Introducing SHIFU: Your Comprehensive CVE Finder Toolkit

Yasin
3 min readApr 18, 2024

--

Introduction

SHIFU is a powerful toolkit designed to simplify the process of finding detailed information about Common Vulnerabilities and Exposures (CVEs). Whether you’re a security professional, system administrator, or developer, SHIFU offers a wide range of features and capabilities to streamline CVE research and analysis.

Key Features

1. Automated CVE Retrieval

SHIFU automates the retrieval of CVE information from the Red Hat CVE database. This saves time and effort, allowing users to focus on analyzing and addressing security vulnerabilities rather than manually searching for information.

2. Flexible Input Options

Users have the flexibility to input CVEs manually or provide a text file containing a list of CVEs. This flexibility caters to different user preferences and workflow requirements, enhancing usability and convenience.

3. Colorized Output

SHIFU provides colorized output in the terminal, enhancing readability and making it easier for users to interpret and analyze CVE information at a glance. Color-coded text highlights key details and improves overall user experience.

4. Detailed CVE Information

SHIFU retrieves detailed information about each CVE, including:

  • Severity ratings
  • - Public dates
  • - Advisories
  • - Bugzilla details
  • - CVSS scores
  • - Affected packages
  • - CWE (Common Weakness Enumeration)
  • - Resource URLs

This comprehensive information empowers users to make informed decisions and prioritize remediation efforts effectively.

Technical Details

Installation Requirements

Before installing SHIFU, ensure that you have the following requirements:

  • Ruby: SHIFU is written in Ruby, so you’ll need Ruby installed on your system.
  • - Internet Connectivity: SHIFU requires internet connectivity to access the Red Hat CVE database.

Installation Steps

Follow these steps to install SHIFU:

  1. Open your terminal.

2. Install the required Ruby gems by running the following command:

gem install json net-http cgi

3. Download the SHIFU source code from the GitHub repository.

git clone https://github.com/symbolexe/SHIFU

4. Navigate to the directory containing the SHIFU source code.

cd SHIFU

5. Run SHIFU by executing the following command:

ruby shifu.rb

Usage Instructions

When running SHIFU, you’ll be presented with a menu where you can choose to enter CVE IDs manually or provide a file containing CVEs. Follow the on-screen prompts to input CVEs and retrieve detailed information about each CVE. Optionally, you can save the CVE information to a file for future reference.

Example Usage

Let’s consider a scenario where a security analyst needs to assess the impact of a critical CVE affecting their organization’s systems. By using SHIFU, the analyst can quickly retrieve comprehensive information about the vulnerability, including severity ratings, advisories, and CVSS scores. Armed with this knowledge, the analyst can develop a targeted remediation plan to mitigate the risk effectively and protect the organization’s assets.

License

SHIFU is distributed under the MIT License. See the LICENSE file on SHIFU GitHub Page for details.

Support and Contributions

If you encounter any issues or have suggestions for improving SHIFU, please open an issue on the GitHub repository. Contributions are welcome and appreciated!

Stay tuned for updates and new features as we continue to enhance SHIFU and make it an indispensable tool for cybersecurity professionals worldwide.

Feel free to use and modify this documentation as needed for your Medium article! Let me know if there’s anything else you’d like to add or change.

--

--

Yasin
Yasin

Written by Yasin

Founder & CEO of TachyCorp & Ligurina Cybersecurity Platform. Bug Hunter | Purple Team Manager. Liberalism 🕊️.

No responses yet