lem

Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits


Keywords
cve, exploit, linux
License
GPL-3.0
Install
pip install lem==0.3.2

Documentation

LEM

Welcome to the Linux Exploit Mapper. The purpose of the lem tool is to assist with assessments known exploits on a Linux host. Initially the STRIDE threat scoring model will be used though this tool is designed to support additional models.

Requirements

There are two components necessary to use all the features of lem.

  1. The lem repository: https://github.com/redteam-project/lem
  2. The curation information stored in the exploit-curation repository: https://github.com/redteam-project/exploit-curation

The current version of lem requires that the curation repository be cloned separately. The rationale is that because exploit POC's are now included with the curation data, the act of downloading the exploits to a host must be due to a conscious and deliberate act by the user. For more information as to what information is stored in the curation repo, please see the exploit-curation README.md.

Getting Started

Obtain the Curation Data

We recommend cloning the data via git.

git clone https://github.com/redteam-project/exploit-curation.git

You'll need to note the location. ;-)

Install the LEM tool

There are a couple ways to accomplish this. First is to clone via git. The second is to insall bia Pypi. We recommend that latter as lem has some dependencies that will automatically be installed via pip. Furthermore, we recommend the use of Python Virtualenv. This will ensure that lem is installed in an isolated Python environment.

Clone the Repository

git clone https://github.com/redteam-project/lem

Pypi

pip install lem

Virtualenv

sudo easy_install virtualenv
virtualenv lem
cd lem
source bin/activate
pip install lem

NOTE This is a known issue in Python 2.6 where the version of wheel causes some conflicts. This can be resolved with:

pip install wheel==0.29.0

General Usage

Executing lem with the --help argument will provide some basic guidance.

(lem) [admin@localhost lem]$ lem --help
usage: lem [-h] [--notlsverify] {host,cve,score,exploit} ...

Cross Reference CVE's against a Exploit-DB entries for Enterprise Linux.

positional arguments:
  {host,cve,score,exploit}

optional arguments:
  -h, --help            show this help message and exit
  --notlsverify

Assessing a Host

The first action you probably want to perform is an assessment. This is acheived with the host subcommand. The only required argument here is the location of the curation data. For example:

(lem) [admin@localhost lem]$ lem host assess --curation /home/admin/exploit-curation

By default, this will result in a comma separated value list of exploits based on the CVE's applicable to the host. For example:

exploit-database,40003,CVE-2016-0728,cpe:/o:redhat:enterprise_linux:7.0:ga:server,stride,000000
exploit-database,1602

The values are as follows:

  1. Source of the exploit
  2. Source specific identifier
  3. Applicable CVE (only listed if exploit hsa been scored)
  4. CPE against which the exploit was tested (only listed if exploit hsa been scored)
  5. Score name (only listed if exploit hsa been scored)
  6. Score value (only listed if exploit hsa been scored)

Filtering Assessment Results

It is possible to filter the results of lem host assess by certain values. For example, perhaps we want to only list results where the efficacy of a privilage escallation exploit is very high. The following would help us achieve this:

(lem) [admin@localhost lem]$ lem host assess --curation /mnt/hgfs/exploit-curation/ --kind stride --score 00000[8,9]

Testing an Exploit

The next major step is to test an exploit on a host. For this, we use the exploit subcommand.

Copy the Exploit to a Location on the Host

The lem exploit copy command will copy an exploit to the user's home directory by default:

lem exploit copy --source exploit-database --id 37706 --curation /mnt/hgfs/exploit-curation/

From here, you can examine the exploit file and manually stage it. If the staging information is configured, the --stage will take the necessary actions to prepare the exploit for execution.

Score the Exploit

While not required, you may wish to score the exploit.

(lem) [admin@localhost lem]$ lem exploit score --id 37706 --source exploit-database --kind stride --value 000009 --curation /mnt/hgfs/exploit-curation/

Patching a Host

In testing an exploit, it may be useful to test the exploit against a host that has been patched. The lem tool assists with this, though this must be executed with escallated privileges. We return to the lem host command/sub-command and use the patch sub-sub-command:

(lem) [root@localhost lem]# lem host patch exploits --curation /mnt/hgfs/exploit-curation/ --source exploit-database --ids 37706