From 42bc3958e26cf6778ba52c476795b7d05be58ce8 Mon Sep 17 00:00:00 2001 From: Nico Golde Date: Fri, 6 Jun 2008 13:36:21 +0000 Subject: NFUs git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@8997 e39458fd-73e7-0310-bf30-c45bca0a0e42 --- bin/report-vuln | 29 +++++++++++++++++++++-------- 1 file changed, 21 insertions(+), 8 deletions(-) (limited to 'bin/report-vuln') diff --git a/bin/report-vuln b/bin/report-vuln index fb42e7713f..7f2b0db8c4 100755 --- a/bin/report-vuln +++ b/bin/report-vuln @@ -11,8 +11,9 @@ # mutt -i $TMPFILE submit@bugs.debian.org # rm $TMPFILE # } +# export http_proxy if you need to use an http proxy to report bugs -import sys, re, httplib +import sys, re, httplib, os def gen_index(ids): ret = '' @@ -22,18 +23,30 @@ def gen_index(ids): return ret +def do_httpconnect(id): + proxy = os.getenv('http_proxy').lstrip('http://') + url = '/cgi-bin/cvename.cgi?name=' + id + host = 'cve.mitre.org' + if proxy != None: + host = proxy + url = 'http://cve.mitre.org' + url + + try: + conn = httplib.HTTPConnection(host) + conn.request('GET', url) + resp = conn.getresponse() + except Exception, e: + error('on doing HTTP request' + str(e)) + + return resp + # this is a hack that parses the cve id description from mitre def get_cve(id): desc = False r = re.compile('.*Description<.*') tag = re.compile('.*.*') - try: - conn = httplib.HTTPConnection('cve.mitre.org') - conn.request('GET', '/cgi-bin/cvename.cgi?name=' + id) - resp = conn.getresponse() - ret = '' - except Exception, e: - error('on doing HTTP request' + str(e)) + ret = '' + resp = do_httpconnect(id) for line in resp.read().rsplit('\n'): if r.match(line): -- cgit v1.2.3