Spaces:
Runtime error
Runtime error
File size: 1,917 Bytes
56b6519 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 |
module.exports = function (app) {
const Response = require('../lib/httpResponse.js');
const acl = require('../lib/auth').acl;
const cweConfig = require('../config/config-cwe.json')['cwe-container'];
const errorClassify = new Error('Error classifying vulnerability');
const networkError = new Error('Network response was not ok');
const timeoutError = new Error('Request timed out');
const TIMEOUT_MS = 47000; // 47 segundos (temporal)
// Get CVSS string from description
app.post(
'/api/cvss',
acl.hasPermission('classify_cvss:all'),
async function (req, res) {
if (
!req.body.vuln ||
typeof req.body.vuln !== 'string' ||
req.body.vuln.trim() === ''
) {
Response.BadParameters(res, 'Required parameters: description');
return;
}
const vuln = {
vuln: req.body.vuln.trim(),
};
const controller = new AbortController();
const timeout = setTimeout(() => controller.abort(), TIMEOUT_MS);
try {
//TODO: Change workaround to a proper solution for self-signed certificates
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '0';
const response = await fetch(
`https://${cweConfig.host}:${cweConfig.port}/cvss`,
{
method: 'POST',
headers: { 'Content-Type': 'application/json' },
body: JSON.stringify(vuln),
signal: controller.signal,
},
);
if (!response.ok) {
throw networkError;
}
const data = await response.json();
res.json(data);
} catch (error) {
console.error(error);
error.name === 'AbortError'
? Response.Internal(res, timeoutError)
: Response.Internal(res, errorClassify);
} finally {
clearTimeout(timeout);
}
process.env.NODE_TLS_REJECT_UNAUTHORIZED = '1';
},
);
};
|