Skip to content

Commit 256cfcf

Browse files
authored
Convert site to use inline python instead of relying on manual script to generate decision point examples (#683)
* add markdown-exec plugin and doc_helpers in prep for inlining examples * add consistent VERSIONS and LATEST to decision point modules * use inline python to generate examples * replace markdown includes with inline python * remove generated static examples now provided at site build time using inline python * regenerate some json examples based on recent changes to python * update doctools.py to only generate the .json example files inline examples are now down with inline python in markdown * roll cvss decision point generation into doctools.py * make cvss decision points consistent with VERSIONS and LATEST names * add end-of-file newlines * add / fix unit tests * update cvss supplementals * reorder urgency to be low-to-high * fix pydantic type error (`list` instead of `tuple`)
1 parent 337b21a commit 256cfcf

File tree

239 files changed

+1898
-1173
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

239 files changed

+1898
-1173
lines changed

data/json/decision_points/automatable_2_0_0.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@
1717
"description": "Attackers can reliably automate steps 1-4 of the kill chain."
1818
}
1919
]
20-
}
20+
}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
{
2+
"namespace": "cvss",
3+
"version": "1.0.0",
4+
"schemaVersion": "1-0-1",
5+
"key": "AC",
6+
"name": "Access Complexity",
7+
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
8+
"values": [
9+
{
10+
"key": "L",
11+
"name": "Low",
12+
"description": "Specialized access conditions or extenuating circumstances do not exist; the system is always exploitable."
13+
},
14+
{
15+
"key": "H",
16+
"name": "High",
17+
"description": "Specialized access conditions exist; for example: the system is exploitable during specific windows of time (a race condition), the system is exploitable under specific circumstances (nondefault configurations), or the system is exploitable with victim interaction (vulnerability exploitable only if user opens e-mail)"
18+
}
19+
]
20+
}
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
{
2+
"namespace": "cvss",
3+
"version": "2.0.0",
4+
"schemaVersion": "1-0-1",
5+
"key": "AC",
6+
"name": "Access Complexity",
7+
"description": "This metric measures the complexity of the attack required to exploit the vulnerability once an attacker has gained access to the target system.",
8+
"values": [
9+
{
10+
"key": "L",
11+
"name": "Low",
12+
"description": "Specialized access conditions or extenuating circumstances do not exist."
13+
},
14+
{
15+
"key": "M",
16+
"name": "Medium",
17+
"description": "The access conditions are somewhat specialized."
18+
},
19+
{
20+
"key": "H",
21+
"name": "High",
22+
"description": "Specialized access conditions exist."
23+
}
24+
]
25+
}
Lines changed: 20 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,20 @@
1+
{
2+
"namespace": "cvss",
3+
"version": "1.0.0",
4+
"schemaVersion": "1-0-1",
5+
"key": "AV",
6+
"name": "Access Vector",
7+
"description": "This metric measures whether or not the vulnerability is exploitable locally or remotely.",
8+
"values": [
9+
{
10+
"key": "L",
11+
"name": "Local",
12+
"description": "The vulnerability is only exploitable locally (i.e., it requires physical access or authenticated login to the target system)"
13+
},
14+
{
15+
"key": "R",
16+
"name": "Remote",
17+
"description": "The vulnerability is exploitable remotely."
18+
}
19+
]
20+
}
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
{
2+
"namespace": "cvss",
3+
"version": "2.0.0",
4+
"schemaVersion": "1-0-1",
5+
"key": "AV",
6+
"name": "Access Vector",
7+
"description": "This metric reflects the context by which vulnerability exploitation is possible.",
8+
"values": [
9+
{
10+
"key": "L",
11+
"name": "Local",
12+
"description": "A vulnerability exploitable with only local access requires the attacker to have either physical access to the vulnerable system or a local (shell) account."
13+
},
14+
{
15+
"key": "A",
16+
"name": "Adjacent Network",
17+
"description": "A vulnerability exploitable with adjacent network access requires the attacker to have access to either the broadcast or collision domain of the vulnerable software."
18+
},
19+
{
20+
"key": "N",
21+
"name": "Network",
22+
"description": "A vulnerability exploitable with network access means the vulnerable software is bound to the network stack and the attacker does not require local network access or local access. Such a vulnerability is often termed 'remotely exploitable'."
23+
}
24+
]
25+
}

data/json/decision_points/cvss/attack_complexity_3.json renamed to data/json/decision_points/cvss/attack_complexity_3_0_0.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@
1717
"description": "A successful attack depends on conditions beyond the attacker's control."
1818
}
1919
]
20-
}
20+
}

data/json/decision_points/cvss/attack_complexity_3_0_1.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@
1717
"description": "The successful attack depends on the evasion or circumvention of security-enhancing techniques in place that would otherwise hinder the attack. These include: Evasion of exploit mitigation techniques. The attacker must have additional methods available to bypass security measures in place."
1818
}
1919
]
20-
}
20+
}

data/json/decision_points/cvss/attack_requirements_1.json renamed to data/json/decision_points/cvss/attack_requirements_1_0_0.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,4 +17,4 @@
1717
"description": "The successful attack depends on the presence of specific deployment and execution conditions of the vulnerable system that enable the attack."
1818
}
1919
]
20-
}
20+
}

data/json/decision_points/cvss/attack_vector_3.json renamed to data/json/decision_points/cvss/attack_vector_3_0_0.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@
2727
"description": "A vulnerability exploitable with network access means the vulnerable component is bound to the network stack and the attacker's path is through OSI layer 3 (the network layer). Such a vulnerability is often termed 'remotely exploitable' and can be thought of as an attack being exploitable one or more network hops away (e.g. across layer 3 boundaries from routers)."
2828
}
2929
]
30-
}
30+
}

data/json/decision_points/cvss/attack_vector_3_0_1.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -27,4 +27,4 @@
2727
"description": "The vulnerable system is bound to the network stack and the set of possible attackers extends beyond the other options listed below, up to and including the entire Internet. Such a vulnerability is often termed “remotely exploitable” and can be thought of as an attack being exploitable at the protocol level one or more network hops away (e.g., across one or more routers)."
2828
}
2929
]
30-
}
30+
}

0 commit comments

Comments
 (0)