[IntelMQ-dev] About Shadowserver's generic Special report

Mika Silander mika.silander at csc.fi
Thu Oct 3 08:35:05 CEST 2024


Hi,

 We received today a Shadowserver report that gets mapped into the feed "Special" by the Shadowserver parser bot. It's fine to try to inform about vulnerabilities asap, but as this report was unknown to our checker bot, it was put on hold. The corresponding email is named "Vulnerable CUPS Special Report" which already gives an idea of what the report speaks about. This report does not seem to be documented on Shadowserver's own pages under https://www.shadowserver.org/what-we-do/network-reporting (yet?).

 So, here's a request: could someone who is able to update 

https://interchange.shadowserver.org/intelmq/v1/schema/shadowserver-schema.json

 turn the special report into a more specific feed definition, e.g. the report file name could be "scan_cups" (and "scan6_cups" for IPv6) and the "feed.name" field could be e.g. "Vulnerable-CUPS-Server" or similar? Another option is to create a report of its own for vulnerable CUPS servers and leave "special" as the catch-all alongside.

 Thank you.

Br, Mika

P.S: The usual disclaimer: I hope I have not misunderstood anything in the the aforementioned specs.



More information about the IntelMQ-dev mailing list