/ThreatTracer

ThreatTracer - A python Script to identify CVE by name & version by @FR13ND0x7F

Primary LanguagePythonMIT LicenseMIT

ThreatTracer - CVE Checker, Public Exploit Enumerater and ZeroDay finder against any product

Screenshot 2024-02-09 at 7 05 14 PM

This script fetches CVE details for a given component and version by identifying relevant CPEs, and searches for public exploits for relevant CVEs.

Usage

  1. Make sure you have Python3 installed on your system.
  2. Install required libraries using pip3 install -r requirements.txt.
  3. Run the script using python3 threattracer.py.

Script Description

This script uses the National Vulnerability Database (NVD) API to fetch Common Vulnerabilities and Exposures (CVE) details for a specified component and version.

Features

  1. CVE Finder Script: This script is designed to identify Common Vulnerabilities and Exposures (CVEs) based on the name and version of a component.
  2. User-friendly Interaction: The script interacts with users to input the name and version of a software component, making it easy to search for CVEs.
  3. Web Scraping: The script utilizes web scraping techniques to fetch Common Platform Enumeration (CPE) information from NIST's National Vulnerability Database (NVD).
  4. Colorful Output: Output messages are color-coded using the termcolor library to enhance readability and provide a visually appealing experience.
  5. CPE Search: The script searches for all matching CPEs for the specified component and version, displaying the URLs used for CPE retrieval.
  6. CVE Querying: It then queries the NVD API using the CPE information to fetch CVE details for each CPE found.
  7. Detailed Information: The script displays detailed information about each CVE, including the CVE ID, description, weaknesses, and link to the NVD page.
  8. Robust Error Handling: The script handles cases where CPEs are not found, providing appropriate error messages to users.
  9. Easy-to-Use: The user interface is designed to be straightforward, allowing users to quickly search for CVEs associated with a specific software version.
  10. CPEs Enumeration: When multiple CPEs are found, the script lists all the discovered CPEs before proceeding to query CVE details for each one.
  11. Reusability: The modular structure of the script makes it reusable and easy to integrate into other projects or scripts.
  12. Interactive Prompt: The script employs an interactive prompt to guide users through the process of entering the software component and version.
  13. Automated Querying: The script automates the process of querying and fetching CVE details, saving users time and effort.
  14. API Integration: It leverages the NVD API to retrieve and present accurate CVE information for the specified software version.
  15. Store results in text: Store the results in a nice formatted way [In first version, not supported any more]
  16. Add every CVE public exploit via pyExploitDb feature by @meppohak5
  17. The v2.1 release of the code optimizes the previous version by incorporating asynchronous HTTP requests using the aiohttp library, faster response time.
  18. https://poc-in-github.motikan2010.net -> Github POC lookup support.
  19. Reverse search for public exploits/ 0-Days over packetstormsecurity
  20. Search for all possible exploits/ 0Days.

Prerequisites

  • Python (3.6+ recommended)
  • requests library (pip3 install requests)
  • termcolor library (pip3 install termcolor)
  • pyExploitDb library (pip3 install pyExploitDb==1.0.0)
  • aiohttp library (pip3 install aiohttp)

Execution

  1. Run the script.
  2. Enter the component (e.g., jquery).
  3. Enter the version (e.g., 1.0.0).

The script will display relevant CVE information, if available.

Script Example

image

image

Sample Run

demo

Public Exploit

ThreatTracer_Exploit_Identifier_POC.Demo.mp4

Packet Storm security lookup

image
Sometimes the vulnerability doesn't have CVE associated yet and it is possible that a public exploit is available.

Github Exploit/ POC reverse lookup

image

Fetch all possible exploit/ 0-Days out there

image

POC

Vimeo

Contact

Shoot my DM : @FR13ND0x7F

Special Thanks

@FR13ND0x7F @0xCaretaker @meppohak5 Contribute to be mentioned here.

Note

Feel free to enhance, modify, or contribute to this script to suit your needs and explore more security-related projects!

Want to support my work?

Give me a Star in the repository or follow me @FR13ND0x7F , thats enough for me :P