wpscanteam/wpscan

View on GitHub
lib/wpscan/vulnerability.rb

Summary

Maintainability
A
0 mins
Test Coverage
# frozen_string_literal: true

module WPScan
  # Specific implementation
  class Vulnerability < CMSScanner::Vulnerability
    include References

    # @param [ Hash ] json_data
    # @return [ Vulnerability ]
    def self.load_from_json(json_data)
      references = { wpvulndb: json_data['id'].to_s }

      if json_data['references']
        references_keys.each do |key|
          references[key] = json_data['references'][key.to_s] if json_data['references'].key?(key.to_s)
        end
      end

      new(
        json_data['title'],
        references: references,
        type: json_data['vuln_type'],
        fixed_in: json_data['fixed_in'],
        introduced_in: json_data['introduced_in'],
        cvss: json_data['cvss']&.symbolize_keys
      )
    end
  end
end