-
Notifications
You must be signed in to change notification settings - Fork 644
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix: isiplocalnet() nasl function. #1842
base: main
Are you sure you want to change the base?
Conversation
Jira: SC-1232 Close #1829 The function just check the first address in the network interface. This produces that if the target host is in the same network as a second address in a network interface returns a false negative. E.g.: given the following config, if the target host has 192.168.10.100, the target was not recognize as in the same local network, because the local ip in the 192.168.10.0/24 is the second defined in the interface. ``` 4: wlp6s0: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP group default qlen 1000 link/ether cc:5e:f8:68:06:bd brd ff:ff:ff:ff:ff:ff inet 192.168.1.6/24 brd 192.168.1.255 scope global dynamic noprefixroute wlp6s0 valid_lft 65706sec preferred_lft 65706sec inet 192.168.10.1/24 scope global wlp6s0 valid_lft forever preferred_lft forever inet6 fe80::ec78:2c18:a29f:ef3a/64 scope link noprefixroute valid_lft forever preferred_lft forever ``` With this patch, all addresses in all interfaces are checked.
Dependency Review✅ No vulnerabilities or license issues or OpenSSF Scorecard issues found.Snapshot WarningsEnsure that dependencies are being submitted on PR branches and consider enabling retry-on-snapshot-warnings. See the documentation for more information and troubleshooting advice. OpenSSF Scorecard
Scanned Files |
🔍 Vulnerabilities of
|
digest | sha256:7399e2ca59ff4da5ed659e6344214dcfeaf0c0f2a583753b954bddf28a660141 |
vulnerabilities | |
size | 121 MB |
packages | 261 |
📦 Base Image debian:stable-20250203-slim
also known as |
|
digest | sha256:c8cc60b4f108a3ea5916800b4574c192aad906a1f37e0f590847e3d6f81076aa |
vulnerabilities |
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
Description
Description
Description
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
Description
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
| ||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Description
|
What:
Fix: isiplocalnet() nasl function.
Jira: SC-1232
Close #1829
Why:
The function just check the first address in the network interface. This produces that if the target host is in the same network as a second address in a network interface returns a false negative.
E.g.: given the following config, if the target host has 192.168.10.100, the target was not recognize as in the same local network, because the local ip in the 192.168.10.0/24 is the second defined in the interface.
With this patch, all addresses in all interfaces are checked.
How:
See #1829 or set an interface with similar settings as above. Later run the following script again a target which belongs or not to the local network
is_local_net.nasl
sudo openvas-nasl -X -d -D -i $PLUGINSPATH is_local_net.nasl -t 192.168.1.1
Checklist: