Patton is a set of tools for helping admins and security auditors to search for vulnerabilities in software components and computer systems.
Patton contains, at this moment, the tools needed to analyze vulnerabilities on Ubuntu, Debian and RHEL 8 or newer systems and we are currently working on increasing the targets to include Python dependencies.
Patton is an OWASP project: https://owasp.org/www-project-patton/
Searching for vulnerabilities is a really hard task. Vulnerabilities databases have they own format and they index vulnerabilities in a way that makes difficult to match with the package names you install in your systems or with the libraries your software depends on.
Patton pre-cooks a vulnerabilities database, this database is really small to ease downloading and contains only the needed data to allow the match of the vulnerable component.
Patton contains a series of small epecialized tools that are able of making the match between the vulnerability and the software package or library and offers a single interface to invoke all the tools in a consistent way.
- zstd
- Docker
wget https://raw.githubusercontent.com/BBVA/patton/develop/bin/patton
sudo install patton /usr/local/bin
$ patton --help
Usage: patton [OPTION]... [PATTERN]
Try '/usr/local/bin/patton -h|--help' for more information
-h, --help display this help text and exit
-V, --version display version information and exit
-d, --database-file path to database file
-t, --search-type type of search to execute: product|pkg_debian|pkg_ubuntu|pkg_rhel|fulltext
-s, --search-subtype for search-type:(debian|ubuntu), sets the suite
e.g.: buster, potato, fossa, xenial, precise, trusty...
-v, --pkg-version cpe version when searching by cpe
-n, --pkg-name path to database file
-w, --pkg-vendor path to database file
patton -t pkg_debian < /var/lib/dpkg/status
patton -t pkg_ubuntu < /var/lib/dpkg/status
patton -t pkg_rhel
NOTE: Have to be run on RHEL 8 or newer
wget https://github.com/BBVA/patton/releases/download/latest/patton.db.zst
patton -d patton.db.zst -t fulltext openssl
- rename scanners/debian to scanners/debian-debsecan consistently