User Guide

Synapse-NIST-NVD User Guide

Synapse-NIST-NVD adds new Storm commands to allow you to query the NIST National Vulnerability Database (NVD) API to ingest vulnerabilities.

Getting Started

Check with your Admin to enable permissions and find out if you need a personal API key.

Examples

Setting your personal API key

To set-up a personal use API key:

> nist.nvd.setup.apikey --self myapikey
Setting NVD API key for the current user.

Search for CVEs matching a keyword

> nist.nvd.cves.search log4j --yield --size 2
risk:vuln=743cf0a6ee45ca00728abb4cab1f4305
        .created = 2024/11/19 21:25:07.408
        :cve = cve-2008-7261
        :cve:desc = The Workplace (aka WP) component in IBM FileNet P8 Application Engine (P8AE) 3.5.1 before 3.5.1-010 records DEBUG messages containing user credentials in the log4j.xml file, which might allow local users to obtain sensitive information by reading this file.
        :cve:references = ['http://download2.boulder.ibm.com/sar/CMA/IMA/00yrk/0/readme-ae351-021.htm']
        :cve:url = https://nvd.nist.gov/vuln/detail/CVE-2008-7261
        :cvss:v2 = AV:L/AC:L/Au:N/C:P/I:N/A:N
        :cvss:v2_0:score = 2.1
        :cvss:v2_0:score:base = 2.1
        :cwes = ['CWE-255']
        :nist:nvd:modified = 2010/09/21 04:00:00.000
        :nist:nvd:published = 2010/09/20 22:00:02.580
        :nist:nvd:source = mitre
        :reporter = f69048e36b9473f4ce00a57961af3f55
        :reporter:name = nist
risk:vuln=68325bca749d6f8d58691aaae9752b09
        .created = 2024/11/19 21:25:08.923
        :cve = cve-2012-5616
        :cve:desc = Apache CloudStack 4.0.0-incubating and Citrix CloudPlatform (formerly Citrix CloudStack) before 3.0.6 stores sensitive information in the log4j.conf log file, which allows local users to obtain (1) the SSH private key as recorded by the createSSHKeyPair API, (2) the password of an added host as recorded by the AddHost API, or the password of an added VM as recorded by the (3) DeployVM or (4) ResetPasswordForVM API.
        :cve:references = ['http://mail-archives.apache.org/mod_mbox/incubator-cloudstack-users/201301.mbox/%[email protected]%3E', 'http://seclists.org/fulldisclosure/2013/Jan/65', 'http://support.citrix.com/article/CTX136163', 'http://www.securityfocus.com/bid/57259', 'http://www.securitytracker.com/id?1027978']
        :cve:url = https://nvd.nist.gov/vuln/detail/CVE-2012-5616
        :cvss:v2 = AV:L/AC:M/Au:S/C:P/I:N/A:N
        :cvss:v2_0:score = 1.5
        :cvss:v2_0:score:base = 1.5
        :cwes = ['CWE-255']
        :nist:nvd:modified = 2013/04/02 03:21:24.717
        :nist:nvd:published = 2013/01/22 23:55:02.887
        :nist:nvd:source = red hat, inc.
        :reporter = f69048e36b9473f4ce00a57961af3f55
        :reporter:name = nist

Ingest a feed of CVEs

Note that normally this command should be allowed to run to completion. Typically this command would also be run in a cron job to keep up with updates.

> nist.nvd.cves.feed --yield | limit 2
risk:vuln=610383858ae291b8f4929ca80655d90e
        .created = 2024/11/19 21:25:10.403
        :cve = cve-1999-0095
        :cve:desc = The debug command in Sendmail is enabled, allowing attackers to execute commands as root.
        :cve:references = ['http://seclists.org/fulldisclosure/2019/Jun/16', 'http://www.openwall.com/lists/oss-security/2019/06/05/4', 'http://www.openwall.com/lists/oss-security/2019/06/06/1', 'http://www.securityfocus.com/bid/1']
        :cve:url = https://nvd.nist.gov/vuln/detail/CVE-1999-0095
        :cvss:v2 = AV:N/AC:L/Au:N/C:C/I:C/A:C
        :cvss:v2_0:score = 10.0
        :cvss:v2_0:score:base = 10.0
        :nist:nvd:modified = 2019/06/11 20:29:00.263
        :nist:nvd:published = 1988/10/01 04:00:00.000
        :nist:nvd:source = mitre
        :reporter = f69048e36b9473f4ce00a57961af3f55
        :reporter:name = nist
risk:vuln=6140bee75ea912b0893e1fcea92a0890
        .created = 2024/11/19 21:25:10.625
        :cve = cve-1999-0082
        :cve:desc = CWD ~root command in ftpd allows root access.
        :cve:references = ['http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html']
        :cve:url = https://nvd.nist.gov/vuln/detail/CVE-1999-0082
        :cvss:v2 = AV:N/AC:L/Au:N/C:C/I:C/A:C
        :cvss:v2_0:score = 10.0
        :cvss:v2_0:score:base = 10.0
        :nist:nvd:modified = 2008/09/09 12:33:40.853
        :nist:nvd:published = 1988/11/11 05:00:00.000
        :nist:nvd:source = mitre
        :reporter = f69048e36b9473f4ce00a57961af3f55
        :reporter:name = nist

Use of meta:source nodes

Synapse-NIST-NVD uses a meta:source node and -(seen)> light weight edges to track nodes observed from the NVD API.

> meta:source=b3df0ff0c8bf7d8e89f3f2438732047c
meta:source=b3df0ff0c8bf7d8e89f3f2438732047c
        .created = 2024/11/19 21:25:07.121
        :name = nist nvd api

Storm can be used to filter nodes to include/exclude nodes which have been observed by Synapse-NIST-NVD. The following example shows how to filter the results of a query to include only results observed by Synapse-NIST-NVD:

> risk:vuln:cwes*[=CWE-255] -> it:sec:cve +{ <(seen)- meta:source=b3df0ff0c8bf7d8e89f3f2438732047c }
it:sec:cve=cve-2008-7261
        .created = 2024/11/19 21:25:07.409
it:sec:cve=cve-2012-5616
        .created = 2024/11/19 21:25:08.924