Print
indentstr = ' ' * indent
print('[%.2d][%s] %s%s - %s' % (indent, kbdate, indentstr, kb.ljust(7, ' '), kbtitle))
if verbose and len(titles) > 1:
for t in titles[1:]:
print('%s%s%s' % (indentstr, ' ' * 25, t))
# Recursively iterate over KBs superseeded by the current KB
supersedes = []
for f in foundkbs:
supersedes += f['Supersedes'].split(';')
supersedes = list(set(filter(None, supersedes)))
debug_supersedes(cves, supersedes, indent + 1, verbose)
# Split up list of KBs and the potential Service Packs/Cumulative updates available
def get_patches_servicepacks(results, cves, productfilter):
# Extract available Service Packs (if any)
sp = list(filter(lambda c: c['CVE'].startswith('SP'), results))
if len(sp) > 0:
sp = sp[0] # There should only be one result
# Only focus on OS + architecure, current service pack is not relevant
productfilter = re.sub(r' Service Pack \d', '', productfilter)
# Determine service packs available for the OS and determine the latest version available
servicepacks = list(filter(lambda c: c['CVE'].startswith('SP') and productfilter in c['AffectedProduct'], cves))
lastpatch = get_last_patch(servicepacks, sp)
# Remove service packs from regular KB output
kbs = list(filter(lambda c: not c['CVE'].startswith('SP'), results))
return kbs, lastpatch
return results, None
def get_operatingsystems(found, os_name):
# Compile the list of operating systems available from the results of above filter
# This list is provided to the user to further filter down the specific vulnerabilities
allproducts = list(set(t['AffectedProduct'] for t in found))
regex_wp = re.compile(r'.*(Windows (Server|(\d+.?)+|XP).*)')
os_names = list(set([wp[0] for wp in regex_wp.findall('\n'.join(allproducts))]))
os_names.sort()
# If --os parameter is provided, filter results on OS
if os_name:
# Support for providing an index in stead of the full OS string
if os_name.isdigit():
if int(os_name) >= len(os_names):
print(colored('[-] Invalid operating system index specified with the --os parameter', 'red'))
exit(1)
os_name = os_names[int(os_name)]
return os_names, os_name
def list_operatingsystems(os_names):
# List operating systems
print(colored('[I] List of operating systems:', 'green'))
i = 0
for name in os_names:
print(' [%d] %s' % (i, name))
i += 1
# Obtain most recent patch tracing back recursively locating records which superseeded the provided record
def get_last_patch(servicepacks, kb):
results = list(filter(lambda c: c['Supersedes'] == kb['BulletinKB'], servicepacks))
if results:
return get_last_patch(servicepacks, results[0])
else:
return kb
# Show summary at the end of results containing the number of patches and the most recent patch installed
def print_summary(kbs, sp):
# Collect unique BulletinKBs
missingpatches = set(r['BulletinKB'] for r in kbs)
print(colored('[-] Missing patches: ', 'red') + '%s' % colored(len(missingpatches), 'yellow'))
# Show missing KBs with number of vulnerabilites per KB
grouped = Counter([r['BulletinKB'] for r in kbs if r['DatePosted']])
foundmissing = grouped.most_common()
for line in foundmissing:
kb = line[0]
number = line[1]
print(' - KB%s: patches %s %s' % (kb, number, 'vulnerability' if number == 1 else 'vulnerabilities'))
# Show in case a service pack is missing
if sp:
print(colored('[-] Missing service pack', 'red'))
print(' - %s' % sp['Title'])
# Show additional missing KBs when the --missing parameter is used
if len(missingpatches) > len(grouped):
difference = missingpatches.symmetric_difference([r[0] for r in foundmissing])
for kb in difference:
print(' - KB%s: patches an unknown number of vulnerabilities' % kb)
print(colored('[I] Check the details of the unknown patches at https://support.microsoft.com/help/KBID,\n for example https://support.microsoft.com/help/890830 in case of KB890830', 'yellow'))
# Show date of most recent KB
# Skip if no most recent KB available
if len(grouped) == 0:
return
foundkb = get_most_recent_kb(kbs)
message = colored('[I] KB with the most recent release date', 'yellow')
print('%s\n'
' - ID: KB%s\n'
' - Release date: %s' % (message, foundkb['BulletinKB'], foundkb['DatePosted']))
# Obtain most recent KB from a dictionary of results
def get_most_recent_kb(results):
dates = [int(r['DatePosted']) for r in results if r['DatePosted']]
if dates:
date = str(max(dates))
return list(filter(lambda kb: kb['DatePosted'] == date, results))[0]
else:
return None
# Output results of wes.py to screen
def print_results(results):
print()
for res in results:
# Don't print KBs which are supplied through the --missing parameter but are not included in the definitions.zip
if not res['DatePosted']:
continue
exploits = res['Exploits'] if 'Exploits' in res else ''
label = 'Exploit'
value = 'n/a'
if len(exploits) > 0:
value = colored(exploits, 'blue')
if ',' in exploits:
label = 'Exploits'
if res['Severity'] == 'Critical':
highlight = 'red'
elif res['Severity'] == 'Important':
highlight = 'yellow'
elif res['Severity'] == 'Low':
highlight = 'green'
elif res['Severity'] == 'Moderate':
highlight = 'blue'
else:
highlight = 'red'
print('Date: %s\n'
'CVE: %s\n'
'KB: KB%s\n'
'Title: %s\n'
'Affected product: %s\n'
'Affected component: %s\n'
'Severity: %s\n'
'Impact: %s\n'
'%s: %s\n' % (res['DatePosted'], res['CVE'], res['BulletinKB'], res['Title'], res['AffectedProduct'], res['AffectedComponent'], colored(res['Severity'], highlight), res['Impact'], label, value))
# Output results of wes.py to a .csv file
def store_results(outputfile, results):
print(colored('[+] Writing %d results to %s' % (len(results), outputfile), 'green'))
# Python 2 compatibility
if sys.version_info.major == 2:
f = open(outputfile, 'wb')
else:
f = open(outputfile, 'w', newline='')
header = list(results[0].keys())
header.remove('Supersedes')
writer = csv.DictWriter(f, fieldnames=header, quoting=csv.QUOTE_ALL)
writer.writeheader()
for r in results:
if 'Supersedes' in r:
del r['Supersedes']
writer.writerow(r)
# Validate file existence for user-provided arguments
def check_file_exists(value):
if not os.path.isfile(value):
raise argparse.ArgumentTypeError('File \'%s\' does not exist.' % value)
return value
# Validate file existence for definitions file
def check_definitions_exists(value):
if not os.path.isfile(value):
raise argparse.ArgumentTypeError('Definitions file \'%s\' does not exist. Try running %s --update first.' % (value, FILENAME))
return value
# Specify arguments using for the argparse library
def parse_arguments():
examples = r'''Examples:
Download latest definitions
{0} --update
{0} -u
Determine vulnerabilities
{0} systeminfo.txt
Determine vulnerabilities using the qfe file. List the OS by first running the command without the --os parameter
{0} --qfe qfe.txt --os 'Windows 10 Version 20H2 for x64-based Systems'
{0} -q qfe.txt --os 9
Determine vulnerabilities and output to file
{0} systeminfo.txt --output vulns.csv
{0} systeminfo.txt -o vulns.csv
Determine vulnerabilities explicitly specifying KBs to reduce false-positives
{0} systeminfo.txt --patches KB4345421 KB4487017
{0} systeminfo.txt -p KB4345421 KB4487017
Determine vulnerabilies filtering out out vulnerabilities of KBs that have been published before the publishing date of the most recent KB installed
{0} systeminfo.txt --usekbdate
{0} systeminfo.txt -d
Determine vulnerabilities explicitly specifying definitions file
{0} systeminfo.txt --definitions C:\tmp\mydefs.zip
List only vulnerabilities with exploits, excluding IE, Edge and Flash
{0} systeminfo.txt --exploits-only --hide "Internet Explorer" Edge Flash
{0} systeminfo.txt -e --hide "Internet Explorer" Edge Flash
Only show vulnerabilities of a certain impact
{0} systeminfo.txt --impact "Remote Code Execution"
{0} systeminfo.txt -i "Remote Code Execution"
Only show vulnerabilities of a certain severity
{0} systeminfo.txt --severity critical
{0} systeminfo.txt -s critical
Show vulnerabilities based on missing patches
{0} --missing missing.txt
{0} -m missing.txt
Show vulnerabilities based on missing patches specifying OS
{0} --missing missing.txt --os "Windows 10 Version 1809 for x64-based Systems"
{0} -m missing.txt --os 2
Validate supersedence against Microsoft's online Update Catalog
{0} systeminfo.txt --muc-lookup
Show colored output
{0} systeminfo.txt --color
{0} systeminfo.txt -c
Download latest version of WES-NG
{0} --update-wes
'''.format(FILENAME)
parser = argparse.ArgumentParser(
description=BANNER % (TITLE, '%.2f' % VERSION, WEB_URL),
add_help=False,
epilog=examples,
formatter_class=argparse.RawDescriptionHelpFormatter
)
# Update definitions
parser.add_argument('-u', '--update', dest='perform_update', action='store_true', help='Download latest list of CVEs')
args, xx = parser.parse_known_args()
if args.perform_update:
return parser.parse_args()
# General options
parser.add_argument('--definitions', action='store', nargs='?', type=check_definitions_exists, default='definitions.zip', help='Definitions zip file (default: definitions.zip)')
parser.add_argument('-p', '--patches', dest='installedpatch', nargs='+', default='', help='Manually specify installed patches in addition to the ones listed in the systeminfo.txt file')
parser.add_argument('-d', '--usekbdate', dest='usekbdate', action='store_true', help='Filter out vulnerabilities of KBs published before the publishing date of the most recent KB installed')
parser.add_argument('-e', '--exploits-only', dest='only_exploits', action='store_true', help='Show only vulnerabilities with known exploits')
parser.add_argument('--hide', dest='hiddenvuln', nargs='+', default='', help='Hide vulnerabilities of for example Adobe Flash Player and Microsoft Edge')
parser.add_argument('-i', '--impact', dest='impacts', nargs='+', default='', help='Only display vulnerabilities with a given impact')
parser.add_argument('-s', '--severity', dest='severities', nargs='+', default='', help='Only display vulnerabilities with a given severity')
parser.add_argument('-o', '--output', action='store', dest='outputfile', nargs='?', help='Store results in a file')
parser.add_argument('--muc-lookup', dest='muc_lookup', action='store_true', help='Hide vulnerabilities if installed hotfixes are listed in the Microsoft Update Catalog as superseding hotfixes for the original BulletinKB')
parser.add_argument('--os', action='store', dest='operating_system', nargs='?', help='Specify operating system or ID from list when running without this parameter')
parser.add_argument('-c', '--color', dest='showcolor', action='store_true', help='Show console output in color (requires termcolor library)')
parser.add_argument('-h', '--help', action='help', help='Show this help message and exit')
# Update application
parser.add_argument('--update-wes', dest='perform_wesupdate', action='store_true', help='Download latest version of wes.py')
args, xx = parser.parse_known_args()
if args.perform_wesupdate:
return parser.parse_args()
# Show version
parser.add_argument('--version', dest='showversion', action='store_true', help='Show version information')
args, xx = parser.parse_known_args()
if args.showversion:
return parser.parse_args()
# Use missing patches input file
parser.add_argument('-m', '--missing', dest='missingpatches', nargs='?', type=check_file_exists, help='Provide file with the list of patches missing from the system. This file can be generated using the WES-NG\'s missingpatches.vbs utility')
args, xx = parser.parse_known_args()
if args.missingpatches:
return parser.parse_args()
# Use qfe input file
parser.add_argument('-q', '--qfe', dest='qfefile', nargs='?', type=check_file_exists, help='Specify the file containing the output of the \'wmic qfe\' command')
args, xx = parser.parse_known_args()
if args.qfefile:
return parser.parse_args()
# Debug supersedes: perform a check on the supersedence tree according to the definitions.zip
# First argument is OS (as listed in the definitions) or an empty string for no filter, next arguments are 1 or more KBs.
# The --verbose argument will have wes.py print all titles of KBs found instead of only the first title.
# Example: wes.py --debug-supersedes "Windows Vista x64 Edition Service Pack 2" 3216916 --verbose
parser.add_argument('--debug-supersedes', dest='debugsupersedes', nargs='+', default='', help=argparse.SUPPRESS)
parser.add_argument('--verbose', dest='verbosesupersedes', action='store_true', help=argparse.SUPPRESS)
args, xx = parser.parse_known_args()
if args.debugsupersedes:
return parser.parse_args()
# Mandatory input files, in case no other flow has been chosen