dradis-burp 3.18.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (41) hide show
  1. checksums.yaml +7 -0
  2. data/.github/issue_template.md +16 -0
  3. data/.github/pull_request_template.md +36 -0
  4. data/.gitignore +10 -0
  5. data/.rspec +2 -0
  6. data/CHANGELOG.md +57 -0
  7. data/CONTRIBUTING.md +3 -0
  8. data/Gemfile +23 -0
  9. data/LICENSE +339 -0
  10. data/README.md +29 -0
  11. data/Rakefile +1 -0
  12. data/dradis-burp.gemspec +34 -0
  13. data/lib/burp/html/issue.rb +157 -0
  14. data/lib/burp/issue.rb +43 -0
  15. data/lib/burp/xml/issue.rb +127 -0
  16. data/lib/dradis-burp.rb +10 -0
  17. data/lib/dradis/plugins/burp.rb +12 -0
  18. data/lib/dradis/plugins/burp/engine.rb +25 -0
  19. data/lib/dradis/plugins/burp/field_processor.rb +27 -0
  20. data/lib/dradis/plugins/burp/gem_version.rb +19 -0
  21. data/lib/dradis/plugins/burp/html/importer.rb +144 -0
  22. data/lib/dradis/plugins/burp/version.rb +13 -0
  23. data/lib/dradis/plugins/burp/xml/importer.rb +144 -0
  24. data/lib/tasks/thorfile.rb +30 -0
  25. data/spec/burp_upload_spec.rb +220 -0
  26. data/spec/fixtures/files/burp.html +229 -0
  27. data/spec/fixtures/files/burp.xml +100 -0
  28. data/spec/fixtures/files/burp_issue_severity.xml +118 -0
  29. data/spec/fixtures/files/invalid-utf-issue.xml +21 -0
  30. data/spec/fixtures/files/without-base64.xml +709 -0
  31. data/spec/spec_helper.rb +9 -0
  32. data/templates/evidence.fields +8 -0
  33. data/templates/evidence.sample +76 -0
  34. data/templates/evidence.template +20 -0
  35. data/templates/html_evidence.fields +13 -0
  36. data/templates/html_evidence.sample +36 -0
  37. data/templates/html_evidence.template +50 -0
  38. data/templates/issue.fields +8 -0
  39. data/templates/issue.sample +23 -0
  40. data/templates/issue.template +30 -0
  41. metadata +174 -0
@@ -0,0 +1,9 @@
1
+ require 'rubygems'
2
+ require 'bundler/setup'
3
+ require 'nokogiri'
4
+ require 'combustion'
5
+
6
+ Combustion.initialize!
7
+
8
+ RSpec.configure do |config|
9
+ end
@@ -0,0 +1,8 @@
1
+ issue.host
2
+ issue.path
3
+ issue.location
4
+ issue.severity
5
+ issue.confidence
6
+ issue.request
7
+ issue.response
8
+ issue.detail
@@ -0,0 +1,76 @@
1
+ <issue>
2
+ <serialNumber>5236964506139299840</serialNumber>
3
+ <type>6291712</type>
4
+ <name>Directory listing</name>
5
+ <host ip="10.0.0.1">http://wiki.local</host>
6
+ <path><![CDATA[/crmmanager/]]></path>
7
+ <location><![CDATA[/crmmanager/]]></location>
8
+ <severity>Information</severity>
9
+ <confidence>Firm</confidence>
10
+ <issueBackground><![CDATA[Directory listings do not necessarily constitute a security vulnerability. Any sensitive resources within your web root should be properly access-controlled in any case, and should not be accessible by an unauthorized party who happens to know the URL. Nevertheless, directory listings can aid an attacker by enabling them to quickly identify the resources at a given path, and proceed directly to analyzing and attacking them.]]></issueBackground>
11
+ <remediationBackground><![CDATA[There is not usually any good reason to provide directory listings, and disabling them may place additional hurdles in the path of an attacker. This can normally be achieved in two ways:<ul><li>Configure your web server to prevent directory listings for all paths beneath the web root; </li><li>Place into each directory a default file (such as index.htm) which the web server will display instead of returning a directory listing.</li></ul>]]></remediationBackground>
12
+ <requestresponse>
13
+ <request base64="false"><![CDATA[GET /crmmanager/ HTTP/1.1
14
+ Host: wiki.local
15
+ User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
16
+ Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
17
+ Accept-Language: en-US,en;q=0.5
18
+ Accept-Encoding: gzip, deflate
19
+ DNT: 1
20
+ Proxy-Connection: keep-alive
21
+ Referer: http://wiki.local/
22
+ Cookie: JSESSIONID=e2ff342b-f981-4ec0-9d55-f5b13dfe269c
23
+
24
+ ]]></request>
25
+ <response base64="false"><![CDATA[HTTP/1.1 200 OK
26
+ Date: Wed, 02 Jan 2013 15:10:59 GMT
27
+ Content-Type: text/html
28
+ Last-Modified: Fri, 19 Nov 2010 09:36:13 GMT
29
+ Date: Wed, 02 Jan 2013 15:10:59 GMT
30
+ Vary: Accept-Charset, Accept-Encoding, Accept-Language, Accept
31
+ Server: Apache
32
+ Content-Length: 2447
33
+
34
+ <!--
35
+
36
+ lots of crazy stuff
37
+ -->
38
+ <html>
39
+ <head>
40
+ <title>Index of /crmmanager/</title>
41
+ </head>
42
+ <body>
43
+ <h1>Index of /crmmanager/</h1>
44
+ <table cellspacing="10">
45
+ <tr>
46
+ <th align="left">Name</th>
47
+ <th>Last Modified</th>
48
+ <th>Size</th>
49
+ <th>Description</th>
50
+ </tr>
51
+ <tr>
52
+ <td>
53
+ <a href="../">Parent Directory</a>
54
+ </td>
55
+ </tr>
56
+ <tr>
57
+ <td>
58
+ <a href="http://wiki.local/crm-manager/admin/">admin/</a>
59
+ </td>
60
+ <td>
61
+ Wed Jan 02 01:00:13 CET 2013
62
+ </td>
63
+ <td align="right">
64
+ &nbsp;
65
+ </td>
66
+ <td>
67
+ &nbsp;
68
+ </td>
69
+ </tr>
70
+ </table>
71
+ </body>
72
+ </html>
73
+ ]]></response>
74
+ <responseRedirected>false</responseRedirected>
75
+ </requestresponse>
76
+ </issue>
@@ -0,0 +1,20 @@
1
+ #[Host]#
2
+ %issue.host%
3
+
4
+ #[Path]#
5
+ %issue.path%
6
+
7
+ #[Location]#
8
+ %issue.location%
9
+
10
+ #[Severity]#
11
+ %issue.severity%
12
+
13
+ #[Confidence]#
14
+ %issue.confidence%
15
+
16
+ #[Request]#
17
+ bc.. %issue.request%
18
+
19
+ #[Response]#
20
+ bc.. %issue.response%
@@ -0,0 +1,13 @@
1
+ issue.host
2
+ issue.path
3
+ issue.location
4
+ issue.severity
5
+ issue.confidence
6
+ issue.request
7
+ issue.request_1
8
+ issue.request_2
9
+ issue.request_3
10
+ issue.response
11
+ issue.response_1
12
+ issue.response_2
13
+ issue.response_3
@@ -0,0 +1,36 @@
1
+ <span class="BODH1" id="2.1">2.1.&nbsp;http://mdsec.net/addressbook/32/Default.aspx [Address parameter]</span>
2
+ <br><a class="PREVNEXT" href="#2.2">Next</a>
3
+ <br>
4
+ <h2>Summary</h2>
5
+ <table cellpadding="0" cellspacing="0" class="summary_table">
6
+ <tr>
7
+ <td rowspan="4" class="icon" valign="top" align="center"><img width="32" height="32" src="images/scan_issue_high_certain_rpt.png"></td>
8
+ <td>Severity:&nbsp;&nbsp;</td>
9
+ <td><b>High</b></td>
10
+ </tr>
11
+ <tr>
12
+ <td>Confidence:&nbsp;&nbsp;</td>
13
+ <td><b>Certain</b></td>
14
+ </tr>
15
+ <tr>
16
+ <td>Host:&nbsp;&nbsp;</td>
17
+ <td><b>http://mdsec.net</b></td>
18
+ </tr>
19
+ <tr>
20
+ <td>Path:&nbsp;&nbsp;</td>
21
+ <td><b>/addressbook/32/Default<wbr>.aspx</b></td>
22
+ </tr>
23
+ </table>
24
+ <h2>Issue detail</h2>
25
+ <span class="TEXT">The <b>Address</b> parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.<br><br>The database appears to be Microsoft SQL Server.</span>
26
+ <h2>Remediation detail</h2>
27
+ <span class="TEXT">The application should handle errors gracefully and prevent SQL error messages from being returned in responses. </span>
28
+ <h2>Request 1</h2>
29
+ <div class="rr_div"><span>POST /addressbook/32/Default<wbr>.aspx HTTP/1.1<br>Host: mdsec.net<br>User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0<br>Accept: text/html,application<wbr>/xhtml+xml,application<wbr>/xml;q=0.9,*/*;q=0.8<br>Accept-Language: en-US,en;q=0.5<br>Accept-Encoding: gzip, deflate<br>Referer: http://mdsec.net<wbr>/addressbook/32/<br>Connection: keep-alive<br>Content-Type: application/x-www-form<wbr>-urlencoded<br>Content-Length: 116<br><br>__VIEWSTATE=%2FwEPDw<wbr>UKMTI0NzE5MjI0MGRkoX<wbr>v4BXfugQRsGddxJO96PBvk5rI<wbr>%3D&amp;Name=&amp;Email=&amp;Phone=<wbr>&amp;Search=Search&amp;Address=<span class="HIGHLIGHT">'</span>&amp;Age=</span></div>
30
+ <h2>Response 1</h2>
31
+ <div class="rr_div"><span>HTTP/1.1 200 OK<br>Date: Wed, 10 Apr 2013 12:40:58 GMT<br>Server: Microsoft-IIS/6.0<br>MicrosoftOfficeWebServer: 5.0_Pub<br>X-Powered-By: ASP.NET<br>X-AspNet-Version: 2.0.50727<br>Cache-Control: private<br>Content-Type: text/html; charset=utf-8<br>Content-Length: 2642<br><br>&lt;!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR<wbr>/xhtml1/DTD/xhtml1<wbr>-transitional.dtd"&gt;<br>&lt;html xmlns="http://www.w3.org<wbr>/1999/xhtml" &gt;<br>&lt;head&gt;<br>&lt;title&gt;Contacts&lt;/title&gt;<br><b>...[SNIP]...</b><br>&lt;b&gt;Error: <span class="HIGHLIGHT">Unclosed quotation mark</span> after the character string ''.<br><span class="HIGHLIGHT">Incorrect syntax near</span> ''.&lt;/b&gt;<br><b>...[SNIP]...</b><br></span></div>
32
+ <h2>Request 2</h2>
33
+ <div class="rr_div"><span>POST /addressbook/32/Default<wbr>.aspx HTTP/1.1<br>Host: mdsec.net<br>User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0<br>Accept: text/html,application<wbr>/xhtml+xml,application<wbr>/xml;q=0.9,*/*;q=0.8<br>Accept-Language: en-US,en;q=0.5<br>Accept-Encoding: gzip, deflate<br>Referer: http://mdsec.net<wbr>/addressbook/32/<br>Connection: keep-alive<br>Content-Type: application/x-www-form<wbr>-urlencoded<br>Content-Length: 116<br><br>__VIEWSTATE=%2FwEPDw<wbr>UKMTI0NzE5MjI0MGRkoX<wbr>v4BXfugQRsGddxJO96PBvk5rI<wbr>%3D&amp;Name=&amp;Email=&amp;Phone=<wbr>&amp;Search=Search&amp;Address=<span class="HIGHLIGHT">''</span>&amp;Age=</span></div>
34
+ <h2>Response 2</h2>
35
+ <div class="rr_div"><span>HTTP/1.1 200 OK<br>Date: Wed, 10 Apr 2013 12:40:58 GMT<br>Server: Microsoft-IIS/6.0<br>MicrosoftOfficeWebServer: 5.0_Pub<br>X-Powered-By: ASP.NET<br>X-AspNet-Version: 2.0.50727<br>Cache-Control: private<br>Content-Type: text/html; charset=utf-8<br>Content-Length: 2721<br><br>&lt;!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR<wbr>/xhtml1/DTD/xhtml1<wbr>-transitional.dtd"&gt;<br>&lt;html xmlns="http://www.w3.org<wbr>/1999/xhtml" &gt;<br>&lt;head&gt;<br>&lt;title&gt;Contacts&lt;/title&gt;<br><b>...[SNIP]...</b><br></span></div>
36
+ <div class="rule"></div>
@@ -0,0 +1,50 @@
1
+ #[Host]#
2
+ %issue.host%
3
+
4
+
5
+ #[Path]#
6
+ %issue.path%
7
+
8
+
9
+ #[Location]#
10
+ %issue.location%
11
+
12
+
13
+ #[Severity]#
14
+ %issue.severity%
15
+
16
+
17
+ #[Confidence]#
18
+ %issue.confidence%
19
+
20
+
21
+ #[Request]#
22
+ bc.. %issue.request%
23
+
24
+
25
+ #[Response]#
26
+ bc.. %issue.response%
27
+
28
+
29
+ #[Request 1]#
30
+ bc.. %issue.request_1%
31
+
32
+
33
+ #[Response 1]#
34
+ bc.. %issue.response_1%
35
+
36
+
37
+ #[Request 2]#
38
+ bc.. %issue.request_2%
39
+
40
+
41
+ #[Response 2]#
42
+ bc.. %issue.response_2%
43
+
44
+
45
+ #[Request 3]#
46
+ bc.. %issue.request_3%
47
+
48
+
49
+ #[Response 3]#
50
+ bc.. %issue.response_3%
@@ -0,0 +1,8 @@
1
+ issue.background
2
+ issue.detail
3
+ issue.name
4
+ issue.references
5
+ issue.remediation_background
6
+ issue.remediation_detail
7
+ issue.severity
8
+ issue.vulnerability_classifications
@@ -0,0 +1,23 @@
1
+ <issue>
2
+ <serialNumber>5863488220648493056</serialNumber>
3
+ <type>16777984</type>
4
+ <name><![CDATA[Strict transport security not enforced]]></name>
5
+ <host ip="192.168.1.1">https://this.is.a.url</host>
6
+ <path><![CDATA[/]]></path>
7
+ <location><![CDATA[/]]></location>
8
+ <severity>Low</severity>
9
+ <confidence>Certain</confidence>
10
+ <issueBackground><![CDATA[<p> The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attacks against its users. This attack is performed by rewriting HTTPS links as HTTP, so that if a targeted user follows a link to the site from an HTTP page, their browser never attempts to use an encrypted connection. The sslstrip tool automates this process. </p>
11
+ <p>
12
+ To exploit this vulnerability, an attacker must be suitably positioned to intercept and modify the victim's network traffic.This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure. </p>]]></issueBackground>
13
+ <remediationBackground><![CDATA[<p>The application should instruct web browsers to only access the application using HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a response header with the name 'Strict-Transport-Security' and the value 'max-age=expireTime', where expireTime is the time in seconds that browsers should remember that the site should only be accessed using HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.</p>
14
+ <p>Note that because HSTS is a &quot;trust on first use&quot; (TOFU) protocol, a user who has never accessed the application will never have seen the HSTS header, and will therefore still be vulnerable to SSL stripping attacks. To mitigate this risk, you can optionally add the 'preload' flag to the HSTS header, and submit the domain for review by browser vendors.</p>]]></remediationBackground>
15
+ <references><![CDATA[<ul>
16
+ <li><a href="https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security">HTTP Strict Transport Security</a></li>
17
+ <li><a href="http://www.thoughtcrime.org/software/sslstrip/">sslstrip</a></li>
18
+ <li><a href="https://hstspreload.appspot.com/">HSTS Preload Form</a></li>
19
+ </ul>]]></references>
20
+ <vulnerabilityClassifications><![CDATA[<ul>
21
+ <li><a href="https://cwe.mitre.org/data/definitions/523.html">CWE-523: Unprotected Transport of Credentials</a></li>
22
+ </ul>]]></vulnerabilityClassifications>
23
+ </issue>
@@ -0,0 +1,30 @@
1
+ #[Title]#
2
+ %issue.name%
3
+
4
+
5
+ #[Severity]#
6
+ %issue.severity%
7
+
8
+
9
+ #[Background]#
10
+ %issue.background%
11
+
12
+
13
+ #[RemediationBackground]#
14
+ %issue.remediation_background%
15
+
16
+
17
+ #[Detail]#
18
+ %issue.detail%
19
+
20
+
21
+ #[RemediationDetails]#
22
+ %issue.remediation_detail%
23
+
24
+
25
+ #[References]#
26
+ %issue.references%
27
+
28
+
29
+ #[Classifications]#
30
+ %issue.vulnerability_classifications%
metadata ADDED
@@ -0,0 +1,174 @@
1
+ --- !ruby/object:Gem::Specification
2
+ name: dradis-burp
3
+ version: !ruby/object:Gem::Version
4
+ version: 3.18.0
5
+ platform: ruby
6
+ authors:
7
+ - Daniel Martin
8
+ autorequire:
9
+ bindir: bin
10
+ cert_chain: []
11
+ date: 2020-07-22 00:00:00.000000000 Z
12
+ dependencies:
13
+ - !ruby/object:Gem::Dependency
14
+ name: dradis-plugins
15
+ requirement: !ruby/object:Gem::Requirement
16
+ requirements:
17
+ - - "~>"
18
+ - !ruby/object:Gem::Version
19
+ version: '3.6'
20
+ type: :runtime
21
+ prerelease: false
22
+ version_requirements: !ruby/object:Gem::Requirement
23
+ requirements:
24
+ - - "~>"
25
+ - !ruby/object:Gem::Version
26
+ version: '3.6'
27
+ - !ruby/object:Gem::Dependency
28
+ name: nokogiri
29
+ requirement: !ruby/object:Gem::Requirement
30
+ requirements:
31
+ - - "~>"
32
+ - !ruby/object:Gem::Version
33
+ version: '1.3'
34
+ type: :runtime
35
+ prerelease: false
36
+ version_requirements: !ruby/object:Gem::Requirement
37
+ requirements:
38
+ - - "~>"
39
+ - !ruby/object:Gem::Version
40
+ version: '1.3'
41
+ - !ruby/object:Gem::Dependency
42
+ name: bundler
43
+ requirement: !ruby/object:Gem::Requirement
44
+ requirements:
45
+ - - ">="
46
+ - !ruby/object:Gem::Version
47
+ version: '0'
48
+ type: :development
49
+ prerelease: false
50
+ version_requirements: !ruby/object:Gem::Requirement
51
+ requirements:
52
+ - - ">="
53
+ - !ruby/object:Gem::Version
54
+ version: '0'
55
+ - !ruby/object:Gem::Dependency
56
+ name: rake
57
+ requirement: !ruby/object:Gem::Requirement
58
+ requirements:
59
+ - - "~>"
60
+ - !ruby/object:Gem::Version
61
+ version: '10.0'
62
+ type: :development
63
+ prerelease: false
64
+ version_requirements: !ruby/object:Gem::Requirement
65
+ requirements:
66
+ - - "~>"
67
+ - !ruby/object:Gem::Version
68
+ version: '10.0'
69
+ - !ruby/object:Gem::Dependency
70
+ name: rspec-rails
71
+ requirement: !ruby/object:Gem::Requirement
72
+ requirements:
73
+ - - ">="
74
+ - !ruby/object:Gem::Version
75
+ version: '0'
76
+ type: :development
77
+ prerelease: false
78
+ version_requirements: !ruby/object:Gem::Requirement
79
+ requirements:
80
+ - - ">="
81
+ - !ruby/object:Gem::Version
82
+ version: '0'
83
+ - !ruby/object:Gem::Dependency
84
+ name: combustion
85
+ requirement: !ruby/object:Gem::Requirement
86
+ requirements:
87
+ - - "~>"
88
+ - !ruby/object:Gem::Version
89
+ version: 0.5.2
90
+ type: :development
91
+ prerelease: false
92
+ version_requirements: !ruby/object:Gem::Requirement
93
+ requirements:
94
+ - - "~>"
95
+ - !ruby/object:Gem::Version
96
+ version: 0.5.2
97
+ description: This plugin allows you to upload and parse output produced from Portswigger's
98
+ Burp Scanner into Dradis.
99
+ email:
100
+ - etd@nomejortu.com
101
+ executables: []
102
+ extensions: []
103
+ extra_rdoc_files: []
104
+ files:
105
+ - ".github/issue_template.md"
106
+ - ".github/pull_request_template.md"
107
+ - ".gitignore"
108
+ - ".rspec"
109
+ - CHANGELOG.md
110
+ - CONTRIBUTING.md
111
+ - Gemfile
112
+ - LICENSE
113
+ - README.md
114
+ - Rakefile
115
+ - dradis-burp.gemspec
116
+ - lib/burp/html/issue.rb
117
+ - lib/burp/issue.rb
118
+ - lib/burp/xml/issue.rb
119
+ - lib/dradis-burp.rb
120
+ - lib/dradis/plugins/burp.rb
121
+ - lib/dradis/plugins/burp/engine.rb
122
+ - lib/dradis/plugins/burp/field_processor.rb
123
+ - lib/dradis/plugins/burp/gem_version.rb
124
+ - lib/dradis/plugins/burp/html/importer.rb
125
+ - lib/dradis/plugins/burp/version.rb
126
+ - lib/dradis/plugins/burp/xml/importer.rb
127
+ - lib/tasks/thorfile.rb
128
+ - spec/burp_upload_spec.rb
129
+ - spec/fixtures/files/burp.html
130
+ - spec/fixtures/files/burp.xml
131
+ - spec/fixtures/files/burp_issue_severity.xml
132
+ - spec/fixtures/files/invalid-utf-issue.xml
133
+ - spec/fixtures/files/without-base64.xml
134
+ - spec/spec_helper.rb
135
+ - templates/evidence.fields
136
+ - templates/evidence.sample
137
+ - templates/evidence.template
138
+ - templates/html_evidence.fields
139
+ - templates/html_evidence.sample
140
+ - templates/html_evidence.template
141
+ - templates/issue.fields
142
+ - templates/issue.sample
143
+ - templates/issue.template
144
+ homepage: http://dradisframework.org
145
+ licenses:
146
+ - GPL-2
147
+ metadata: {}
148
+ post_install_message:
149
+ rdoc_options: []
150
+ require_paths:
151
+ - lib
152
+ required_ruby_version: !ruby/object:Gem::Requirement
153
+ requirements:
154
+ - - ">="
155
+ - !ruby/object:Gem::Version
156
+ version: '0'
157
+ required_rubygems_version: !ruby/object:Gem::Requirement
158
+ requirements:
159
+ - - ">="
160
+ - !ruby/object:Gem::Version
161
+ version: '0'
162
+ requirements: []
163
+ rubygems_version: 3.1.2
164
+ signing_key:
165
+ specification_version: 4
166
+ summary: Burp Scanner upload plugin for the Dradis Framework.
167
+ test_files:
168
+ - spec/burp_upload_spec.rb
169
+ - spec/fixtures/files/burp.html
170
+ - spec/fixtures/files/burp.xml
171
+ - spec/fixtures/files/burp_issue_severity.xml
172
+ - spec/fixtures/files/invalid-utf-issue.xml
173
+ - spec/fixtures/files/without-base64.xml
174
+ - spec/spec_helper.rb