Release v1.0.1
This commit is contained in:
1
.gitignore
vendored
1
.gitignore
vendored
@@ -19,3 +19,4 @@ index.html
|
|||||||
data.json
|
data.json
|
||||||
index.json
|
index.json
|
||||||
*.xlsx
|
*.xlsx
|
||||||
|
*.bak
|
||||||
20
README.md
20
README.md
@@ -1,2 +1,18 @@
|
|||||||
# VulnDataAnalyzer
|
## 软件介绍
|
||||||
VulnDataAnalyzer是一款基于新版绿盟漏扫系统(v6.0+)的漏扫结果数据分析工具,实现更多维度分析漏洞情况,有助于高效化扩展其它方面的报告
|
VulnDataAnalyzer是一款基于绿盟漏扫系统漏扫结果的数据分析工具,实现更多维度数据提取与分析漏洞情况,有助于高效化扩展其它方面的报告
|
||||||
|
|
||||||
|
## 运行&开发环境
|
||||||
|
 
|
||||||
|
|
||||||
|
## 功能支持清单
|
||||||
|
|功能 | 支持旧版 | 支持新版(v6.0+) |
|
||||||
|
| :------------: | :------------: | :------------: |
|
||||||
|
|漏洞类型分类 | :black_square_button: | :white_check_mark: |
|
||||||
|
| 明细表格IP提取 | :white_check_mark: | :white_check_mark: |
|
||||||
|
| 漏扫明细提取toExcel | :white_check_mark: | :white_check_mark: |
|
||||||
|
|
||||||
|
## 更新日志
|
||||||
|
```
|
||||||
|
2025-03-17
|
||||||
|
正式发布v1.0.1
|
||||||
|
```
|
||||||
680
gui.py
680
gui.py
@@ -7,11 +7,18 @@ import pandas as pd
|
|||||||
from keyword_manager import KeywordManager
|
from keyword_manager import KeywordManager
|
||||||
from keyword_dialog import KeywordDialog
|
from keyword_dialog import KeywordDialog
|
||||||
from tkinterdnd2 import TkinterDnD, DND_FILES
|
from tkinterdnd2 import TkinterDnD, DND_FILES
|
||||||
|
import os
|
||||||
|
import datetime
|
||||||
|
from bs4 import BeautifulSoup
|
||||||
|
from openpyxl import Workbook
|
||||||
|
from openpyxl.styles import Font, PatternFill, Border, Side, Alignment
|
||||||
|
from openpyxl.utils import get_column_letter
|
||||||
|
import time
|
||||||
|
|
||||||
class JsonExtractorGUI:
|
class JsonExtractorGUI:
|
||||||
def __init__(self, root):
|
def __init__(self, root):
|
||||||
self.root = root
|
self.root = root
|
||||||
self.root.title("漏扫数据分析工具 - By Felix")
|
self.root.title("漏扫数据分析工具 v1.0.1 - By Felix")
|
||||||
self.root.geometry("800x600")
|
self.root.geometry("800x600")
|
||||||
|
|
||||||
# 创建标签页
|
# 创建标签页
|
||||||
@@ -26,6 +33,10 @@ class JsonExtractorGUI:
|
|||||||
self.ip_extract_frame = ttk.Frame(self.notebook)
|
self.ip_extract_frame = ttk.Frame(self.notebook)
|
||||||
self.notebook.add(self.ip_extract_frame, text="漏洞明细表格IP提取")
|
self.notebook.add(self.ip_extract_frame, text="漏洞明细表格IP提取")
|
||||||
|
|
||||||
|
# 创建漏扫结果提取标签页
|
||||||
|
self.vuln_export_frame = ttk.Frame(self.notebook)
|
||||||
|
self.notebook.add(self.vuln_export_frame, text="漏扫结果提取明细至Excel")
|
||||||
|
|
||||||
# 在漏洞分类标签页中添加组件
|
# 在漏洞分类标签页中添加组件
|
||||||
# 输入文件框
|
# 输入文件框
|
||||||
self.input_frame = tk.LabelFrame(self.vuln_class_frame, text="输入HTML文件", padx=10, pady=5)
|
self.input_frame = tk.LabelFrame(self.vuln_class_frame, text="输入HTML文件", padx=10, pady=5)
|
||||||
@@ -115,9 +126,11 @@ class JsonExtractorGUI:
|
|||||||
# 初始化IP提取标签页
|
# 初始化IP提取标签页
|
||||||
self.init_ip_extract_tab()
|
self.init_ip_extract_tab()
|
||||||
|
|
||||||
|
# 初始化漏扫结果提取标签页
|
||||||
|
self.init_lvmeng_export_tab()
|
||||||
|
|
||||||
def log_message(self, message, level="INFO"):
|
def log_message(self, message, level="INFO"):
|
||||||
"""添加日志消息到日志框"""
|
"""添加日志消息到日志框"""
|
||||||
import datetime
|
|
||||||
timestamp = datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S")
|
timestamp = datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S")
|
||||||
self.log_text.insert("end", f"[{timestamp}] [{level}] {message}\n")
|
self.log_text.insert("end", f"[{timestamp}] [{level}] {message}\n")
|
||||||
self.log_text.see("end") # 自动滚动到最新消息
|
self.log_text.see("end") # 自动滚动到最新消息
|
||||||
@@ -422,6 +435,669 @@ class JsonExtractorGUI:
|
|||||||
self.ip_status_var.set(f"发生错误: {str(e)}")
|
self.ip_status_var.set(f"发生错误: {str(e)}")
|
||||||
messagebox.showerror("错误", f"发生错误: {str(e)}")
|
messagebox.showerror("错误", f"发生错误: {str(e)}")
|
||||||
|
|
||||||
|
def init_lvmeng_export_tab(self):
|
||||||
|
"""初始化漏扫结果提取明细至Excel标签页"""
|
||||||
|
# 添加说明文字
|
||||||
|
description = "本功能用于将绿盟漏扫系统生成的漏洞扫描结果HTML源文件提取至Excel文件,支持新旧版绿盟的漏洞扫描结果的解析和导出,并提供不同的导出样式。"
|
||||||
|
desc_label = tk.Label(self.vuln_export_frame, text=description, wraplength=700, justify="left")
|
||||||
|
desc_label.pack(fill="x", padx=10, pady=10)
|
||||||
|
|
||||||
|
# 输入文件框架
|
||||||
|
input_frame = tk.LabelFrame(self.vuln_export_frame, text="输入HTML文件", padx=10, pady=5)
|
||||||
|
input_frame.pack(fill="x", padx=10, pady=5)
|
||||||
|
|
||||||
|
self.lvmeng_input_path = tk.StringVar()
|
||||||
|
self.lvmeng_input_entry = tk.Entry(input_frame, textvariable=self.lvmeng_input_path, width=80)
|
||||||
|
self.lvmeng_input_entry.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
browse_btn = tk.Button(input_frame, text="浏览", command=self.browse_lvmeng_input)
|
||||||
|
browse_btn.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
# 拖放提示
|
||||||
|
drop_label = tk.Label(input_frame, text="(支持拖放HTML文件)", pady=5)
|
||||||
|
drop_label.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
# 版本选择框架
|
||||||
|
version_frame = tk.LabelFrame(self.vuln_export_frame, text="绿盟版本", padx=10, pady=5)
|
||||||
|
version_frame.pack(fill="x", padx=10, pady=5)
|
||||||
|
|
||||||
|
self.lvmeng_version = tk.StringVar(value="new")
|
||||||
|
new_radio = tk.Radiobutton(version_frame, text="新版绿盟",
|
||||||
|
variable=self.lvmeng_version, value="new")
|
||||||
|
new_radio.pack(side="left", padx=5)
|
||||||
|
old_radio = tk.Radiobutton(version_frame, text="旧版绿盟",
|
||||||
|
variable=self.lvmeng_version, value="old")
|
||||||
|
old_radio.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
# 样式选择框架
|
||||||
|
style_frame = tk.LabelFrame(self.vuln_export_frame, text="导出样式", padx=10, pady=5)
|
||||||
|
style_frame.pack(fill="x", padx=10, pady=5)
|
||||||
|
|
||||||
|
self.lvmeng_style = tk.StringVar(value="style1")
|
||||||
|
style1_radio = tk.Radiobutton(style_frame, text="样式一(简单表格)",
|
||||||
|
variable=self.lvmeng_style, value="style1")
|
||||||
|
style1_radio.pack(side="left", padx=5)
|
||||||
|
style2_radio = tk.Radiobutton(style_frame, text="样式二(复杂表格)",
|
||||||
|
variable=self.lvmeng_style, value="style2")
|
||||||
|
style2_radio.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
# 输出文件框架
|
||||||
|
output_frame = tk.LabelFrame(self.vuln_export_frame, text="输出Excel文件", padx=10, pady=5)
|
||||||
|
output_frame.pack(fill="x", padx=10, pady=5)
|
||||||
|
|
||||||
|
self.lvmeng_output_path = tk.StringVar()
|
||||||
|
self.lvmeng_output_entry = tk.Entry(output_frame, textvariable=self.lvmeng_output_path, width=80)
|
||||||
|
self.lvmeng_output_entry.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
browse_output_btn = tk.Button(output_frame, text="浏览", command=self.browse_lvmeng_output)
|
||||||
|
browse_output_btn.pack(side="left", padx=5)
|
||||||
|
|
||||||
|
# 导出按钮
|
||||||
|
export_btn = tk.Button(self.vuln_export_frame, text="导出Excel",
|
||||||
|
command=self.export_lvmeng_to_excel)
|
||||||
|
export_btn.pack(pady=10)
|
||||||
|
|
||||||
|
# 漏扫提取状态标签
|
||||||
|
self.lvmeng_status_var = tk.StringVar()
|
||||||
|
lvmeng_status_label = tk.Label(self.vuln_export_frame,
|
||||||
|
textvariable=self.lvmeng_status_var, fg="green")
|
||||||
|
lvmeng_status_label.pack(pady=5)
|
||||||
|
|
||||||
|
# 日志框
|
||||||
|
log_frame = tk.LabelFrame(self.vuln_export_frame, text="运行日志", padx=10, pady=5)
|
||||||
|
log_frame.pack(fill="both", expand=True, padx=10, pady=5)
|
||||||
|
|
||||||
|
# 创建文本框和滚动条
|
||||||
|
self.lvmeng_log_text = tk.Text(log_frame, height=12, width=80)
|
||||||
|
scrollbar = tk.Scrollbar(log_frame, orient="vertical", command=self.lvmeng_log_text.yview)
|
||||||
|
self.lvmeng_log_text.configure(yscrollcommand=scrollbar.set)
|
||||||
|
|
||||||
|
# 放置文本框和滚动条
|
||||||
|
scrollbar.pack(side="right", fill="y")
|
||||||
|
self.lvmeng_log_text.pack(side="left", fill="both", expand=True)
|
||||||
|
|
||||||
|
# 文件拖放支持
|
||||||
|
self.lvmeng_input_entry.drop_target_register(DND_FILES)
|
||||||
|
self.lvmeng_input_entry.dnd_bind('<<Drop>>', self.handle_lvmeng_file_drop)
|
||||||
|
|
||||||
|
def browse_lvmeng_input(self):
|
||||||
|
"""浏览并选择HTML输入文件"""
|
||||||
|
filename = filedialog.askopenfilename(
|
||||||
|
filetypes=[("HTML文件", "*.html"), ("所有文件", "*.*")]
|
||||||
|
)
|
||||||
|
if filename:
|
||||||
|
self.lvmeng_input_path.set(filename)
|
||||||
|
# 自动设置输出文件名
|
||||||
|
output_path = Path(filename).with_suffix('.xlsx')
|
||||||
|
self.lvmeng_output_path.set(str(output_path))
|
||||||
|
self.lvmeng_log("已选择输入文件: " + filename)
|
||||||
|
|
||||||
|
def browse_lvmeng_output(self):
|
||||||
|
"""浏览并选择Excel输出文件"""
|
||||||
|
filename = filedialog.asksaveasfilename(
|
||||||
|
defaultextension=".xlsx",
|
||||||
|
filetypes=[("Excel文件", "*.xlsx"), ("所有文件", "*.*")]
|
||||||
|
)
|
||||||
|
if filename:
|
||||||
|
self.lvmeng_output_path.set(filename)
|
||||||
|
self.lvmeng_log("已选择输出文件: " + filename)
|
||||||
|
|
||||||
|
def handle_lvmeng_file_drop(self, event):
|
||||||
|
"""处理拖放HTML文件"""
|
||||||
|
file_path = event.data
|
||||||
|
self.lvmeng_log(f"收到拖放文件: {file_path}")
|
||||||
|
|
||||||
|
# 移除花括号并转换为Path对象
|
||||||
|
file_path = Path(file_path.strip('{}'))
|
||||||
|
|
||||||
|
# 检查文件扩展名(不区分大小写)
|
||||||
|
if file_path.suffix.lower() in ('.html', '.htm'):
|
||||||
|
self.lvmeng_input_path.set(str(file_path))
|
||||||
|
output_path = file_path.with_suffix('.xlsx')
|
||||||
|
self.lvmeng_output_path.set(str(output_path))
|
||||||
|
self.lvmeng_log(f"已设置输入文件: {file_path}")
|
||||||
|
self.lvmeng_log(f"已设置输出文件: {output_path}")
|
||||||
|
else:
|
||||||
|
self.lvmeng_log(f"无效的文件类型: {file_path}", "ERROR")
|
||||||
|
|
||||||
|
def lvmeng_log(self, message, level="INFO"):
|
||||||
|
"""添加日志消息到漏扫提取日志框"""
|
||||||
|
timestamp = datetime.datetime.now().strftime("%Y-%m-%d %H:%M:%S")
|
||||||
|
self.lvmeng_log_text.insert("end", f"[{timestamp}] [{level}] {message}\n")
|
||||||
|
self.lvmeng_log_text.see("end") # 自动滚动到最新消息
|
||||||
|
|
||||||
|
def export_lvmeng_to_excel(self):
|
||||||
|
"""导出漏扫结果到Excel"""
|
||||||
|
input_file = self.lvmeng_input_path.get()
|
||||||
|
output_file = self.lvmeng_output_path.get()
|
||||||
|
version = self.lvmeng_version.get()
|
||||||
|
style = self.lvmeng_style.get()
|
||||||
|
|
||||||
|
if not input_file or not output_file:
|
||||||
|
messagebox.showwarning("警告", "请选择输入和输出文件。")
|
||||||
|
self.lvmeng_log("请选择输入和输出文件!", "ERROR")
|
||||||
|
return
|
||||||
|
|
||||||
|
if not Path(input_file).exists():
|
||||||
|
messagebox.showwarning("警告", "输入文件不存在。")
|
||||||
|
self.lvmeng_log("输入文件不存在!", "ERROR")
|
||||||
|
return
|
||||||
|
|
||||||
|
try:
|
||||||
|
self.lvmeng_log(f"开始处理文件: {input_file}")
|
||||||
|
self.lvmeng_log(f"导出版本: {'新版绿盟' if version == 'new' else '旧版绿盟'}")
|
||||||
|
self.lvmeng_log(f"导出样式: {'样式一' if style == 'style1' else '样式二'}")
|
||||||
|
|
||||||
|
# 根据版本和样式选择处理方法
|
||||||
|
if version == "new":
|
||||||
|
self.process_new_lvmeng(input_file, output_file, style)
|
||||||
|
else:
|
||||||
|
self.process_old_lvmeng(input_file, output_file, style)
|
||||||
|
|
||||||
|
self.lvmeng_status_var.set(f"漏洞数据已成功导出到: {output_file}")
|
||||||
|
messagebox.showinfo("完成", f"漏洞数据已成功导出到: {output_file}")
|
||||||
|
except Exception as e:
|
||||||
|
error_msg = f"导出过程中出现错误: {str(e)}"
|
||||||
|
self.lvmeng_log(error_msg, "ERROR")
|
||||||
|
self.lvmeng_status_var.set("导出失败")
|
||||||
|
messagebox.showerror("错误", error_msg)
|
||||||
|
|
||||||
|
def process_new_lvmeng(self, input_file, output_file, style):
|
||||||
|
"""处理新版绿盟漏扫结果并导出到Excel"""
|
||||||
|
try:
|
||||||
|
# 读取HTML文件
|
||||||
|
with open(input_file, 'r', encoding='utf-8') as f:
|
||||||
|
file_content = f.read()
|
||||||
|
|
||||||
|
# 提取JSON数据
|
||||||
|
self.lvmeng_log("正在提取JSON数据...")
|
||||||
|
pat_list = re.findall(r'<script>window.data = (.*?);</script>', file_content)
|
||||||
|
if not pat_list:
|
||||||
|
raise Exception("未在HTML文件中找到匹配的JSON数据")
|
||||||
|
|
||||||
|
data_json = json.loads(pat_list[0])
|
||||||
|
|
||||||
|
# 获取漏洞列表
|
||||||
|
vuln_list = data_json["categories"][3]["children"][0]["data"]["vulns_info"]["vuln_distribution"]["vuln_list"]
|
||||||
|
self.lvmeng_log(f"成功提取到 {len(vuln_list)} 个漏洞")
|
||||||
|
|
||||||
|
# 创建Excel工作簿
|
||||||
|
wb = Workbook()
|
||||||
|
ws = wb.active
|
||||||
|
ws.title = "漏洞信息"
|
||||||
|
|
||||||
|
# 定义样式
|
||||||
|
# 定义对齐方式(水平居中,垂直居中)
|
||||||
|
alignment = Alignment(horizontal='center', vertical='center', wrap_text=True)
|
||||||
|
# 定义对齐方式(水平左对齐,垂直居中)
|
||||||
|
horLeft_alignment = Alignment(horizontal='left', vertical='center', wrap_text=True)
|
||||||
|
# 单独定义字体加粗
|
||||||
|
font_bold = Font(bold=True)
|
||||||
|
# 单独定义颜色字体
|
||||||
|
font_red = Font(bold=False, color='E42B00')
|
||||||
|
font_orange = Font(bold=False, color='AF6100')
|
||||||
|
font_gray = Font(bold=False, color='737373')
|
||||||
|
# 定义边框样式
|
||||||
|
thin_border = Border(
|
||||||
|
left=Side(style='thin'),
|
||||||
|
right=Side(style='thin'),
|
||||||
|
top=Side(style='thin'),
|
||||||
|
bottom=Side(style='thin')
|
||||||
|
)
|
||||||
|
|
||||||
|
if style == 'style1':
|
||||||
|
# 样式一:简单表格
|
||||||
|
self.lvmeng_log("使用样式一(简单表格)导出...")
|
||||||
|
|
||||||
|
# 添加表头
|
||||||
|
headers = ['序号', '漏洞名称', '漏洞等级', '影响主机个数', '受影响主机', '详细描述', '解决办法']
|
||||||
|
for col_idx, header in enumerate(headers, 1):
|
||||||
|
cell = ws.cell(row=1, column=col_idx, value=header)
|
||||||
|
cell.alignment = alignment
|
||||||
|
cell.font = font_bold
|
||||||
|
cell.border = thin_border
|
||||||
|
|
||||||
|
# 设置列宽
|
||||||
|
ws.column_dimensions['A'].width = 7
|
||||||
|
ws.column_dimensions['B'].width = 45
|
||||||
|
ws.column_dimensions['C'].width = 15
|
||||||
|
ws.column_dimensions['D'].width = 15
|
||||||
|
ws.column_dimensions['E'].width = 40
|
||||||
|
ws.column_dimensions['F'].width = 50
|
||||||
|
ws.column_dimensions['G'].width = 50
|
||||||
|
|
||||||
|
# 添加数据
|
||||||
|
for idx, vuln in enumerate(vuln_list, 1):
|
||||||
|
# 获取漏洞等级中文
|
||||||
|
level_map = {'high': '高危', 'middle': '中危', 'low': '低危'}
|
||||||
|
level = level_map.get(vuln.get('vuln_level', ''), '未知')
|
||||||
|
|
||||||
|
# 处理描述和解决方案
|
||||||
|
description = '\n'.join(filter(None, vuln.get('i18n_description', [])))
|
||||||
|
solution = '\n'.join(filter(None, vuln.get('i18n_solution', [])))
|
||||||
|
|
||||||
|
# 添加行数据
|
||||||
|
row_data = [
|
||||||
|
idx,
|
||||||
|
vuln.get('i18n_name', ''),
|
||||||
|
level,
|
||||||
|
vuln.get('vuln_count', 0),
|
||||||
|
vuln.get('target', ''),
|
||||||
|
description,
|
||||||
|
solution
|
||||||
|
]
|
||||||
|
|
||||||
|
row_idx = idx + 1
|
||||||
|
for col_idx, value in enumerate(row_data, 1):
|
||||||
|
cell = ws.cell(row=row_idx, column=col_idx, value=value)
|
||||||
|
cell.border = thin_border
|
||||||
|
|
||||||
|
# 设置对齐方式
|
||||||
|
if col_idx in [1, 3, 4]: # 序号、漏洞等级、影响主机个数居中
|
||||||
|
cell.alignment = alignment
|
||||||
|
else: # 其他左对齐
|
||||||
|
cell.alignment = horLeft_alignment
|
||||||
|
|
||||||
|
# 设置漏洞等级颜色
|
||||||
|
if col_idx in [2, 3]: # 漏洞名称和等级
|
||||||
|
if level == '高危':
|
||||||
|
cell.font = font_red
|
||||||
|
elif level == '中危':
|
||||||
|
cell.font = font_orange
|
||||||
|
elif level == '低危':
|
||||||
|
cell.font = font_gray
|
||||||
|
|
||||||
|
else:
|
||||||
|
# 样式二:复杂表格
|
||||||
|
self.lvmeng_log("使用样式二(复杂表格)导出...")
|
||||||
|
|
||||||
|
# 添加表头
|
||||||
|
headers = ['序号', '漏洞名称', '漏洞等级', '影响主机个数']
|
||||||
|
for col_idx, header in enumerate(headers, 1):
|
||||||
|
cell = ws.cell(row=1, column=col_idx, value=header)
|
||||||
|
cell.alignment = alignment
|
||||||
|
cell.font = font_bold
|
||||||
|
cell.border = thin_border
|
||||||
|
|
||||||
|
# 设置列宽
|
||||||
|
ws.column_dimensions['A'].width = 7
|
||||||
|
ws.column_dimensions['B'].width = 45
|
||||||
|
ws.column_dimensions['C'].width = 15
|
||||||
|
ws.column_dimensions['D'].width = 50
|
||||||
|
|
||||||
|
current_row = 2
|
||||||
|
for idx, vuln in enumerate(vuln_list, 1):
|
||||||
|
# 获取漏洞等级中文
|
||||||
|
level_map = {'high': '高危', 'middle': '中危', 'low': '低危'}
|
||||||
|
level = level_map.get(vuln.get('vuln_level', ''), '未知')
|
||||||
|
|
||||||
|
# 处理描述和解决方案
|
||||||
|
description = '\n'.join(filter(None, vuln.get('i18n_description', [])))
|
||||||
|
solution = '\n'.join(filter(None, vuln.get('i18n_solution', [])))
|
||||||
|
|
||||||
|
# 添加主行数据
|
||||||
|
row_data = [
|
||||||
|
idx,
|
||||||
|
vuln.get('i18n_name', ''),
|
||||||
|
level,
|
||||||
|
vuln.get('vuln_count', 0)
|
||||||
|
]
|
||||||
|
|
||||||
|
for col_idx, value in enumerate(row_data, 1):
|
||||||
|
cell = ws.cell(row=current_row, column=col_idx, value=value)
|
||||||
|
cell.border = thin_border
|
||||||
|
|
||||||
|
# 设置对齐方式
|
||||||
|
if col_idx == 2: # 漏洞名称左对齐
|
||||||
|
cell.alignment = horLeft_alignment
|
||||||
|
else: # 其他居中
|
||||||
|
cell.alignment = alignment
|
||||||
|
|
||||||
|
# 设置漏洞等级颜色
|
||||||
|
if col_idx in [2, 3]: # 漏洞名称和等级
|
||||||
|
if level == '高危':
|
||||||
|
cell.font = font_red
|
||||||
|
elif level == '中危':
|
||||||
|
cell.font = font_orange
|
||||||
|
elif level == '低危':
|
||||||
|
cell.font = font_gray
|
||||||
|
|
||||||
|
# 添加详细信息行
|
||||||
|
details = [
|
||||||
|
('受影响主机', vuln.get('target', '')),
|
||||||
|
('详细描述', description),
|
||||||
|
('解决办法', solution)
|
||||||
|
]
|
||||||
|
|
||||||
|
# 计算实际需要的行数
|
||||||
|
total_rows = len(details)
|
||||||
|
|
||||||
|
# 合并第一列的单元格
|
||||||
|
if total_rows > 0:
|
||||||
|
ws.merge_cells(f'A{current_row+1}:A{current_row+total_rows}')
|
||||||
|
merged_cell = ws.cell(row=current_row+1, column=1)
|
||||||
|
merged_cell.border = thin_border
|
||||||
|
|
||||||
|
# 添加所有详细信息
|
||||||
|
for i, (label, value) in enumerate(details):
|
||||||
|
row_num = current_row + i + 1
|
||||||
|
|
||||||
|
# 添加标签(第二列)
|
||||||
|
label_cell = ws.cell(row=row_num, column=2)
|
||||||
|
label_cell.value = label
|
||||||
|
label_cell.font = font_bold
|
||||||
|
label_cell.border = thin_border
|
||||||
|
label_cell.alignment = alignment # 标签居中对齐
|
||||||
|
|
||||||
|
# 添加值(第三列)- 保持为空
|
||||||
|
value_cell = ws.cell(row=row_num, column=3)
|
||||||
|
value_cell.border = thin_border
|
||||||
|
|
||||||
|
# 第四列设置值和自动换行
|
||||||
|
value_cell = ws.cell(row=row_num, column=4)
|
||||||
|
value_cell.value = value
|
||||||
|
value_cell.border = thin_border
|
||||||
|
value_cell.alignment = horLeft_alignment # 自动换行
|
||||||
|
|
||||||
|
current_row += total_rows + 1 # 更新行号,加1是为了下一组数据之间留空
|
||||||
|
|
||||||
|
# 保存Excel文件
|
||||||
|
wb.save(output_file)
|
||||||
|
self.lvmeng_log(f"成功导出到Excel文件: {output_file}", "SUCCESS")
|
||||||
|
return True
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
self.lvmeng_log(f"处理新版绿盟漏扫结果时出错: {str(e)}", "ERROR")
|
||||||
|
raise
|
||||||
|
|
||||||
|
def process_old_lvmeng(self, input_file, output_file, style):
|
||||||
|
"""处理旧版绿盟漏扫结果并导出到Excel"""
|
||||||
|
try:
|
||||||
|
# 读取HTML文件
|
||||||
|
with open(input_file, 'r', encoding='utf-8') as f:
|
||||||
|
html_content = f.read()
|
||||||
|
|
||||||
|
# 使用BeautifulSoup解析HTML
|
||||||
|
self.lvmeng_log("正在解析HTML文件...")
|
||||||
|
soup = BeautifulSoup(html_content, 'html.parser')
|
||||||
|
|
||||||
|
# 查找漏洞分布表格
|
||||||
|
vuln_table = soup.find('table', id='vuln_distribution')
|
||||||
|
if not vuln_table:
|
||||||
|
raise Exception("未找到漏洞分布表格,请确认是否为旧版绿盟漏扫结果")
|
||||||
|
|
||||||
|
# 查找所有漏洞行
|
||||||
|
vuln_rows = vuln_table.find_all('tr', class_=re.compile(r'(odd|even) vuln_(high|middle|low)'))
|
||||||
|
self.lvmeng_log(f"成功提取到 {len(vuln_rows)} 个漏洞")
|
||||||
|
|
||||||
|
# 存储漏洞数据
|
||||||
|
vulnerability_data = []
|
||||||
|
|
||||||
|
for row in vuln_rows:
|
||||||
|
# 提取基本信息
|
||||||
|
tds = row.find_all('td')
|
||||||
|
number = tds[0].text.strip()
|
||||||
|
name = row.find('span').text.strip()
|
||||||
|
affected_hosts_count = tds[2].text.strip()
|
||||||
|
|
||||||
|
# 确定漏洞等级
|
||||||
|
if 'vuln_high' in row['class']:
|
||||||
|
level = '高危'
|
||||||
|
elif 'vuln_middle' in row['class']:
|
||||||
|
level = '中危'
|
||||||
|
else:
|
||||||
|
level = '低危'
|
||||||
|
|
||||||
|
# 获取详细信息所在的下一个tr
|
||||||
|
detail_row = row.find_next('tr', class_=re.compile(r'more hide (odd|even)'))
|
||||||
|
|
||||||
|
# 初始化变量
|
||||||
|
affected_hosts_str = ""
|
||||||
|
description = ""
|
||||||
|
solution = ""
|
||||||
|
additional_fields = {
|
||||||
|
'威胁分值': '',
|
||||||
|
'危险插件': '',
|
||||||
|
'发现日期': '',
|
||||||
|
'CVE编号': '',
|
||||||
|
'CNNVD编号': '',
|
||||||
|
'CNCVE编号': '',
|
||||||
|
'CVSS评分': '',
|
||||||
|
'CNVD编号': ''
|
||||||
|
}
|
||||||
|
|
||||||
|
if detail_row:
|
||||||
|
# 提取受影响主机
|
||||||
|
affected_hosts = []
|
||||||
|
# 先查找所有<a>标签的主机
|
||||||
|
host_links = detail_row.find_all('a', href=re.compile(r'host/.*\.html'))
|
||||||
|
if host_links: # 如果找到<a>标签
|
||||||
|
for link in host_links:
|
||||||
|
affected_hosts.append(link.text.strip())
|
||||||
|
else: # 如果没有<a>标签,查找特定的td标签
|
||||||
|
# 查找class为report_table的table下的width为80%的td
|
||||||
|
report_table = detail_row.find('table', class_='report_table')
|
||||||
|
if report_table:
|
||||||
|
host_td = report_table.find('td', attrs={'width': '80%'})
|
||||||
|
if host_td:
|
||||||
|
# 替换所有 为空格,然后获取文本
|
||||||
|
hosts_text = host_td.text.replace(' ', ' ').strip()
|
||||||
|
# 如果文本不为空,添加到列表
|
||||||
|
if hosts_text:
|
||||||
|
affected_hosts.append(hosts_text)
|
||||||
|
|
||||||
|
# 将所有主机信息合并,用逗号分隔
|
||||||
|
affected_hosts_str = ', '.join(affected_hosts)
|
||||||
|
|
||||||
|
# 提取详细描述
|
||||||
|
description_row = detail_row.find('tr', class_='even')
|
||||||
|
description = description_row.find('td').text.strip() if description_row else ''
|
||||||
|
|
||||||
|
# 提取解决办法
|
||||||
|
solution_row = description_row.find_next('tr', class_='odd') if description_row else None
|
||||||
|
solution = solution_row.find('td').text.strip() if solution_row else ''
|
||||||
|
|
||||||
|
# 查找所有可能包含新字段的行
|
||||||
|
info_rows = detail_row.find_all('tr', class_=re.compile(r'(odd|even)'))
|
||||||
|
for info_row in info_rows:
|
||||||
|
field_name = info_row.find('th')
|
||||||
|
if field_name and field_name.text.strip() in additional_fields:
|
||||||
|
field_value = info_row.find('td')
|
||||||
|
if field_value:
|
||||||
|
additional_fields[field_name.text.strip()] = field_value.text.strip()
|
||||||
|
|
||||||
|
# 添加到漏洞数据列表
|
||||||
|
vulnerability_data.append({
|
||||||
|
'序号': number,
|
||||||
|
'漏洞名称': name,
|
||||||
|
'漏洞等级': level,
|
||||||
|
'影响主机个数': affected_hosts_count,
|
||||||
|
'受影响主机': affected_hosts_str,
|
||||||
|
'详细描述': description,
|
||||||
|
'解决办法': solution,
|
||||||
|
**additional_fields # 添加新字段
|
||||||
|
})
|
||||||
|
|
||||||
|
# 创建Excel工作簿
|
||||||
|
wb = Workbook()
|
||||||
|
ws = wb.active
|
||||||
|
ws.title = "漏洞信息"
|
||||||
|
|
||||||
|
# 设置边框样式
|
||||||
|
border = Border(
|
||||||
|
left=Side(style='thin'),
|
||||||
|
right=Side(style='thin'),
|
||||||
|
top=Side(style='thin'),
|
||||||
|
bottom=Side(style='thin')
|
||||||
|
)
|
||||||
|
|
||||||
|
# 设置表头字体
|
||||||
|
header_font = Font(bold=True)
|
||||||
|
|
||||||
|
# 设置不同等级的字体颜色
|
||||||
|
high_font = Font(color='FF0000') # 红色
|
||||||
|
middle_font = Font(color='FFA500') # 橙色
|
||||||
|
low_font = Font(color='808080') # 灰色
|
||||||
|
|
||||||
|
if style == 'style1':
|
||||||
|
# 样式一:简单表格
|
||||||
|
self.lvmeng_log("使用样式一(简单表格)导出...")
|
||||||
|
|
||||||
|
# 添加表头
|
||||||
|
headers = ['序号', '漏洞名称', '漏洞等级', '影响主机个数', '受影响主机', '详细描述', '解决办法']
|
||||||
|
ws.append(headers)
|
||||||
|
|
||||||
|
# 设置表头格式
|
||||||
|
for cell in ws[1]:
|
||||||
|
cell.font = header_font
|
||||||
|
cell.border = border
|
||||||
|
|
||||||
|
# 添加数据并设置格式
|
||||||
|
for row_data in vulnerability_data:
|
||||||
|
row = [row_data[h] for h in headers]
|
||||||
|
ws.append(row)
|
||||||
|
row_num = ws.max_row
|
||||||
|
|
||||||
|
# 设置单元格边框和字体颜色
|
||||||
|
for col in range(1, len(headers) + 1):
|
||||||
|
cell = ws.cell(row=row_num, column=col)
|
||||||
|
cell.border = border
|
||||||
|
|
||||||
|
# 设置漏洞名称和等级的字体颜色
|
||||||
|
if col in [2, 3]: # 漏洞名称和漏洞等级列
|
||||||
|
level = row_data['漏洞等级']
|
||||||
|
if level == '高危':
|
||||||
|
cell.font = high_font
|
||||||
|
elif level == '中危':
|
||||||
|
cell.font = middle_font
|
||||||
|
else:
|
||||||
|
cell.font = low_font
|
||||||
|
|
||||||
|
# 调整列宽
|
||||||
|
for column in ws.columns:
|
||||||
|
max_length = 0
|
||||||
|
column = [cell for cell in column]
|
||||||
|
for cell in column:
|
||||||
|
try:
|
||||||
|
if len(str(cell.value)) > max_length:
|
||||||
|
max_length = len(str(cell.value))
|
||||||
|
except:
|
||||||
|
pass
|
||||||
|
adjusted_width = (max_length + 2)
|
||||||
|
ws.column_dimensions[get_column_letter(column[0].column)].width = adjusted_width
|
||||||
|
|
||||||
|
else:
|
||||||
|
# 样式二:复杂表格
|
||||||
|
self.lvmeng_log("使用样式二(复杂表格)导出...")
|
||||||
|
|
||||||
|
# 设置居中对齐
|
||||||
|
center_alignment = Alignment(horizontal='center', vertical='center')
|
||||||
|
# 设置自动换行对齐
|
||||||
|
wrap_alignment = Alignment(horizontal='left', vertical='center', wrap_text=True)
|
||||||
|
|
||||||
|
# 添加表头
|
||||||
|
headers = ['序号', '漏洞名称', '漏洞等级', '影响主机个数']
|
||||||
|
ws.append(headers)
|
||||||
|
|
||||||
|
# 设置表头格式
|
||||||
|
for cell in ws[1]:
|
||||||
|
cell.font = header_font
|
||||||
|
cell.border = border
|
||||||
|
cell.alignment = center_alignment
|
||||||
|
|
||||||
|
# 设置固定列宽
|
||||||
|
ws.column_dimensions['A'].width = 7 # 第一列
|
||||||
|
ws.column_dimensions['B'].width = 45 # 第二列
|
||||||
|
ws.column_dimensions['C'].width = 15 # 第三列
|
||||||
|
ws.column_dimensions['D'].width = 50 # 第四列
|
||||||
|
|
||||||
|
current_row = 2
|
||||||
|
for row_data in vulnerability_data:
|
||||||
|
# 添加主行
|
||||||
|
row = [row_data['序号'], row_data['漏洞名称'], row_data['漏洞等级'], row_data['影响主机个数']]
|
||||||
|
for col, value in enumerate(row, 1):
|
||||||
|
cell = ws.cell(row=current_row, column=col)
|
||||||
|
cell.value = value
|
||||||
|
cell.border = border
|
||||||
|
cell.alignment = center_alignment # 第一行所有单元格居中
|
||||||
|
|
||||||
|
# 第一行第二个单元格设置自动换行
|
||||||
|
if col == 2:
|
||||||
|
cell.alignment = wrap_alignment
|
||||||
|
|
||||||
|
# 设置漏洞名称和等级的字体颜色
|
||||||
|
if col in [2, 3]: # 漏洞名称和漏洞等级列
|
||||||
|
level = row_data['漏洞等级']
|
||||||
|
if level == '高危':
|
||||||
|
cell.font = high_font
|
||||||
|
elif level == '中危':
|
||||||
|
cell.font = middle_font
|
||||||
|
else:
|
||||||
|
cell.font = low_font
|
||||||
|
|
||||||
|
# 添加详细信息行
|
||||||
|
details = [
|
||||||
|
('受影响主机', row_data['受影响主机']),
|
||||||
|
('详细描述', row_data['详细描述']),
|
||||||
|
('解决办法', row_data['解决办法'])
|
||||||
|
]
|
||||||
|
|
||||||
|
# 添加新字段(只添加有值的字段)
|
||||||
|
additional_fields = [
|
||||||
|
('威胁分值', row_data['威胁分值']),
|
||||||
|
('危险插件', row_data['危险插件']),
|
||||||
|
('发现日期', row_data['发现日期']),
|
||||||
|
('CVE编号', row_data['CVE编号']),
|
||||||
|
('CNNVD编号', row_data['CNNVD编号']),
|
||||||
|
('CNCVE编号', row_data['CNCVE编号']),
|
||||||
|
('CVSS评分', row_data['CVSS评分']),
|
||||||
|
('CNVD编号', row_data['CNVD编号'])
|
||||||
|
]
|
||||||
|
|
||||||
|
# 过滤掉空值的字段
|
||||||
|
details.extend([(label, value) for label, value in additional_fields if value])
|
||||||
|
|
||||||
|
# 计算实际需要的行数
|
||||||
|
total_rows = len(details)
|
||||||
|
|
||||||
|
# 合并第一列的单元格
|
||||||
|
if total_rows > 0:
|
||||||
|
ws.merge_cells(f'A{current_row+1}:A{current_row+total_rows}')
|
||||||
|
merged_cell = ws.cell(row=current_row+1, column=1)
|
||||||
|
merged_cell.border = border
|
||||||
|
|
||||||
|
# 添加所有详细信息
|
||||||
|
for i, (label, value) in enumerate(details):
|
||||||
|
row_num = current_row + i + 1
|
||||||
|
|
||||||
|
# 添加标签(第二列)
|
||||||
|
label_cell = ws.cell(row=row_num, column=2)
|
||||||
|
label_cell.value = label
|
||||||
|
label_cell.font = header_font
|
||||||
|
label_cell.border = border
|
||||||
|
label_cell.alignment = center_alignment # 标签居中对齐
|
||||||
|
|
||||||
|
# 添加值(第三列)- 保持为空
|
||||||
|
value_cell = ws.cell(row=row_num, column=3)
|
||||||
|
value_cell.border = border
|
||||||
|
|
||||||
|
# 第四列设置值和自动换行
|
||||||
|
value_cell = ws.cell(row=row_num, column=4)
|
||||||
|
value_cell.value = value
|
||||||
|
value_cell.border = border
|
||||||
|
value_cell.alignment = wrap_alignment # 自动换行
|
||||||
|
|
||||||
|
current_row += total_rows + 1 # 更新行号,加1是为了下一组数据之间留空
|
||||||
|
|
||||||
|
# 保存Excel文件
|
||||||
|
wb.save(output_file)
|
||||||
|
self.lvmeng_log(f"成功导出到Excel文件: {output_file}", "SUCCESS")
|
||||||
|
return True
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
self.lvmeng_log(f"处理旧版绿盟漏扫结果时出错: {str(e)}", "ERROR")
|
||||||
|
raise
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
root = TkinterDnD.Tk()
|
root = TkinterDnD.Tk()
|
||||||
app = JsonExtractorGUI(root)
|
app = JsonExtractorGUI(root)
|
||||||
|
|||||||
BIN
requirements.txt
BIN
requirements.txt
Binary file not shown.
Reference in New Issue
Block a user