dradis-acunetix 3.6.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -0,0 +1,74 @@
1
+ require "spec_helper"
2
+
3
+ describe Acunetix::Scan do
4
+
5
+ before do
6
+ path = "../../../fixtures/files/simple.acunetix.xml"
7
+ raw_xml = File.read(File.expand_path(path, __FILE__))
8
+ @xml = Nokogiri::XML(raw_xml)
9
+ @scan = described_class.new(@xml.at_xpath("./ScanGroup/Scan"))
10
+ end
11
+
12
+ describe "#respond_to?" do
13
+ it "returns true for supported tags" do
14
+ Acunetix::Scan::SUPPORTED_TAGS.each do |tag|
15
+ expect(@scan).to respond_to(tag)
16
+ end
17
+ end
18
+ end
19
+
20
+ describe "creating a Scan object with the wrong XML element" do
21
+ it "raises an error" do
22
+ expect{ described_class.new(@xml) }.to raise_error
23
+ end
24
+ end
25
+
26
+ describe "tag methods" do
27
+ it "returns the text of the tag" do
28
+ expect(@scan.name).to eq "Scan Thread 1 ( http://testphp.vulnweb.com:80/ )"
29
+ end
30
+
31
+ it "handles tag names with acronyms correctly" do
32
+ expect(@scan.start_url).to eq "http://testphp.vulnweb.com:80/"
33
+ end
34
+ end
35
+
36
+ describe "#start_url_host" do
37
+ it "returns the 'host' part of the <StartUrl> tag" do
38
+ expect(@scan.start_url_host).to eq "testphp.vulnweb.com"
39
+ end
40
+ end
41
+
42
+
43
+ describe "#start_url_port" do
44
+ it "returns the 'port' part of the <StartUrl> tag" do
45
+ expect(@scan.start_url_port).to eq 80
46
+ end
47
+ end
48
+
49
+
50
+ describe "#hostname" do
51
+ it "is an alias for 'start_url_host'" do
52
+ expect(@scan.hostname).not_to be_nil
53
+ expect(@scan.hostname).to eq @scan.start_url_host
54
+ end
55
+ end
56
+
57
+ describe "#service" do
58
+ it "returns banner info and port number" do
59
+ expect(@scan.service).to eq "port 80, nginx/1.4.1"
60
+ end
61
+ end
62
+
63
+
64
+ describe "#report_items" do
65
+ it "returns the XML <ReportItem> tags" do
66
+ result = @scan.report_items
67
+ expect(result).to be_a(Nokogiri::XML::NodeSet)
68
+ result.each do |item|
69
+ expect(item.name).to eq "ReportItem"
70
+ end
71
+ end
72
+ end
73
+
74
+ end
@@ -0,0 +1,10 @@
1
+ require 'rubygems'
2
+ require 'bundler/setup'
3
+ require 'nokogiri'
4
+
5
+ require 'combustion'
6
+
7
+ Combustion.initialize!
8
+
9
+ RSpec.configure do |config|
10
+ end
@@ -0,0 +1,7 @@
1
+ evidence.details
2
+ evidence.affects
3
+ evidence.parameter
4
+ evidence.aop_source_file
5
+ evidence.aop_source_line
6
+ evidence.aop_additional
7
+ evidence.is_false_positive
@@ -0,0 +1,12 @@
1
+ <?xml version="1.0"?>
2
+ <ReportItem id="32" color="red">
3
+ <Name><![CDATA[Cross site scripting (verified)]]></Name>
4
+ <ModuleName><![CDATA[Scripting (XSS.script)]]></ModuleName>
5
+ <Details><![CDATA[URL encoded GET input <b><font color="dark">p</font></b> was set to <b><font color="dark">1'&quot;()&amp;%&lt;ScRiPt &gt;prompt(951846)&lt;/ScRiPt&gt;</font></b>]]></Details>
6
+ <Affects><![CDATA[/hpp/params.php]]></Affects>
7
+ <Parameter><![CDATA[p]]></Parameter>
8
+ <AOP_SourceFile><![CDATA[]]></AOP_SourceFile>
9
+ <AOP_SourceLine>0</AOP_SourceLine>
10
+ <AOP_Additional><![CDATA[]]></AOP_Additional>
11
+ <IsFalsePositive><![CDATA[False]]></IsFalsePositive>
12
+ </ReportItem>
@@ -0,0 +1,16 @@
1
+ #[Details]#
2
+ %evidence.details%
3
+
4
+
5
+ #[Affects]#
6
+ |_. Location |_. Parameter |
7
+ | %evidence.affects% | %evidence.parameter% |
8
+
9
+
10
+ #[AOP]#
11
+ |_. File |_. Line |_. Additional |
12
+ | %evidence.aop_source_file% | %evidence.aop_source_line% | %evidence.aop_additional% |
13
+
14
+
15
+ #[FalsePositive]#
16
+ %evidence.is_false_positive%
@@ -0,0 +1,18 @@
1
+ report_item.name
2
+ report_item.module_name
3
+ report_item.severity
4
+ report_item.type
5
+ report_item.impact
6
+ report_item.description
7
+ report_item.detailed_information
8
+ report_item.recommendation
9
+ report_item.request
10
+ report_item.response
11
+ report_item.cvss_descriptor
12
+ report_item.cvss_score
13
+ report_item.cvss3_descriptor
14
+ report_item.cvss3_score
15
+ report_item.cvss3_tempscore
16
+ report_item.cvss3_envscore
17
+ report_item.cve_list
18
+ report_item.references
@@ -0,0 +1,151 @@
1
+ <?xml version="1.0"?>
2
+ <ReportItem id="32" color="red">
3
+ <Name><![CDATA[Cross site scripting (verified)]]></Name>
4
+ <ModuleName><![CDATA[Scripting (XSS.script)]]></ModuleName>
5
+ <Details><![CDATA[URL encoded GET input <b><font color="dark">p</font></b> was set to <b><font color="dark">1'&quot;()&amp;%&lt;ScRiPt &gt;prompt(951846)&lt;/ScRiPt&gt;</font></b>]]></Details>
6
+ <Affects><![CDATA[/hpp/params.php]]></Affects>
7
+ <Parameter><![CDATA[p]]></Parameter>
8
+ <AOP_SourceFile><![CDATA[]]></AOP_SourceFile>
9
+ <AOP_SourceLine>0</AOP_SourceLine>
10
+ <AOP_Additional><![CDATA[]]></AOP_Additional>
11
+ <IsFalsePositive><![CDATA[False]]></IsFalsePositive>
12
+ <Severity><![CDATA[high]]></Severity>
13
+ <Type><![CDATA[Validation]]></Type>
14
+ <Impact><![CDATA[Malicious users may inject JavaScript, VBScript, ActiveX, HTML or Flash into a vulnerable application to fool a user in order to gather data from them.
15
+ An attacker can steal the session cookie and take over the account, impersonating the user.
16
+ It is also possible to modify the content of the page presented to the user.
17
+ ]]></Impact>
18
+ <Description><![CDATA[This script is possibly vulnerable to Cross Site Scripting (XSS) attacks.<br/><br/>
19
+ Cross site scripting (also referred to as XSS) is a vulnerability that allows an attacker to send malicious code (usually in the form of Javascript) to another user.
20
+ Because a browser cannot know if the script should be trusted or not, it will execute the script in the user context allowing the attacker to access any cookies or session tokens retained by the browser. ]]></Description>
21
+ <DetailedInformation><![CDATA[<i>Quote from The Cross Site Scripting FAQ - http://www.cgisecurity.com/articles/xss-faq.shtml</i>
22
+
23
+ <h2>Introduction</h2>
24
+
25
+ <p>Websites today are more complex than ever, containing a lot of dynamic content making the experience for the user more enjoyable. Dynamic content is achieved through the use of web applications which can deliver different output to a user depending on their settings and needs. Dynamic websites suffer from a threat that static websites don't, called &quot;Cross Site Scripting&quot; (or XSS dubbed by other security professionals). Currently small informational tidbits about Cross Site Scripting holes exist but none really explain them to an average person or administrator. This FAQ was written to provide a better understanding of this emerging threat, and to give guidance on detection and prevention.</p>
26
+
27
+ <h2>&quot;What is Cross Site Scripting?&quot;</h2>
28
+
29
+ <p>Cross site scripting (also known as XSS) occurs when a web application gathers malicious data from a user. The data is usually gathered in the form of a hyperlink which contains malicious content within it. The user will most likely click on this link from another website, instant message, or simply just reading a web board or email message. Usually the attacker will encode the malicious portion of the link to the site in HEX (or other encoding methods) so the request is less suspicious looking to the user when clicked on. After the data is collected by the web application, it creates an output page for the user containing the malicious data that was originally sent to it, but in a manner to make it appear as valid content from the website. Many popular guestbook and forum programs allow users to submit posts with html and javascript embedded in them. If for example I was logged in as &quot;john&quot; and read a message by &quot;joe&quot; that contained malicious javascript in it, then it may be possible for &quot;joe&quot; to hijack my session just by reading his bulletin board post. Further details on how attacks like this are accomplished via &quot;cookie theft&quot; are explained in detail below.</p>
30
+
31
+ <h2>&quot;What does XSS and CSS mean?&quot;</h2>
32
+
33
+ <p>Often people refer to Cross Site Scripting as CSS. There has been a lot of confusion with Cascading Style Sheets (CSS) and cross site scripting. Some security people refer to Cross Site Scripting as XSS. If you hear someone say &quot;I found a XSS hole&quot;, they are talking about Cross Site Scripting for certain.</p>
34
+
35
+
36
+ <h2>&quot;What are the threats of Cross Site Scripting?&quot;</h2>
37
+
38
+ <p>Often attackers will inject JavaScript, VBScript, ActiveX, HTML, or Flash into a vulnerable application to fool a user (Read below for further details) in order to gather data from them. Everything from account hijacking, changing of user settings, cookie theft/poisoning, or false advertising is possible. New malicious uses are being found every day for XSS attacks. The post below by Brett Moore brings up a good point with regard to &quot;Denial Of Service&quot;, and potential &quot;auto-attacking&quot; of hosts if a user simply reads a post on a message board.</p>
39
+
40
+ <h2>&quot;What can I do to protect myself as a vendor?&quot;</h2>
41
+
42
+ <p>This is a simple answer. Never trust user input and always filter metacharacters. This will eliminate the majority of XSS attacks. Converting &lt; and &gt; to &amp;lt; and &amp;gt; is also suggested when it comes to script output. Remember XSS holes can be damaging and costly to your business if abused. Often attackers will disclose these holes to the public, which can erode customer and public confidence in the security and privacy of your organization's site. Filtering &lt; and &gt; alone will not solve all cross site scripting attacks and it is suggested you also attempt to filter out ( and ) by translating them to &amp;#40; and &amp;#41;, and also # and &amp; by translating them to &amp;#35 (#) and &amp;#38 (&amp;).</p>
43
+
44
+ <h2>&quot;What can I do to protect myself as a user?&quot;</h2>
45
+
46
+ <p>The easiest way to protect yourself as a user is to only follow links from the main website you wish to view. If you visit one website and it links to CNN for example, instead of clicking on it visit CNN's main site and use its search engine to find the content. This will probably eliminate ninety percent of the problem. Sometimes XSS can be executed automatically when you open an email, email attachment, read a guestbook, or bulletin board post. If you plan on opening an email, or reading a post on a public board from a person you don't know BE CAREFUL. One of the best ways to protect yourself is to turn off Javascript in your browser settings. In IE turn your security settings to high. This can prevent cookie theft, and in general is a safer thing to do.</p>
47
+
48
+ <h2>&quot;How common are XSS holes?&quot;</h2>
49
+
50
+ <p>Cross site scripting holes are gaining popularity among hackers as easy holes to find in large websites. Websites from FBI.gov, CNN.com, Time.com, Ebay, Yahoo, Apple computer, Microsoft, Zdnet, Wired, and Newsbytes have all had one form or another of XSS bugs.</p>
51
+
52
+ <p>Every month roughly 10-25 XSS holes are found in commercial products and advisories are published explaining the threat.</p>
53
+
54
+
55
+ <h2>&quot;Does encryption protect me?&quot;</h2>
56
+
57
+ <p>Websites that use SSL (https) are in no way more protected than websites that are not encrypted. The web applications work the same way as before, except the attack is taking place in an encrypted connection. People often think that because they see the lock on their browser it means everything is secure. This just isn't the case.</p>
58
+
59
+
60
+ <h2>&quot;Can XSS holes allow command execution?&quot;</h2>
61
+
62
+ <p>XSS holes can allow Javascript insertion, which may allow for limited execution. If an attacker were to exploit a browser flaw (browser hole) it could then be possible to execute commands on the client's side. If command execution were possible it would only be possible on the client side. In simple terms XSS holes can be used to help exploit other holes that may exist in your browser.</p>
63
+
64
+
65
+ <h2>&quot;What if I don't feel like fixing a CSS/XSS Hole?&quot;</h2>
66
+
67
+ <p>By not fixing an XSS hole this could allow possible user account compromise in portions of your site as they get added or updated. Cross Site Scripting has been found in various large sites recently and have been widely publicized. Left unrepaired, someone may discover it and publish a warning about your company. This may damage your company's reputation, depicting it as being lax on security matters. This of course also sends the message to your clients that you aren't dealing with every problem that arises, which turns into a trust issue. If your client doesn't trust you why would they wish to do business with you?</p>]]></DetailedInformation>
68
+ <Recommendation><![CDATA[Your script should filter metacharacters from user input.]]></Recommendation>
69
+ <TechnicalDetails>
70
+ <Request><![CDATA[GET /hpp/params.php?p=1'%22()%26%25&lt;ScRiPt%20&gt;prompt(951846)&lt;/ScRiPt&gt;&amp;pp=1 HTTP/1.1
71
+ Referer: http://testphp.vulnweb.com:80/
72
+ Host: testphp.vulnweb.com
73
+ Connection: Keep-alive
74
+ Accept-Encoding: gzip,deflate
75
+ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/28.0.1500.63 Safari/537.36
76
+ Accept: */*
77
+
78
+ ]]></Request>
79
+ <Response><![CDATA[HTTP/1.1 200 OK
80
+ Server: nginx/1.4.1
81
+ Date: Tue, 07 Oct 2014 17:30:28 GMT
82
+ Content-Type: text/html
83
+ Connection: keep-alive
84
+ X-Powered-By: PHP/5.3.10-1~lucid+2uwsgi2
85
+ Original-Content-Encoding: gzip
86
+ Content-Length: 40
87
+ ]]></Response>
88
+ </TechnicalDetails>
89
+ <CWE id="79"><![CDATA[CWE-79]]></CWE>
90
+ <CVEList/>
91
+ <CVSS>
92
+ <Descriptor><![CDATA[AV:N/AC:M/Au:N/C:N/I:P/A:N]]></Descriptor>
93
+ <Score><![CDATA[4.4]]></Score>
94
+ <AV><![CDATA[Network]]></AV>
95
+ <AVdesc><![CDATA[A vulnerability exploitable with network access means the vulnerable software is bound to the network stack and the attacker does not require local network access or local access.]]></AVdesc>
96
+ <AC><![CDATA[Medium]]></AC>
97
+ <ACdesc><![CDATA[The access conditions are somewhat specialized.]]></ACdesc>
98
+ <Au><![CDATA[None]]></Au>
99
+ <Audesc><![CDATA[Authentication is not required to exploit the vulnerability.]]></Audesc>
100
+ <C><![CDATA[None]]></C>
101
+ <Cdesc><![CDATA[There is no impact to the confidentiality of the system.]]></Cdesc>
102
+ <I><![CDATA[Partial]]></I>
103
+ <Idesc><![CDATA[Modification of some system files or information is possible, but the attacker does not have control over what can be modified, or the scope of what the attacker can affect is limited.]]></Idesc>
104
+ <A><![CDATA[None]]></A>
105
+ <Adesc><![CDATA[There is no impact to the availability of the system.]]></Adesc>
106
+ <E><![CDATA[]]></E>
107
+ <Edesc><![CDATA[]]></Edesc>
108
+ <RL><![CDATA[]]></RL>
109
+ <RLdesc><![CDATA[]]></RLdesc>
110
+ <RC><![CDATA[]]></RC>
111
+ <RCdesc><![CDATA[]]></RCdesc>
112
+ </CVSS>
113
+ <References>
114
+ <Reference>
115
+ <Database><![CDATA[Acunetix Cross Site Scripting Attack]]></Database>
116
+ <URL><![CDATA[http://www.acunetix.com/websitesecurity/cross-site-scripting.htm]]></URL>
117
+ </Reference>
118
+ <Reference>
119
+ <Database><![CDATA[VIDEO: How Cross-Site Scripting (XSS) Works]]></Database>
120
+ <URL><![CDATA[http://www.acunetix.com/blog/web-security-zone/video-how-cross-site-scripting-xss-works/]]></URL>
121
+ </Reference>
122
+ <Reference>
123
+ <Database><![CDATA[The Cross Site Scripting Faq]]></Database>
124
+ <URL><![CDATA[http://www.cgisecurity.com/xss-faq.html]]></URL>
125
+ </Reference>
126
+ <Reference>
127
+ <Database><![CDATA[OWASP Cross Site Scripting]]></Database>
128
+ <URL><![CDATA[http://www.owasp.org/index.php/Cross_Site_Scripting]]></URL>
129
+ </Reference>
130
+ <Reference>
131
+ <Database><![CDATA[XSS Annihilation]]></Database>
132
+ <URL><![CDATA[http://ha.ckers.org/blog/20060602/xss-annihilation/]]></URL>
133
+ </Reference>
134
+ <Reference>
135
+ <Database><![CDATA[XSS Filter Evasion Cheat Sheet]]></Database>
136
+ <URL><![CDATA[https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet]]></URL>
137
+ </Reference>
138
+ <Reference>
139
+ <Database><![CDATA[Cross site scripting]]></Database>
140
+ <URL><![CDATA[http://en.wikipedia.org/wiki/Cross-site_scripting ]]></URL>
141
+ </Reference>
142
+ <Reference>
143
+ <Database><![CDATA[OWASP PHP Top 5]]></Database>
144
+ <URL><![CDATA[http://www.owasp.org/index.php/PHP_Top_5]]></URL>
145
+ </Reference>
146
+ <Reference>
147
+ <Database><![CDATA[How To: Prevent Cross-Site Scripting in ASP.NET]]></Database>
148
+ <URL><![CDATA[http://msdn.microsoft.com/en-us/library/ms998274.aspx]]></URL>
149
+ </Reference>
150
+ </References>
151
+ </ReportItem>
@@ -0,0 +1,59 @@
1
+ #[Title]#
2
+ %report_item.name%
3
+
4
+
5
+ #[Severity]#
6
+ %report_item.severity%
7
+
8
+
9
+ #[Type]#
10
+ %report_item.type%
11
+
12
+
13
+ #[Impact]#
14
+ %report_item.impact%
15
+
16
+
17
+ #[Description]#
18
+ %report_item.description%
19
+
20
+
21
+ #[DetailedInformation]#
22
+ %report_item.detailed_information%
23
+
24
+
25
+ #[Recommendation]#
26
+ %report_item.recommendation%
27
+
28
+
29
+ #[CVSSVector]#
30
+ %report_item.cvss_descriptor%
31
+
32
+
33
+ #[CVSSScore]#
34
+ %report_item.cvss_score%
35
+
36
+
37
+ #[CVSS3Vector]#
38
+ %report_item.cvss3_descriptor%
39
+
40
+
41
+ #[CVSS3Score]#
42
+ %report_item.cvss3_score%
43
+
44
+
45
+ #[CVSS3TempScore]#
46
+ %report_item.cvss3_tempscore%
47
+
48
+
49
+ #[CVSS3EnvScore]#
50
+ %report_item.cvss3_envscore%
51
+
52
+
53
+ #[CVEList]#
54
+ %report_item.cve_list%
55
+
56
+
57
+ #[References]#
58
+ %report_item.references%
59
+
@@ -0,0 +1,12 @@
1
+ scan.name
2
+ scan.short_name
3
+ scan.start_url
4
+ scan.start_time
5
+ scan.finish_time
6
+ scan.scan_time
7
+ scan.aborted
8
+ scan.responsive
9
+ scan.banner
10
+ scan.os
11
+ scan.web_server
12
+ scan.technologies
@@ -0,0 +1,15 @@
1
+ <?xml version="1.0"?>
2
+ <Scan>
3
+ <Name><![CDATA[Scan Thread 1 ( http://testphp.vulnweb.com:80/ )]]></Name>
4
+ <ShortName><![CDATA[Scan Thread 1]]></ShortName>
5
+ <StartURL><![CDATA[http://testphp.vulnweb.com:80/]]></StartURL>
6
+ <StartTime><![CDATA[7/10/2014, 11:56:03]]></StartTime>
7
+ <FinishTime><![CDATA[7/10/2014, 15:20:55]]></FinishTime>
8
+ <ScanTime><![CDATA[3 hours, 24 minutes]]></ScanTime>
9
+ <Aborted><![CDATA[False]]></Aborted>
10
+ <Responsive><![CDATA[True]]></Responsive>
11
+ <Banner><![CDATA[nginx/1.4.1]]></Banner>
12
+ <Os><![CDATA[Unknown]]></Os>
13
+ <WebServer><![CDATA[nginx]]></WebServer>
14
+ <Technologies><![CDATA[PHP]]></Technologies>
15
+ </Scan>
@@ -0,0 +1,16 @@
1
+ #[Title]#
2
+ Acunetix scanner notes (%scan.start_time%)
3
+
4
+ #[ScanName]#
5
+ %scan.name%
6
+
7
+ #[StartURL]#
8
+ %scan.start_url%
9
+
10
+ #[TimeAndFlags]#
11
+ |_. Start |_. Finish |_. Total |_. Aborted |_. Responsive |
12
+ | %scan.start_time% | %scan.finish_time% | %scan.scan_time% | %scan.aborted% | %scan.responsive% |
13
+
14
+ #[Fingerprint]#
15
+ |_. Banner |_. OS |_. Web server |_. Technologies |
16
+ | %scan.banner% | %scan.os% | %scan.web_server% | %scan.technologies% |
metadata ADDED
@@ -0,0 +1,171 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: dradis-acunetix
3
+ version: !ruby/object:Gem::Version
4
+ version: 3.6.0
5
+ platform: ruby
6
+ authors:
7
+ - Daniel Martin
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2017-04-06 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: dradis-plugins
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '3.6'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '3.6'
27
+ - !ruby/object:Gem::Dependency
28
+ name: nokogiri
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.3'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.3'
41
+ - !ruby/object:Gem::Dependency
42
+ name: bundler
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - "~>"
46
+ - !ruby/object:Gem::Version
47
+ version: '1.6'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - "~>"
53
+ - !ruby/object:Gem::Version
54
+ version: '1.6'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rake
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '10.0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '10.0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rspec-rails
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - ">="
81
+ - !ruby/object:Gem::Version
82
+ version: '0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: combustion
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: 0.5.2
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: 0.5.2
97
+ description: This add-on allows you to upload and parse output produced from Acunetix
98
+ Web Vulnerability Scanner into Dradis.
99
+ email:
100
+ - etd@nomejortu.com
101
+ executables: []
102
+ extensions: []
103
+ extra_rdoc_files: []
104
+ files:
105
+ - ".gitignore"
106
+ - ".rspec"
107
+ - CHANGELOG.md
108
+ - CONTRIBUTING.md
109
+ - Gemfile
110
+ - LICENSE
111
+ - README.md
112
+ - Rakefile
113
+ - dradis-acunetix.gemspec
114
+ - lib/acunetix/report_item.rb
115
+ - lib/acunetix/scan.rb
116
+ - lib/dradis-acunetix.rb
117
+ - lib/dradis/plugins/acunetix.rb
118
+ - lib/dradis/plugins/acunetix/engine.rb
119
+ - lib/dradis/plugins/acunetix/field_processor.rb
120
+ - lib/dradis/plugins/acunetix/gem_version.rb
121
+ - lib/dradis/plugins/acunetix/importer.rb
122
+ - lib/dradis/plugins/acunetix/version.rb
123
+ - lib/tasks/thorfile.rb
124
+ - spec/dradis-acunetix_spec.rb
125
+ - spec/fixtures/files/code-pre.acunetix.xml
126
+ - spec/fixtures/files/commas-format.acunetix.xml
127
+ - spec/fixtures/files/simple.acunetix.xml
128
+ - spec/fixtures/files/testphp.vulnweb.com.export.acunetix.xml
129
+ - spec/models/acunetix/scan_spec.rb
130
+ - spec/spec_helper.rb
131
+ - templates/evidence.fields
132
+ - templates/evidence.sample
133
+ - templates/evidence.template
134
+ - templates/report_item.fields
135
+ - templates/report_item.sample
136
+ - templates/report_item.template
137
+ - templates/scan.fields
138
+ - templates/scan.sample
139
+ - templates/scan.template
140
+ homepage: http://dradisframework.org
141
+ licenses:
142
+ - GPL-2
143
+ metadata: {}
144
+ post_install_message:
145
+ rdoc_options: []
146
+ require_paths:
147
+ - lib
148
+ required_ruby_version: !ruby/object:Gem::Requirement
149
+ requirements:
150
+ - - ">="
151
+ - !ruby/object:Gem::Version
152
+ version: '0'
153
+ required_rubygems_version: !ruby/object:Gem::Requirement
154
+ requirements:
155
+ - - ">="
156
+ - !ruby/object:Gem::Version
157
+ version: '0'
158
+ requirements: []
159
+ rubyforge_project:
160
+ rubygems_version: 2.4.5
161
+ signing_key:
162
+ specification_version: 4
163
+ summary: Acunetix add-on for the Dradis Framework.
164
+ test_files:
165
+ - spec/dradis-acunetix_spec.rb
166
+ - spec/fixtures/files/code-pre.acunetix.xml
167
+ - spec/fixtures/files/commas-format.acunetix.xml
168
+ - spec/fixtures/files/simple.acunetix.xml
169
+ - spec/fixtures/files/testphp.vulnweb.com.export.acunetix.xml
170
+ - spec/models/acunetix/scan_spec.rb
171
+ - spec/spec_helper.rb