Skip to content

Commit 71069bd

Browse files
fiixng ios to iox.. typo
1 parent 93fe368 commit 71069bd

File tree

5 files changed

+33
-33
lines changed

5 files changed

+33
-33
lines changed

CVEasy/Cisco/2022/cve202220677.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220677(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20677 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
An attacker could exploit this vulnerability to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
2020
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
21+
iox_output = commands.check_iox
2222

2323
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20677. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220722.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220722(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20722 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
2020
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
21+
iox_output = commands.check_iox
2222

2323
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20722. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220723.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220723(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20723 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
2020
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
21+
iox_output = commands.check_iox
2222

2323
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
2727
assert not ios_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20723. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220726.py

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220726(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20726 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
2020
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
21+
iox_output = commands.check_iox
2222

2323
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
27-
assert not ios_configured, (
27+
assert not iox_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20726. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

CVEasy/Cisco/2022/cve202220727.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -6,29 +6,29 @@
66
platform=['cisco_ios'],
77
commands=dict(
88
show_version='show version',
9-
check_ios='show running-config | include ios'
9+
check_iox='show running-config | include iox'
1010
),
1111
)
1212
def rule_cve202220727(configuration, commands, device, devices):
1313
"""
1414
This rule checks for the CVE-2022-20727 vulnerability in Cisco IOS Software.
15-
The vulnerability is due to insufficient protection in the Cisco IOS application hosting environment.
15+
The vulnerability is due to insufficient protection in the Cisco IOx application hosting environment.
1616
Multiple vulnerabilities could allow an attacker to inject arbitrary commands into the underlying host
1717
operating system, execute arbitrary code, install applications without authentication, or conduct
1818
cross-site scripting (XSS) attacks.
1919
"""
2020
# Extract the output of the command to check IOS configuration
21-
ios_output = commands.check_ios
21+
iox_output = commands.check_iox
2222

2323
# Check if IOS is configured
24-
ios_configured = 'ios' in ios_output
24+
iox_configured = 'iox' in iox_output
2525

2626
# Assert that the device is not vulnerable
2727
assert not ios_configured, (
2828
f"Device {device.name} is vulnerable to CVE-2022-20727. "
29-
"The device has IOS application hosting configured, "
29+
"The device has IOx application hosting configured, "
3030
"which could allow an attacker to execute arbitrary commands, install unauthorized applications, "
3131
"or conduct XSS attacks. "
3232
"For more information, see "
33-
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-yuXQ6hFj"
33+
"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-yuXQ6hFj"
3434
)

0 commit comments

Comments
 (0)