Filter out patched CVEs from CSV report files, including FedRamp reports, using ePortal data. https://docs.tuxcare.com/eportal-api/#list-servers
usage: cve-filter.py [-h] --columns COLUMNS [--multi-cve-separator MULTI_CVE_SEPARATOR] (--eportal-url EPORTAL_URL | --eportal-report-file EPORTAL_REPORT_FILE) --csv-file-in CSV_FILE_IN [--csv-file-out CSV_FILE_OUT]Show this help message and exit.
Columns in CSV file: hostname,ip,cve. Start with 1. Use 0 for ip if the column is not present.
Separator if the CVE column can contain multiple CVEs.
URL to ePortal. Set EPORTAL_LOGIN and EPORTAL_PASSWORD environment variables.
File containing the output of the servers endpoint. ePortal API Documentation
Input CSV filename.
Output CSV filename. If missing, the CSV is printed to stdout.
Use column 1 for hostname, 2 for IP and 4 for CVEs. Use comma as CVE separator. Use ePortal report file. Write output to bla.csv.
$ python cve-filter.py --columns=1,2,4 --multi-cve-separator=, --eportal-report-file=servers.json --csv-file-in=testreport.csv --csv-file-out=bla.csv$ python cve-filter.py --columns=1,2,4 --multi-cve-separator=, --eportal-report-file=servers.json --csv-file-in=testreport.csv$ python cve-filter.py --columns=1,0,4 --eportal-report-file=servers.json --csv-file-in=testreport.csv$ EPORTAL_LOGIN=admin EPORTAL_PASSWORD=AdminPassword python cve-filter.py --columns=1,0,4 --eportal-url=https://eportal_url --csv-file-in=testreport.csvApache License 2.0 Copyright 2023 Cloud Linux Software, Inc.