Exploit DB CDF
The web format of this guide reflects the most current release. Guides for older iterations are available in PDF format.
Integration Details
ThreatQuotient provides the following details for this integration:
Current Integration Version | 2.0.0 |
Compatible with ThreatQ Versions | >= 4.45.0 |
Support Tier | Not Actively Supported |
Introduction
The Exploit DB CDF allows analysts to automatically ingest Exploit Reports from Exploit DB, a website that provides open-source intelligence around exploits, into ThreatQ.
The integration provides the the following feed:
- Exploit DB - ingests verified and unverified exploits from Exploit DB.
The integration ingests the following system objects:
- Indicators
- Indicator Attributes
- Reports
- Report Attributes.
The Exploit DB CDF replaces the existing ThreatQ Exploit DB Connector.
Installation
This integration can be installed in the My Integration section of your ThreatQ instance. See the Adding an Integration topic for more details.
Configuration
ThreatQuotient does not issue API keys for third-party vendors. Contact the specific vendor to obtain API keys and other integration-related credentials.
To configure the integration:
- Navigate to your integrations management page in ThreatQ.
- Select the OSINT option from the Category dropdown (optional).
If you are installing the integration for the first time, it will be located under the Disabled tab.
- Click on the integration entry to open its details page.
- Enter the following parameters under the Configuration tab:
Parameter Description Ingest Exploits As Select how to ingest Exploits into ThreatQ. Options include: - Reports (default)
- Malware
- Vulnerabilities
You have the option of selecting two or all types.
Ingest CVEs As Select how to ingest CVEs into ThreatQ. Options include: - Indicators (default)
- Vulnerabilities
You have the option of selecting two or all types.
Ingest Unverified Exploits Select whether or not to ingest unverified exploits. This option is selected by default.
- Review any additional settings, make any changes if needed, and click on Save.
- Click on the toggle switch, located above the Additional Information section, to enable it.
ThreatQ Mapping
ThreatQuotient provides the following mapping for the CDF.
Exploit DB
The Exploit DB feed automatically ingests verified and unverified exploits from Exploit DB.
You must make this request with 2 additional headers, else the request will return HTML.
- X-Requested-With: XMLHttpRequest
- User-Agent: Paw/3.1.8 (Macintosh; OS X/10.14.4) GCDHTTPRequest
GET https://www.exploit-db.com/
Sample Response:
{
"0": "tags",
"1": "code",
"2": "author:id,name",
"3": "type",
"4": "platform",
"draw": 1,
"recordsTotal": 43945,
"recordsFiltered": 43945,
"data": [
{
"id": "49767",
"description": [
"49767",
"jQuery 1.0.3 - Cross-Site Scripting (XSS)"
],
"type_id": "WebApps",
"platform_id": "Multiple",
"author_id": [
"11078",
"Central InfoSec"
],
"date_published": "2021-04-14",
"verified": 0,
"application_path": "",
"application_md5": "",
"port": 0,
"screenshot_path": "",
"screenshot_thumb_path": "",
"tags": [],
"code": [
{
"id": "160539",
"exploit_id": "49767",
"code_type": "cve",
"code": "2020-11023"
}
],
"type": {
"id": "6",
"name": "webapps",
"display": "WebApps"
},
"platform": {
"id": "24",
"platform": "Multiple"
},
"author": {
"id": "11078",
"name": "Central InfoSec"
},
"download": "<a href=\"/download/49767\" aria-label=\"Download49767\"><i class=\"mdi mdi-download mdi-18px\" style=\"color: #132f50\"></i></a>"
},
{
"id": "49766",
"description": [
"49766",
"jQuery 1.2 - Cross-Site Scripting (XSS)"
],
"type_id": "WebApps",
"platform_id": "Multiple",
"author_id": [
"11078",
"Central InfoSec"
],
"date_published": "2021-04-14",
"verified": 0,
"application_path": "",
"application_md5": "",
"port": 0,
"screenshot_path": "",
"screenshot_thumb_path": "",
"tags": [],
"code": [
{
"id": "160537",
"exploit_id": "49766",
"code_type": "cve",
"code": "2020-11022"
}
],
"type": {
"id": "6",
"name": "webapps",
"display": "WebApps"
},
"platform": {
"id": "24",
"platform": "Multiple"
},
"author": {
"id": "11078",
"name": "Central InfoSec"
},
"download": "<a href=\"/download/49766\" aria-label=\"Download49766\"><i class=\"mdi mdi-download mdi-18px\" style=\"color: #132f50\"></i></a>"
}
]
}
ThreatQuotient provides the following default mapping for this feed:
Feed Data Path | ThreatQ Entity | ThreatQ Object Type or Attribute Key | Normalization | Published Date | Examples | Notes |
---|---|---|---|---|---|---|
.tags | Tag | N/A | Limited to 50 characters | N/A | N/A | N/A |
.type.display | Attribute | Exploit Type | N/A | .date_published | WebApps | N/A |
.platform.platform | Attribute | Exploit Platform | N/A | .date_published | PHP | N/A |
.id | Attribute | Exploit DB Link | Formatted into URL | .date_published | https://exploit-db.com/exploits/{{id}} |
N/A |
.id | Attribute | Exploit DB ID | N/A | .date_published | 46572 | N/A |
.author_id[] | Attribute | Exploit Author | index = 1 is taken | .date_published | Orion Hridoy | N/A |
.verified | Attribute | Is Verified | boolean -> Yes/No | .date_published | Yes | N/A |
.code[].code | Value | CVE or Vulnerability | Prefixed with CVE- |
.date_published | CVE-2021-0001 | Skipped if .code[].code_type is not cve |
.description[] | Value | Report, Malware, or Vulnerability | index = 1 is taken | .date_published | Linux Kernel 5.4 - 'BleedingTooth' |
N/A |
.exploit_description | Description | Report, Malware, or Vulnerability | Formatted between <p> tags |
N/A | N/A | This is fetched from the supplemental feed (Get Exploit Text ) |
Exploit DB Download Supplemental
The supplemental feed will return text describing the exploit and showing examples.
GET https://www.exploit-db.com/download/{{exploit_id}}
Average Feed Run
Object counts and Feed runtime are supplied as generalities only - objects returned by a provider can differ based on credential configurations and Feed runtime may vary based on system resources and load.
Timeframe: ~4.5 Month Pull (2021-01-01 -> 2021-04-14)
Ingest Unverified Exploits: True
Metric | Result |
---|---|
Run Time | 7 minutes |
Indicators | 89 |
Indicator Attributes | 363 |
Reports | 394 |
Report Attributes | 1,997 |
Known Issues / Limitations
- The Exploit DB API does not allow time-fencing. Users will need to check the last result of each request to verify that it falls within the last run timeframe.
Change Log
- Version 2.0.0
- Initial Release of the CDF - replaces the Exploit DB Custom Connector.
- Added the option to ingest CVEs as Vulnerabilities.
- Added the option to choose what objects the exploits are ingested as.
- Removed the option to ingest the vulnerable applications (actual binaries).
PDF Guides
Document | ThreatQ Version |
---|---|
Exploit DB CDF Guide v2.0.0 | 4.45.0 or Greater |