Skip to content

examin/C.A.J.S

Repository files navigation

Security Vulnerability Tracking Tool

A tool that can scan and parse the upstream security advisories of Apache Tomcat and Apache HTTP Server along with their dependencies(example: OpenSSL, APR, libxml2, curl, mod_security). The tool should trace down any new public CVE on every JWS and JBCS related upstream project.

Requirements

  • Python 3.4+
  • Works on Linux, Windows, Mac OSX, BS

Note: Before starting the server, you need to specify its settings in the 'config.ini' file and 'contacts.txt'

The quick way to running Steps::

  1. Configure "config.ini" file (path : C.A.J.S/Notify/)
  •  Add your Gmail email-id
    
  •  Add your Gmail password
    
  1. Configure "contacts.txt" file (path : C.A.J.S/Notify/)
  •  Add some names and their email-ids to end notification to.
    
  1. Run following commands
pip install -r requirements.txt
python main.py

<TR/DR>

Tutorial: Preparing your Environment

You’ll need to have Python 3 available. Instructions on how to set this up are on our Environment setup guide.

  1. Setup a folder to store everything:
mkdir cve-tool
cd cve-tool
  1. Get a copy of the C.A.J.S code by running a git clone:
git clone https://github.com/examin/C.A.J.S
  1. We’ll need to create a virtual environment, and install our tool into it.
  • For Linux, MacOS:
 python3 -m venv venv
 . venv/bin/activate
 cd cve-tool
  • For Windows:
py -3 -m venv venv
venv\Scripts\activate
cd cve-tool
  • For Windows (with only conda installed):
    pip install virtualenvwrapper-win
    mkvirtualenv venv
    workon venv
    cd cve-tool

You now have a working Batavia environment!

  1. In addition, you need to install some pacakges;

Run this command:

pip install -r requirements.txt
  1. Configure "config.ini" file (path : C.A.J.S/Notify/)
  •  Add your Gmail email-id
    
  •  Add your Gmail password
    
  1. Configure "contacts.txt" file (path : C.A.J.S/Notify/)
  •  Add some names and their email-ids to send notification to.
    
  1. Run following commands
    python3 main.py

It’s alive!

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published