Skip to content

Commit

Permalink
update vanta_tests.yaml
Browse files Browse the repository at this point in the history
  • Loading branch information
akaila-crest committed Nov 15, 2024
1 parent 3bea91a commit 9fc7cd4
Show file tree
Hide file tree
Showing 2 changed files with 169 additions and 6 deletions.
173 changes: 168 additions & 5 deletions vanta/assets/logs/vanta_tests.yaml
Original file line number Diff line number Diff line change
@@ -1,6 +1,169 @@
id: vanta
id: "vanta"
tests:
- sample: '{ "vulnerability_info": { "id": "671238azxf205f2660bfa438", "name": "CVE-2019-2699", "description": "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.", "integrationId": "microsoft_365_defender", "packageIdentifier": "jre:8.0.2020.8", "vulnerabilityType": "COMMON", "targetId": "67123809af3911111135aa26", "firstDetectedDate": "2024-10-18T10:27:45.642Z", "sourceDetectedDate": null, "lastDetectedDate": null, "severity": "CRITICAL", "cvssSeverityScore": 9, "scannerScore": null, "isFixable": true, "remediateByDate": "2024-10-22T08:14:27.181Z", "relatedVulns": [], "relatedUrls": [], "externalURL": "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", "scanSource": "Not provided", "deactivateMetadata": { "deactivatedBy": "671220f0d70mbve18c0ebca8", "deactivatedOnDate": "2024-10-23T10:26:42.880Z", "deactivationReason": "test", "deactivatedUntilDate": null, "isVulnDeactivatedIndefinitely": true } }, "asset_info": { "id": "67123809af3911111135aa26", "name": "clw238-test: Windows11", "assetType": "WORKSTATION", "hasBeenScanned": true } }'
result: null
- sample: '{ "vulnerability_info": { "id": "671238plof205f2660bf7f87", "name": "CVE-2023-42950", "description": "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.", "integrationId": "microsoft_365_defender", "packageIdentifier": "jre:8.0.2020.8", "vulnerabilityType": "COMMON", "targetId": "67123809af3911111135aa26", "firstDetectedDate": "2024-10-18T10:27:44.738Z", "sourceDetectedDate": null, "lastDetectedDate": null, "severity": "HIGH", "cvssSeverityScore": 8.8, "scannerScore": null, "isFixable": true, "remediateByDate": "2024-10-22T08:20:08.076Z", "relatedVulns": [], "relatedUrls": [], "externalURL": "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities", "scanSource": "Not provided", "deactivateMetadata": null }, "asset_info": { "id": "67123809af3911111135aa26", "name": "clw238-test: Windows11", "assetType": "WORKSTATION", "hasBeenScanned": true } }'
result: null
-
sample: |-
{
"asset_info" : {
"hasBeenScanned" : true,
"name" : "clw238-test: Windows11",
"id" : "67123809af3911111135aa26",
"assetType" : "WORKSTATION"
},
"vulnerability_info" : {
"severity" : "CRITICAL",
"externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities",
"targetId" : "67123809af3911111135aa26",
"isFixable" : true,
"remediateByDate" : "2024-10-22T08:14:27.181Z",
"description" : "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.",
"integrationId" : "microsoft_365_defender",
"firstDetectedDate" : "2024-10-18T10:27:45.642Z",
"scanSource" : "Not provided",
"cvssSeverityScore" : 9,
"deactivateMetadata" : {
"deactivationReason" : "test",
"deactivatedOnDate" : "2024-10-23T10:26:42.880Z",
"isVulnDeactivatedIndefinitely" : true,
"deactivatedBy" : "671220f0d70mbve18c0ebca8"
},
"name" : "CVE-2019-2699",
"packageIdentifier" : "jre:8.0.2020.8",
"id" : "671238azxf205f2660bfa438",
"vulnerabilityType" : "COMMON"
}
}
result:
custom:
asset_info:
assetType: "WORKSTATION"
hasBeenScanned: true
id: "67123809af3911111135aa26"
name: "clw238-test: Windows11"
vulnerability_info:
cvssSeverityScore: 9
deactivateMetadata:
deactivatedBy: "671220f0d70mbve18c0ebca8"
deactivatedOnDate: "2024-10-23T10:26:42.880Z"
deactivationReason: "test"
isVulnDeactivatedIndefinitely: true
description: "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system."
externalURL: "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities"
firstDetectedDate: "2024-10-18T10:27:45.642Z"
id: "671238azxf205f2660bfa438"
integrationId: "microsoft_365_defender"
isFixable: true
name: "CVE-2019-2699"
packageIdentifier: "jre:8.0.2020.8"
remediateByDate: "2024-10-22T08:14:27.181Z"
scanSource: "Not provided"
severity: "CRITICAL"
targetId: "67123809af3911111135aa26"
vulnerabilityType: "COMMON"
message: |-
{
"asset_info" : {
"hasBeenScanned" : true,
"name" : "clw238-test: Windows11",
"id" : "67123809af3911111135aa26",
"assetType" : "WORKSTATION"
},
"vulnerability_info" : {
"severity" : "CRITICAL",
"externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities",
"targetId" : "67123809af3911111135aa26",
"isFixable" : true,
"remediateByDate" : "2024-10-22T08:14:27.181Z",
"description" : "If this vulnerability is exploited, it can lead to the takeover of Java SE, compromising the confidentiality, integrity, and availability of the system. Attackers can potentially gain unauthorized access and control over the affected system.",
"integrationId" : "microsoft_365_defender",
"firstDetectedDate" : "2024-10-18T10:27:45.642Z",
"scanSource" : "Not provided",
"cvssSeverityScore" : 9,
"deactivateMetadata" : {
"deactivationReason" : "test",
"deactivatedOnDate" : "2024-10-23T10:26:42.880Z",
"isVulnDeactivatedIndefinitely" : true,
"deactivatedBy" : "671220f0d70mbve18c0ebca8"
},
"name" : "CVE-2019-2699",
"packageIdentifier" : "jre:8.0.2020.8",
"id" : "671238azxf205f2660bfa438",
"vulnerabilityType" : "COMMON"
}
}
tags:
- "source:LOGS_SOURCE"
-
sample: |-
{
"asset_info" : {
"hasBeenScanned" : true,
"name" : "clw238-test: Windows11",
"id" : "67123809af3911111135aa26",
"assetType" : "WORKSTATION"
},
"vulnerability_info" : {
"severity" : "HIGH",
"externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities",
"targetId" : "67123809af3911111135aa26",
"isFixable" : true,
"remediateByDate" : "2024-10-22T08:20:08.076Z",
"description" : "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.",
"integrationId" : "microsoft_365_defender",
"firstDetectedDate" : "2024-10-18T10:27:44.738Z",
"scanSource" : "Not provided",
"cvssSeverityScore" : 8.8,
"name" : "CVE-2023-42950",
"packageIdentifier" : "jre:8.0.2020.8",
"id" : "671238plof205f2660bf7f87",
"vulnerabilityType" : "COMMON"
}
}
result:
custom:
asset_info:
assetType: "WORKSTATION"
hasBeenScanned: true
id: "67123809af3911111135aa26"
name: "clw238-test: Windows11"
vulnerability_info:
cvssSeverityScore: 8.8
description: "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems."
externalURL: "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities"
firstDetectedDate: "2024-10-18T10:27:44.738Z"
id: "671238plof205f2660bf7f87"
integrationId: "microsoft_365_defender"
isFixable: true
name: "CVE-2023-42950"
packageIdentifier: "jre:8.0.2020.8"
remediateByDate: "2024-10-22T08:20:08.076Z"
scanSource: "Not provided"
severity: "HIGH"
targetId: "67123809af3911111135aa26"
vulnerabilityType: "COMMON"
message: |-
{
"asset_info" : {
"hasBeenScanned" : true,
"name" : "clw238-test: Windows11",
"id" : "67123809af3911111135aa26",
"assetType" : "WORKSTATION"
},
"vulnerability_info" : {
"severity" : "HIGH",
"externalURL" : "https://security.microsoft.com/machines/v2/ababamnbfresd23aasdf/vulnerabilities",
"targetId" : "67123809af3911111135aa26",
"isFixable" : true,
"remediateByDate" : "2024-10-22T08:20:08.076Z",
"description" : "If these vulnerabilities are exploited, remote attackers could execute arbitrary code on the affected systems. This could lead to various consequences, including unauthorized access, data theft, system compromise, and potential takeover of the affected systems.",
"integrationId" : "microsoft_365_defender",
"firstDetectedDate" : "2024-10-18T10:27:44.738Z",
"scanSource" : "Not provided",
"cvssSeverityScore" : 8.8,
"name" : "CVE-2023-42950",
"packageIdentifier" : "jre:8.0.2020.8",
"id" : "671238plof205f2660bf7f87",
"vulnerabilityType" : "COMMON"
}
}
tags:
- "source:LOGS_SOURCE"
2 changes: 1 addition & 1 deletion vanta/metadata.csv
Original file line number Diff line number Diff line change
Expand Up @@ -4,5 +4,5 @@ vanta.frameworks.controls_total,gauge,,,,Total number of controls in the framewo
vanta.frameworks.count,gauge,,,,Total number of frameworks,0,vanta,Total Frameworks,,
vanta.frameworks.documents_passing,gauge,,,,Number of passing documents in the framework,1,vanta,Passing Documents,,
vanta.frameworks.documents_total,gauge,,,,Total number of documents in the framework,0,vanta,Total Documents,,
vanta.frameworks.tests_passing,gauge,,,,Number of passing tests in the framework,1,vanta,Passing Tests,
vanta.frameworks.tests_passing,gauge,,,,Number of passing tests in the framework,1,vanta,Passing Tests,,
vanta.frameworks.tests_total,gauge,,,,Total number of tests in the framework,0,vanta,Total Tests,,

0 comments on commit 9fc7cd4

Please sign in to comment.