Documentation
¶
Overview ¶
Package cve202011978 implements a detector for CVE-2020-11978. This can be deployed by cloning https://github.com/pberba/CVE-2020-11978 and running docker-compose up in the directory.
Index ¶
- Constants
- func CheckAccessibility(ctx context.Context, airflowIP string, airflowServerPort int) bool
- func CheckForBashTask(ctx context.Context, airflowIP string, airflowServerPort int) bool
- func CheckForPause(ctx context.Context, airflowIP string, airflowServerPort int) bool
- func New() detector.Detector
- type Detector
- func (d Detector) DetectedFinding() inventory.Finding
- func (Detector) Name() string
- func (Detector) RequiredExtractors() []string
- func (Detector) Requirements() *plugin.Capabilities
- func (d Detector) Scan(ctx context.Context, scanRoot *scalibrfs.ScanRoot, ...) (inventory.Finding, error)
- func (Detector) Version() int
Constants ¶
View Source
const (
// Name of the detector.
Name = "cve/cve-2020-11978"
)
Variables ¶
This section is empty.
Functions ¶
func CheckAccessibility ¶
CheckAccessibility checks if the airflow server is accessible.
func CheckForBashTask ¶
CheckForBashTask checks if the airflow server has a bash task.
func CheckForPause ¶
CheckForPause checks if the airflow server has a paused dag.
Types ¶
type Detector ¶
type Detector struct{}
Detector is a SCALIBR Detector for CVE-2020-11978.
func (Detector) DetectedFinding ¶ added in v0.3.1
DetectedFinding returns generic vulnerability information about what is detected.
func (Detector) RequiredExtractors ¶
RequiredExtractors returns the python wheel extractor.
func (Detector) Requirements ¶
func (Detector) Requirements() *plugin.Capabilities
Requirements of the detector.
Click to show internal directories.
Click to hide internal directories.