$75 GRAYBYTE WORDPRESS FILE MANAGER $82

SERVER : vnpttt-amd7f72-h1.vietnix.vn #1 SMP Fri May 24 12:42:50 UTC 2024
SERVER IP : 103.200.23.149 | ADMIN IP 216.73.216.22
OPTIONS : CRL = ON | WGT = ON | SDO = OFF | PKEX = OFF
DEACTIVATED : NONE

/opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/api/

HOME
Current File : /opt/imunify360/venv/lib/python3.11/site-packages/imav/malwarelib/api//vulnerability.py
"""
This program is free software: you can redistribute it and/or modify it under
the terms of the GNU General Public License as published by
the Free Software Foundation, either version 3 of the License,
or (at your option) any later version.


This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. 
See the GNU General Public License for more details.


You should have received a copy of the GNU General Public License
 along with this program.  If not, see <https://www.gnu.org/licenses/>.

Copyright © 2019 Cloud Linux Software Inc.

This software is also available under ImunifyAV commercial license,
see <https://www.imunify360.com/legal/eula>
"""
import logging
from collections import defaultdict
from typing import Iterable
from urllib.parse import urljoin
from urllib.request import Request

from defence360agent.api.server import API, APIError
from defence360agent.internals.iaid import (
    IAIDTokenError,
    IndependentAgentIDAPI,
)

logger = logging.getLogger(__name__)


class VulnerabilityAPI(API):
    URL = urljoin(API._BASE_URL, "/api/patch/vulnerabilities")
    _STUB_VULNERABILITY_INFO = {
        "cveId": "",
        "app": "",
        "type": "",
        "name": "",
        "severity": "",
    }

    @classmethod
    async def get_details(cls, ids: Iterable) -> dict:
        """
        Get vulnerabilities details for specific *ids*.
        More details in DEF-32152
        """
        info = defaultdict(cls._STUB_VULNERABILITY_INFO.copy)
        if not ids:
            return info

        try:
            token = await IndependentAgentIDAPI.get_token()
        except IAIDTokenError as exc:
            logger.error(
                "Can't get iaid token: %s. "
                "Return default vulnerabilities details.",
                exc,
            )
            return info

        url = cls.URL + f"?ids={','.join(ids)}"
        request = Request(
            url,
            headers={"X-Auth": token, "Content-Type": "application/json"},
        )
        try:
            result = await cls.async_request(request)
        except APIError as exc:
            logger.error(
                "Failed to get vulnerabilities details: %s. "
                "Return default vulnerabilities details.",
                exc,
            )
            return info

        info.update(normalize_vulnerabilities(result["vulnerabilities"]))
        return info


def normalize_vulnerabilities(
    vulnerabilities: dict[str, dict[str, str]],
) -> dict[str, dict[str, str]]:
    """
    Normalize vulnerabilities data.
    """
    return {
        _id: normalize_vulnerability(vulnerability)
        for _id, vulnerability in vulnerabilities.items()
    }


def normalize_vulnerability(vulnerability: dict[str, str]) -> dict[str, str]:
    """
    Normalize vulnerability data.
    """
    return {
        "cveId": vulnerability.get("cveId", ""),
        "app": vulnerability.get("app", ""),
        "type": vulnerability.get("type", ""),
        "name": vulnerability.get("name", ""),
        "severity": vulnerability.get("severity", "").upper(),
    }

Current_dir [ NOT WRITEABLE ] Document_root [ WRITEABLE ]


[ Back ]
NAME
SIZE
LAST TOUCH
USER
CAN-I?
FUNCTIONS
..
--
16 Dec 2025 9.29 PM
root / root
0755
__pycache__
--
16 Dec 2025 9.29 PM
root / root
0755
__init__.py
0 KB
24 Nov 2025 5.43 PM
root / root
0644
imunify_patch_subscription.py
5.383 KB
24 Nov 2025 5.43 PM
root / root
0644
vulnerability.py
3.146 KB
24 Nov 2025 5.43 PM
root / root
0644

GRAYBYTE WORDPRESS FILE MANAGER @ 2026 CONTACT ME
Static GIF