HD Moore f26996cb89
Remove singletons from Nuclei engine (continuation of #6210) (#6296)
* introducing execution id

* wip

* .

* adding separate execution context id

* lint

* vet

* fixing pg dialers

* test ignore

* fixing loader FD limit

* test

* fd fix

* wip: remove CloseProcesses() from dev merge

* wip: fix merge issue

* protocolstate: stop memguarding on last dialer delete

* avoid data race in dialers.RawHTTPClient

* use shared logger and avoid race conditions

* use shared logger and avoid race conditions

* go mod

* patch executionId into compiled template cache

* clean up comment in Parse

* go mod update

* bump echarts

* address merge issues

* fix use of gologger

* switch cmd/nuclei to options.Logger

* address merge issues with go.mod

* go vet: address copy of lock with new Copy function

* fixing tests

* disable speed control

* fix nil ExecuterOptions

* removing deprecated code

* fixing result print

* default logger

* cli default logger

* filter warning from results

* fix performance test

* hardcoding path

* disable upload

* refactor(runner): uses `Warning` instead of `Print` for `pdcpUploadErrMsg`

Signed-off-by: Dwi Siswanto <git@dw1.io>

* Revert "disable upload"

This reverts commit 114fbe6663361bf41cf8b2645fd2d57083d53682.

* Revert "hardcoding path"

This reverts commit cf12ca800e0a0e974bd9fd4826a24e51547f7c00.

---------

Signed-off-by: Dwi Siswanto <git@dw1.io>
Co-authored-by: Mzack9999 <mzack9999@protonmail.com>
Co-authored-by: Dwi Siswanto <git@dw1.io>
Co-authored-by: Dwi Siswanto <25837540+dwisiswant0@users.noreply.github.com>
2025-07-10 01:17:26 +05:30

139 lines
3.7 KiB
Go

package splunk
import (
"bytes"
"crypto/tls"
"fmt"
"io"
"net"
"net/http"
"time"
"github.com/pkg/errors"
"github.com/projectdiscovery/nuclei/v3/pkg/output"
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/protocolstate"
"github.com/projectdiscovery/nuclei/v3/pkg/utils/json"
"github.com/projectdiscovery/retryablehttp-go"
"github.com/projectdiscovery/useragent"
)
// Options contains necessary options required for splunk communication
type Options struct {
// Host is the hostname and port of the splunk instance
Host string `yaml:"host" validate:"required"`
Port int `yaml:"port" validate:"gte=0,lte=65535"`
// SSL (optional) enables ssl for splunk connection
SSL bool `yaml:"ssl"`
// SSLVerification (optional) disables SSL verification for splunk
SSLVerification bool `yaml:"ssl-verification"`
// Token for HEC instance
Token string `yaml:"token" validate:"required"`
IndexName string `yaml:"index-name" validate:"required"`
HttpClient *retryablehttp.Client `yaml:"-"`
ExecutionId string `yaml:"-"`
}
type data struct {
Event *output.ResultEvent `json:"event"`
}
// Exporter type for splunk
type Exporter struct {
url string
authentication string
splunk *http.Client
}
// New creates and returns a new exporter for splunk
func New(option *Options) (*Exporter, error) {
var ei *Exporter
dialers := protocolstate.GetDialersWithId(option.ExecutionId)
if dialers == nil {
return nil, fmt.Errorf("dialers not initialized for %s", option.ExecutionId)
}
var client *http.Client
if option.HttpClient != nil {
client = option.HttpClient.HTTPClient
} else {
client = &http.Client{
Timeout: 5 * time.Second,
Transport: &http.Transport{
MaxIdleConns: 10,
MaxIdleConnsPerHost: 10,
DialContext: dialers.Fastdialer.Dial,
DialTLSContext: dialers.Fastdialer.DialTLS,
TLSClientConfig: &tls.Config{InsecureSkipVerify: option.SSLVerification},
},
}
}
// preparing url for splunk
scheme := "http://"
if option.SSL {
scheme = "https://"
}
// Authentication header for HEC
authentication := "Splunk " + option.Token
// add HEC endpoint, index, source, sourcetype
addr := option.Host
if option.Port > 0 {
addr = net.JoinHostPort(addr, fmt.Sprint(option.Port))
}
base_url := fmt.Sprintf("%s%s", scheme, addr)
sourcetype := "nuclei:splunk-hec:exporter:json"
url := fmt.Sprintf("%s/services/collector/event?index=%s&sourcetype=%s&source=%s", base_url, option.IndexName, sourcetype, base_url)
ei = &Exporter{
url: url,
authentication: authentication,
splunk: client,
}
return ei, nil
}
// Export exports a passed result event to Splunk
func (exporter *Exporter) Export(event *output.ResultEvent) error {
// creating a request
req, err := http.NewRequest(http.MethodPost, exporter.url, nil)
if err != nil {
return errors.Wrap(err, "could not make request")
}
if len(exporter.authentication) > 0 {
req.Header.Add("Authorization", exporter.authentication)
}
userAgent := useragent.PickRandom()
req.Header.Set("User-Agent", userAgent.Raw)
req.Header.Add("Content-Type", "application/json")
d := data{Event: event}
b, err := json.Marshal(&d)
if err != nil {
return err
}
req.Body = io.NopCloser(bytes.NewReader(b))
res, err := exporter.splunk.Do(req)
if err != nil {
return err
}
b, err = io.ReadAll(res.Body)
if err != nil {
return errors.New(err.Error() + "error thrown by splunk " + string(b))
}
if res.StatusCode >= http.StatusMultipleChoices {
return errors.New("splunk responded with an error: " + string(b))
}
return nil
}
// Close closes the exporter after operation
func (exporter *Exporter) Close() error {
return nil
}