Skip to content

Commit 3144f21

Browse files
fiixng ios to iox.. 2022
1 parent 71069bd commit 3144f21

File tree

7 files changed

+45
-45
lines changed

7 files changed

+45
-45
lines changed

CVEasy/Cisco/2022/cve202220718.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220718(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20718 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
20-
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
20+
# Extract the output of the command to check IOx configuration
21+
iox_output = commands.check_iox
2222

23-
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
23+
# Check if IOx is configured
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20718. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220719.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,30 +6,30 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220719(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20719 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application
15+
The vulnerability is due to insufficient protection in the Cisco IOx application
1616
hosting environment. Multiple vulnerabilities could allow an attacker to inject
1717
arbitrary commands into the underlying host operating system, execute arbitrary
1818
code, install applications without authentication, or conduct cross-site
1919
scripting (XSS) attacks.
2020
"""
2121
# Extract the output of the command to check IOS configuration
22-
ios_output = commands.check_ios
22+
iox_output = commands.check_iox
2323

24-
# Check if IOS is configured
25-
ios_configured = 'ios' in ios_output
24+
# Check if IOx is configured
25+
iox_configured = 'iox' in iox_output
2626

2727
# Assert that the device is not vulnerable
28-
assert not ios_configured, (
28+
assert not iox_configured, (
2929
f"Device {device.name} is vulnerable to CVE-2022-20719. "
30-
"The device has IOS application hosting configured, "
30+
"The device has IOx application hosting configured, "
3131
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3232
"or conduct XSS attacks. "
3333
"For more information, see "
34-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
34+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3535
)

CVEasy/Cisco/2022/cve202220720.py

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -6,30 +6,30 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220720(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20720 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application
15+
The vulnerability is due to insufficient protection in the Cisco IOx application
1616
hosting environment.
1717
Multiple vulnerabilities could allow an attacker to inject arbitrary commands
1818
into the underlying host operating system, execute arbitrary code, install
1919
applications without authentication, or conduct cross-site scripting (XSS) attacks.
2020
"""
2121
# Extract the output of the command to check IOS configuration
22-
ios_output = commands.check_ios
22+
iox_output = commands.check_iox
2323

24-
# Check if IOS is configured
25-
ios_configured = 'ios' in ios_output
24+
# Check if IOx is configured
25+
iox_configured = 'iox' in iox_output
2626

2727
# Assert that the device is not vulnerable
28-
assert not ios_configured, (
28+
assert not iox_configured, (
2929
f"Device {device.name} is vulnerable to CVE-2022-20720. "
30-
"The device has IOS application hosting configured, "
30+
"The device has IOx application hosting configured, "
3131
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3232
"or conduct XSS attacks. "
3333
"For more information, see "
34-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
34+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3535
)

CVEasy/Cisco/2022/cve202220723.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def rule_cve202220723(configuration, commands, device, devices):
2424
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20723. "
2929
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "

CVEasy/Cisco/2022/cve202220724.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220724(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20724 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
20-
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
20+
# Extract the output of the command to check IOx configuration
21+
iox_output = commands.check_iox
2222

23-
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
23+
# Check if IOx is configured
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20724. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220725.py

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220725(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20725 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
20-
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
20+
# Extract the output of the command to check IOx configuration
21+
iox_output = commands.check_iox
2222

23-
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
23+
# Check if IOx is configured
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20725. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220727.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ def rule_cve202220727(configuration, commands, device, devices):
2424
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20727. "
2929
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "

0 commit comments

Comments
 (0)