When we review overrides and consider discarding old ones it would be very helpful to know if an override currently has matching results.
I note that at least in the interface exposed by python-gvm there is a field in_use, unfortunately it is invariably 0.
Is this field meant for something else or is it just not populated for some reason?
If it is just not populated which part of Greenbone could i open an issue in?
As an example we have this result (as formatted by a locally developed program using python-gvm):
c8abf65a-2ef4-4e05-a8e8-70a0bdc966f2: 5.0/10 [192.0.2.17]:9000/tcp Embedthis GoAhead 2.5.0 HTTP Header Injection Vulnerability - Active Check (CVE-2019-16645)
nvt oid: 1.3.6.1.4.1.25623.1.0.114133
nvt name: Embedthis GoAhead 2.5.0 HTTP Header Injection Vulnerability - Active Check
nvt type: nvt
nvt family: Web Servers
nvt cvss base: 8.6
nvt tags: cvss_base_vector=CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N
summary=Embedthis GoAhead is prone to an HTTP header injection
vulnerability.
insight=For certain pages, Embedthis GoAhead creates links containing a
hostname obtained from an arbitrary HTTP Host header sent by an attacker.
affected=Embedthis GoAhead version 2.5.0 is known to be affected. Other
versions might be affected as well.
impact=An attacker can potentially use this vulnerability in a phishing
attack.
solution=No known solution was made available for at least one year
since the disclosure of this vulnerability. Likely none will be provided anymore. General solution
options are to upgrade to a newer release, disable respective features, remove the product or
replace the product by another one.
vuldetect=Send multiple crafted HTTP POST requests and checks the
responses.
solution_type=WillNotFix
nvt ref cve: CVE-2019-16645
nvt ref url: https://github.com/Ramikan/Vulnerabilities/blob/master/GoAhead%20Web%20server%20HTTP%20Header%20Injection
qod: 99 ()
owner: admin
permissions:
override: Vulnerability on port with very limited access in firewall
active: 1
new severity: 5
user tags: 1
modification_time: 2025-08-18T12:11:51+02:00
comment: None
creation_time: 2025-08-18T12:11:51+02:00
host: 192.0.2.17
port: 9000/tcp
scan_nvt_version: 2024-09-25T07:06:11+02:00
severity: 5.0
description: It was possible to inject a host header and create a manipulated link via a HTTP POST-request to:
URL: http://lm.example.net:9000/
Response(s): Location: http://openvasvt325172539/home.asp
This document has moved to a new <a href="http://openvasvt325172539/home.asp">location</a>.
original_severity: 8.6
And this override (formatted the same way):
77eb9931-869a-4075-87e4-79cfb4c95bc2: Embedthis GoAhead 2.5.0 HTTP Header Injection Vulnerability - Active Check
nvt oid: 1.3.6.1.4.1.25623.1.0.114133
nvt name: Embedthis GoAhead 2.5.0 HTTP Header Injection Vulnerability - Active Check
nvt type: nvt
active: True
applies on
hosts: 192.0.2.17
port: 9000/tcp
minimum severity: any
task: any
result: any
new severity: 5
text: Vulnerability on port with very limited access in firewall
orphan: 0
owner: admin
permissions: Everything
creation_time: 2024-02-20T14:31:45+01:00
modification_time: 2024-11-28T17:00:21+01:00
in_use: 0
(Identifiers changed to protect the guilty.)
Versions of installed components:
- greenbone-feed-sync 25.1.0
- gsa 26.0.0
- gsad 24.5.4
- gvm-libs 22.28.1
- gvmd 26.3.0
- openvas-scanner 23.25.0
- openvas-smb 22.5.10
- ospd-openvas 22.9.0
- pg-gvm 22.6.11
- python-gvm 26.6.0
Best regards
