Skip to content

Commit 04235a8

Browse files
Add new flags into documentation (fixes #956)
1 parent 2f9757b commit 04235a8

File tree

1 file changed

+53
-17
lines changed

1 file changed

+53
-17
lines changed

doc/MANUAL.md

Lines changed: 53 additions & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -6,6 +6,9 @@
66
- [Optional Arguments:](#optional-arguments)
77
- [-u {now,daily,never}, --update {now,daily,never}](#-u-nowdailynever---update-nowdailynever)
88
- [-e EXCLUDE, --exclude EXCLUDE](#-e-exclude---exclude-exclude)
9+
- [-h, --help](#-h---help)
10+
- [-V, --version ](#-V---version)
11+
- [--disable-version-check](#--disable-version-check)
912
- [Checkers Arguments:](#checkers-arguments)
1013
- [-s SKIPS, --skips SKIPS](#-s-skips---skips-skips)
1114
- [-r CHECKERS, --runs CHECKERS](#-r-checkers---runs-checkers)
@@ -15,7 +18,10 @@
1518
- [-C CONFIG, --config CONFIG](#-c-config---config-config)
1619
- [Output Arguments:](#output-arguments)
1720
- [-o OUTPUT_FILE, --output-file OUTPUT_FILE](#-o-output_file---output-file-output_file)
18-
- [-f {csv,json,console}, --format {csv,json,console}](#-f-csvjsonconsole---format-csvjsonconsole)
21+
- [--html-theme HTML_THEME](#--html-theme-html_theme)
22+
- [-f {csv,json,console,html}, --format {csv,json,console,html}](#-f-csvjsonconsolehtml---format-csvjsonconsolehtml)
23+
- [-c CVSS, --cvss CVSS](#-c-cvss---cvss-cvss)
24+
- [-S {low,medium,high,critical}, --severity {low,medium,high,critical}](#S-lowmediumhighcritical---severity-lowmediumhighcritical)
1925
- [Output verbosity](#output-verbosity)
2026
- [Quiet Mode](#quiet-mode)
2127
- [Logging modes](#logging-modes)
@@ -26,16 +32,16 @@
2632

2733
# CVE Binary Tool User Manual
2834

29-
The CVE Binary Tool scans for a number of common, vulnerable open source
30-
components like openssl, libpng, libxml2, expat etc. to let you know
31-
if a given directory or binary file includes common libraries with
35+
The CVE Binary Tool scans for a number of common, vulnerable open source
36+
components like openssl, libpng, libxml2, expat etc. to let you know
37+
if a given directory or binary file includes common libraries with
3238
known vulnerabilities., known as CVEs(Common Vulnerabilities and Exposures).
3339

3440
Usage:
3541
`cve-bin-tool`
3642

37-
You can also do `python -m cve_bin_tool.cli`
38-
which is useful if you're trying the latest code from
43+
You can also do `python -m cve_bin_tool.cli`
44+
which is useful if you're trying the latest code from
3945
[the cve-bin-tool github](https://github.com/intel/cve-bin-tool).
4046

4147
optional arguments:
@@ -77,7 +83,7 @@ which is useful if you're trying the latest code from
7783
| | | | Available checkers | | | |
7884
| -------- | --------- | ---------------| ------------------ | ---------- | ---------- | ------- |
7985
| avahi | bash | bind | binutils | busybox | bzip2 | cups |
80-
| curl | dovecot | expat | ffmpeg | freeradius | gcc | gimp |
86+
| curl | dovecot | expat | ffmpeg | freeradius | gcc | gimp |
8187
| gnutls | glibc | gstreamer | haproxy | hostapd | icecast | icu |
8288
| irssi | kerberos | libarchive | libdb | libgcrypt | libjpeg | libnss |
8389
| libtiff | libvirt | lighttpd | mariadb | memcached | ncurses | nessus |
@@ -99,14 +105,14 @@ vulnerable version, it merely provides a mapping between strings, versions, and
99105
known CVEs.
100106

101107
A [list of currently available checkers](https://github.com/intel/cve-bin-tool/tree/master/cve_bin_tool/checkers)
102-
can be found in the checkers directory or using `cve-bin-tool --help` command, as can the
108+
can be found in the checkers directory or using `cve-bin-tool --help` command, as can the
103109
[instructions on how to add a new checker](cve_bin_tool/checkers/README.md).
104-
Support for new checkers can be requested via
110+
Support for new checkers can be requested via
105111
[GitHub issues](https://github.com/intel/cve-bin-tool/issues).
106112
(Please note, you will need to be logged in to add a new issue.)
107113

108114
This tool gives a list of CVE numbers. For those not familiar with the process,
109-
these can be looked up using a number of different tools, such as the
115+
these can be looked up using a number of different tools, such as the
110116
[vulnerability search on the CVE Details website](https://www.cvedetails.com/vulnerability-search.php).
111117
Each CVE field contains a short summary of the issue, a set of severity scores
112118
that are combined to make a CVSS score, a list of products known to be affected, and
@@ -172,7 +178,7 @@ supported, as is usage within cygwin on windows.
172178

173179
This tool does not scan for all possible known public vulnerabilities, it only
174180
scans for specific commonly vulnerable open source components. A complete
175-
list of currently supported library checkers can be found in [the checkers
181+
list of currently supported library checkers can be found in [the checkers
176182
directory](https://github.com/intel/cve-bin-tool/tree/master/cve_bin_tool/checkers).
177183

178184
As the name implies, this tool is intended for use with binaries. If you have
@@ -191,6 +197,18 @@ This option controls the frequency of updates for the CVE data from the National
191197

192198
This option allows one the skip a comma-separated lists of paths. This can be useful for excluding certain files and directories from the scan which will also decrease the scanning time.
193199

200+
### -h, --help
201+
202+
This option shows a help message and exits.
203+
204+
### -V, --version
205+
206+
This option shows program's version number and exits.
207+
208+
### --disable-version-check
209+
210+
This option skips checking for a new version of the program.
211+
194212
## Checkers Arguments:
195213

196214
### -s SKIPS, --skips SKIPS
@@ -205,7 +223,7 @@ This option allows one to enable a comma-separated list of checkers.
205223

206224
### directory (positional argument)
207225

208-
Specify path to directory you want to scan.
226+
Specify path to directory you want to scan.
209227

210228
### -i INPUT_FILE, --input-file INPUT_FILE
211229

@@ -224,7 +242,7 @@ You can provide either CSV or JSON file as input_file with vendor, product and v
224242
- All the characters denoted in parenthesis are aliases for that specific value. Output will be displayed in the same order as priority given to the remarks.
225243

226244
3. **comments** - You can write any comments you want to write in this field. This will be ignored in the console output but will be propagated as it is in CSV, JSON or HTML formats.
227-
4. **severity** - This field allows you to adjust severity score of specific product or CVE. This can be useful in the case where CVE affects a portion of the library that you aren't using currently but you don't want to ignore it completely. In that case, you can reduce severity for this CVE.
245+
4. **severity** - This field allows you to adjust severity score of specific product or CVE. This can be useful in the case where CVE affects a portion of the library that you aren't using currently but you don't want to ignore it completely. In that case, you can reduce severity for this CVE.
228246
5. **cve_number** - This field give you fine grained control over output of specific CVE. You can change remarks, comments and severity for specific CVE instead of whole product.
229247

230248
You can use `-i` or `--input-file` option to produce list of CVEs found in given vendor, product and version fields (Usage: `cve-bin-tool -i=test.csv`) or supplement extra triage data like remarks, comments etc. while scanning directory so that output will reflect this triage data and you can save time of re-triaging (Usage: `cve-bin-tool -i=test.csv /path/to/scan`).
@@ -315,7 +333,11 @@ Although the examples in this section show results for a single library to make
315333

316334
This option allows you to specify the filename for the report, rather than having CVE Binary Tool generate it by itself.
317335

318-
### -f {csv,json,console}, --format {csv,json,console}
336+
### --html-theme HTML_THEME
337+
338+
This option specifies the theme directory to be used in formatting the HTML report.
339+
340+
### -f {csv,json,console,html}, --format {csv,json,console,html}
319341

320342
This option allows the CVE Binary Tool to produce a report in an alternate format. This is useful if you have other tools which only take a specific format. The default is `console` which prints category wise beautiful tables of CVEs on terminal.
321343

@@ -363,11 +385,24 @@ haxx,curl,7.34.0,CVE-2014-0139,MEDIUM,Unexplored,
363385
haxx , curl , 7.34.0 , CVE-2014-0138, HIGH
364386
haxx , curl , 7.34.0 , CVE-2014-0139, CRITICAL
365387
haxx , curl , 7.34.0 , CVE-2014-0015, MEDIUM
366-
"
388+
"
367389
style="width:100%;white-space:pre;">
368390
<figcaption>formated console output</figcaption>
369391
</figure>
370392

393+
394+
4. `--format html` - creates a report in html format according to the specified HTML theme.
395+
396+
### -c CVSS, --cvss CVSS
397+
398+
This option specifies the minimum CVSS score (as integer in range 0 to 10) of the CVE to report. The default value is 0 which results in all CVEs being reported.
399+
400+
### -S {low,medium,high,critical}, --severity {low,medium,high,critical}
401+
402+
This option specifies the minimum CVE severity to report. The default value is low which results in all CVEs being reported.
403+
404+
Note that this option is overridden by `--cvss` parameter if this is also specified.
405+
371406
### Output verbosity
372407

373408
As well as the modes above, there are two other output options to decrease or increase the number of messages printed:
@@ -383,7 +418,7 @@ return code to see if any issues were found. The return value will be the numbe
383418
Below is what it returns on bash when one file is found to have CVEs:
384419

385420
```console
386-
terri@sandia:~/Code/cve-bin-tool$ cve-bin-tool -q ~/output_test_quiet/openssl
421+
terri@sandia:~/Code/cve-bin-tool$ cve-bin-tool -q ~/output_test_quiet/openssl
387422
terri@sandia:~/Code/cve-bin-tool$ echo $?
388423
1
389424
```
@@ -402,12 +437,13 @@ The logging modes provide additional fine-grained control for debug information.
402437
This option allows the CVE Binary Tool to extract compressed files into a temporary directory
403438
so the contents can be scanned. If the quiet flag is not used, the list of extracted files
404439
will be printed.
440+
405441
CVE Binary Tool by default auto-extract all compressed files inside the directory path. You can always exclude certain paths by using `-e --exclude`
406442

407443
## Feedback & Contributions
408444

409445
Bugs and feature requests can be made via [GitHub issues](https://github.com/intel/cve-bin-tool).
410-
Be aware that these issues are not private, so take care when providing output to make sure
446+
Be aware that these issues are not private, so take care when providing output to make sure
411447
you are not disclosing security issues in other products.
412448

413449
Pull requests are also welcome via git.

0 commit comments

Comments
 (0)