MicroFocus WebInspect - XML Connector

WebInspect is an automated dynamic testing tool that mimics real-world hacking techniques and attacks, and provides comprehensive dynamic analysis of complex web applications and services. WebInspect operates within the Dynamic Application Security Testing (DAST) side of Application Security.

To import your data from WebInspect to the Application Security Module, you will need to leverage the MicroFocus WebInspect Connector under the Dynamic Assessment section of the Cisco Vulnerability Management UI,

Prerequisites

  • Given that the Cisco Vulnerability Management's WebInspect Connector is a file-based connector, the only prerequisite is that you have access to export data from your WebInspect deployment in XML format.
    • Current WebInspect users should do the following:
      Manage Scans > Select Scan > Open > File > Export > Scan Details > Set 'Details' to 'Full' > Export
  • You must be a Cisco Vulnerability Management Administrator.

Important: WebInspect XML exports have previously been submitted with invalid formatting. If your XML Connector is failing due to formatting, you can use the `xmllint` tool to format the XML properly. Otherwise CDATA sections will overtake the data we are expected to parse.

Configuring your WebInspect Connector in Cisco Vulnerability Management

1. In the Cisco Vulnerability Management UI, click Connectors.
2. Click Add Connector.
3. In the Dynamic Assessment section, click MicroFocus WebInspect.

MicroFocus-WebInspect.png

4. On the WebInspect page, enter the following information:

MicroFocus-WebInspect-2.png

  • Name: Enter a name for the connector, or leave it as "WebInspect".

  • Asset Inactivity Limit (days): Enter a time in days for the connector level asset inactivity limit. Cisco recommends 2-3 times the scan cadence of your scans).
    • Note: Connector-level asset inactivity limits take precedence over the global inactivity limit. If you do not set an Asset Inactivity Limit, the Global Limit will apply to data ingested by this connector. See Setting Asset Inactivity Limits

5. Click Save.

6. To run the Connector, upload the WebInspect file on your local machine to the Connector (or drag-and-drop the file). The connector will start processing data and a loading bar will appear.

 

What WebInspect Items does Cisco Vulnerability Management Import?

Fields in WebInspect

Fields in Cisco Vulnerability Management

Note

<host>

Application Identifier

Search for application_identifer in Cisco Vulnerability Management by using the custom query box and typing application:""

<url>

URL

 

name

Vulnerability Name

 

 

vulnerability Status

We do not map false positives, all vulnerabilities imported are default “open” unless they are not reported in a subsequent scan, in which case the platform auto-closes the vuln.

issue_id

scanner_id

 

severity

scanner_score

ScannerScore (0-4)
0 → 0

1 → 25

2 → 50

3 → 75

4 → 100
ScannerScore (0-100)
1 → 1 mapping

 

CWE

mapped based on identifier

“first” start_time

Found On
first_found_on
vulnerability_found
finding_found

The report does not pass specific “seen” times, so we utilize the first time the vulnerability is reported in the scan, and that scan time as the time at which the vulnerability or finding was first seen.

start_time

last_seen_time
vulnerability_last_seen

The report does not pass specific “seen” times, so we utilize the scan time as the time at which the vulnerability or finding was seen.

Sections > summary + implication + execution + reference

Description

 

-N/A-

Tags

No tags are presented in the XML report. As a result, no tags are imported.

 

Optional Settings

The following settings can be enabled on the backend for WebInspect Connectors. To have these settings enabled, or for more information, contact Cisco Support, or your Customer Success Engineer.

Exclude Informationals

When you enable this option, Cisco Vulnerability Management will only import vulnerabilities that include a CVE, CWE, or WASC ID.

Ignore Scanner Last Seen Time

Select this setting if you do not want the asset last seen time in Cisco Vulnerability Management to be the scanner reported last seen time.

Custom Ordered Locators

Locators (such as IP, Netbios, and FQDN) can be reordered to better deduplicate vulnerabilities on the Connector level or the entire Platform level. For more information, see the help article here.

Additional Assistance

Contact Cisco Support if you require any additional assistance with the WebInspect  Connector.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment.