dradis-burp 3.18.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +7 -0
- data/.github/issue_template.md +16 -0
- data/.github/pull_request_template.md +36 -0
- data/.gitignore +10 -0
- data/.rspec +2 -0
- data/CHANGELOG.md +57 -0
- data/CONTRIBUTING.md +3 -0
- data/Gemfile +23 -0
- data/LICENSE +339 -0
- data/README.md +29 -0
- data/Rakefile +1 -0
- data/dradis-burp.gemspec +34 -0
- data/lib/burp/html/issue.rb +157 -0
- data/lib/burp/issue.rb +43 -0
- data/lib/burp/xml/issue.rb +127 -0
- data/lib/dradis-burp.rb +10 -0
- data/lib/dradis/plugins/burp.rb +12 -0
- data/lib/dradis/plugins/burp/engine.rb +25 -0
- data/lib/dradis/plugins/burp/field_processor.rb +27 -0
- data/lib/dradis/plugins/burp/gem_version.rb +19 -0
- data/lib/dradis/plugins/burp/html/importer.rb +144 -0
- data/lib/dradis/plugins/burp/version.rb +13 -0
- data/lib/dradis/plugins/burp/xml/importer.rb +144 -0
- data/lib/tasks/thorfile.rb +30 -0
- data/spec/burp_upload_spec.rb +220 -0
- data/spec/fixtures/files/burp.html +229 -0
- data/spec/fixtures/files/burp.xml +100 -0
- data/spec/fixtures/files/burp_issue_severity.xml +118 -0
- data/spec/fixtures/files/invalid-utf-issue.xml +21 -0
- data/spec/fixtures/files/without-base64.xml +709 -0
- data/spec/spec_helper.rb +9 -0
- data/templates/evidence.fields +8 -0
- data/templates/evidence.sample +76 -0
- data/templates/evidence.template +20 -0
- data/templates/html_evidence.fields +13 -0
- data/templates/html_evidence.sample +36 -0
- data/templates/html_evidence.template +50 -0
- data/templates/issue.fields +8 -0
- data/templates/issue.sample +23 -0
- data/templates/issue.template +30 -0
- metadata +174 -0
data/spec/spec_helper.rb
ADDED
|
@@ -0,0 +1,76 @@
|
|
|
1
|
+
<issue>
|
|
2
|
+
<serialNumber>5236964506139299840</serialNumber>
|
|
3
|
+
<type>6291712</type>
|
|
4
|
+
<name>Directory listing</name>
|
|
5
|
+
<host ip="10.0.0.1">http://wiki.local</host>
|
|
6
|
+
<path><![CDATA[/crmmanager/]]></path>
|
|
7
|
+
<location><![CDATA[/crmmanager/]]></location>
|
|
8
|
+
<severity>Information</severity>
|
|
9
|
+
<confidence>Firm</confidence>
|
|
10
|
+
<issueBackground><![CDATA[Directory listings do not necessarily constitute a security vulnerability. Any sensitive resources within your web root should be properly access-controlled in any case, and should not be accessible by an unauthorized party who happens to know the URL. Nevertheless, directory listings can aid an attacker by enabling them to quickly identify the resources at a given path, and proceed directly to analyzing and attacking them.]]></issueBackground>
|
|
11
|
+
<remediationBackground><![CDATA[There is not usually any good reason to provide directory listings, and disabling them may place additional hurdles in the path of an attacker. This can normally be achieved in two ways:<ul><li>Configure your web server to prevent directory listings for all paths beneath the web root; </li><li>Place into each directory a default file (such as index.htm) which the web server will display instead of returning a directory listing.</li></ul>]]></remediationBackground>
|
|
12
|
+
<requestresponse>
|
|
13
|
+
<request base64="false"><![CDATA[GET /crmmanager/ HTTP/1.1
|
|
14
|
+
Host: wiki.local
|
|
15
|
+
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:17.0) Gecko/20100101 Firefox/17.0
|
|
16
|
+
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
|
|
17
|
+
Accept-Language: en-US,en;q=0.5
|
|
18
|
+
Accept-Encoding: gzip, deflate
|
|
19
|
+
DNT: 1
|
|
20
|
+
Proxy-Connection: keep-alive
|
|
21
|
+
Referer: http://wiki.local/
|
|
22
|
+
Cookie: JSESSIONID=e2ff342b-f981-4ec0-9d55-f5b13dfe269c
|
|
23
|
+
|
|
24
|
+
]]></request>
|
|
25
|
+
<response base64="false"><![CDATA[HTTP/1.1 200 OK
|
|
26
|
+
Date: Wed, 02 Jan 2013 15:10:59 GMT
|
|
27
|
+
Content-Type: text/html
|
|
28
|
+
Last-Modified: Fri, 19 Nov 2010 09:36:13 GMT
|
|
29
|
+
Date: Wed, 02 Jan 2013 15:10:59 GMT
|
|
30
|
+
Vary: Accept-Charset, Accept-Encoding, Accept-Language, Accept
|
|
31
|
+
Server: Apache
|
|
32
|
+
Content-Length: 2447
|
|
33
|
+
|
|
34
|
+
<!--
|
|
35
|
+
|
|
36
|
+
lots of crazy stuff
|
|
37
|
+
-->
|
|
38
|
+
<html>
|
|
39
|
+
<head>
|
|
40
|
+
<title>Index of /crmmanager/</title>
|
|
41
|
+
</head>
|
|
42
|
+
<body>
|
|
43
|
+
<h1>Index of /crmmanager/</h1>
|
|
44
|
+
<table cellspacing="10">
|
|
45
|
+
<tr>
|
|
46
|
+
<th align="left">Name</th>
|
|
47
|
+
<th>Last Modified</th>
|
|
48
|
+
<th>Size</th>
|
|
49
|
+
<th>Description</th>
|
|
50
|
+
</tr>
|
|
51
|
+
<tr>
|
|
52
|
+
<td>
|
|
53
|
+
<a href="../">Parent Directory</a>
|
|
54
|
+
</td>
|
|
55
|
+
</tr>
|
|
56
|
+
<tr>
|
|
57
|
+
<td>
|
|
58
|
+
<a href="http://wiki.local/crm-manager/admin/">admin/</a>
|
|
59
|
+
</td>
|
|
60
|
+
<td>
|
|
61
|
+
Wed Jan 02 01:00:13 CET 2013
|
|
62
|
+
</td>
|
|
63
|
+
<td align="right">
|
|
64
|
+
|
|
65
|
+
</td>
|
|
66
|
+
<td>
|
|
67
|
+
|
|
68
|
+
</td>
|
|
69
|
+
</tr>
|
|
70
|
+
</table>
|
|
71
|
+
</body>
|
|
72
|
+
</html>
|
|
73
|
+
]]></response>
|
|
74
|
+
<responseRedirected>false</responseRedirected>
|
|
75
|
+
</requestresponse>
|
|
76
|
+
</issue>
|
|
@@ -0,0 +1,20 @@
|
|
|
1
|
+
#[Host]#
|
|
2
|
+
%issue.host%
|
|
3
|
+
|
|
4
|
+
#[Path]#
|
|
5
|
+
%issue.path%
|
|
6
|
+
|
|
7
|
+
#[Location]#
|
|
8
|
+
%issue.location%
|
|
9
|
+
|
|
10
|
+
#[Severity]#
|
|
11
|
+
%issue.severity%
|
|
12
|
+
|
|
13
|
+
#[Confidence]#
|
|
14
|
+
%issue.confidence%
|
|
15
|
+
|
|
16
|
+
#[Request]#
|
|
17
|
+
bc.. %issue.request%
|
|
18
|
+
|
|
19
|
+
#[Response]#
|
|
20
|
+
bc.. %issue.response%
|
|
@@ -0,0 +1,36 @@
|
|
|
1
|
+
<span class="BODH1" id="2.1">2.1. http://mdsec.net/addressbook/32/Default.aspx [Address parameter]</span>
|
|
2
|
+
<br><a class="PREVNEXT" href="#2.2">Next</a>
|
|
3
|
+
<br>
|
|
4
|
+
<h2>Summary</h2>
|
|
5
|
+
<table cellpadding="0" cellspacing="0" class="summary_table">
|
|
6
|
+
<tr>
|
|
7
|
+
<td rowspan="4" class="icon" valign="top" align="center"><img width="32" height="32" src="images/scan_issue_high_certain_rpt.png"></td>
|
|
8
|
+
<td>Severity: </td>
|
|
9
|
+
<td><b>High</b></td>
|
|
10
|
+
</tr>
|
|
11
|
+
<tr>
|
|
12
|
+
<td>Confidence: </td>
|
|
13
|
+
<td><b>Certain</b></td>
|
|
14
|
+
</tr>
|
|
15
|
+
<tr>
|
|
16
|
+
<td>Host: </td>
|
|
17
|
+
<td><b>http://mdsec.net</b></td>
|
|
18
|
+
</tr>
|
|
19
|
+
<tr>
|
|
20
|
+
<td>Path: </td>
|
|
21
|
+
<td><b>/addressbook/32/Default<wbr>.aspx</b></td>
|
|
22
|
+
</tr>
|
|
23
|
+
</table>
|
|
24
|
+
<h2>Issue detail</h2>
|
|
25
|
+
<span class="TEXT">The <b>Address</b> parameter appears to be vulnerable to SQL injection attacks. A single quote was submitted in the Address parameter, and a database error message was returned. Two single quotes were then submitted and the error message disappeared. You should review the contents of the error message, and the application's handling of other input, to confirm whether a vulnerability is present.<br><br>The database appears to be Microsoft SQL Server.</span>
|
|
26
|
+
<h2>Remediation detail</h2>
|
|
27
|
+
<span class="TEXT">The application should handle errors gracefully and prevent SQL error messages from being returned in responses. </span>
|
|
28
|
+
<h2>Request 1</h2>
|
|
29
|
+
<div class="rr_div"><span>POST /addressbook/32/Default<wbr>.aspx HTTP/1.1<br>Host: mdsec.net<br>User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0<br>Accept: text/html,application<wbr>/xhtml+xml,application<wbr>/xml;q=0.9,*/*;q=0.8<br>Accept-Language: en-US,en;q=0.5<br>Accept-Encoding: gzip, deflate<br>Referer: http://mdsec.net<wbr>/addressbook/32/<br>Connection: keep-alive<br>Content-Type: application/x-www-form<wbr>-urlencoded<br>Content-Length: 116<br><br>__VIEWSTATE=%2FwEPDw<wbr>UKMTI0NzE5MjI0MGRkoX<wbr>v4BXfugQRsGddxJO96PBvk5rI<wbr>%3D&Name=&Email=&Phone=<wbr>&Search=Search&Address=<span class="HIGHLIGHT">'</span>&Age=</span></div>
|
|
30
|
+
<h2>Response 1</h2>
|
|
31
|
+
<div class="rr_div"><span>HTTP/1.1 200 OK<br>Date: Wed, 10 Apr 2013 12:40:58 GMT<br>Server: Microsoft-IIS/6.0<br>MicrosoftOfficeWebServer: 5.0_Pub<br>X-Powered-By: ASP.NET<br>X-AspNet-Version: 2.0.50727<br>Cache-Control: private<br>Content-Type: text/html; charset=utf-8<br>Content-Length: 2642<br><br><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR<wbr>/xhtml1/DTD/xhtml1<wbr>-transitional.dtd"><br><html xmlns="http://www.w3.org<wbr>/1999/xhtml" ><br><head><br><title>Contacts</title><br><b>...[SNIP]...</b><br><b>Error: <span class="HIGHLIGHT">Unclosed quotation mark</span> after the character string ''.<br><span class="HIGHLIGHT">Incorrect syntax near</span> ''.</b><br><b>...[SNIP]...</b><br></span></div>
|
|
32
|
+
<h2>Request 2</h2>
|
|
33
|
+
<div class="rr_div"><span>POST /addressbook/32/Default<wbr>.aspx HTTP/1.1<br>Host: mdsec.net<br>User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0<br>Accept: text/html,application<wbr>/xhtml+xml,application<wbr>/xml;q=0.9,*/*;q=0.8<br>Accept-Language: en-US,en;q=0.5<br>Accept-Encoding: gzip, deflate<br>Referer: http://mdsec.net<wbr>/addressbook/32/<br>Connection: keep-alive<br>Content-Type: application/x-www-form<wbr>-urlencoded<br>Content-Length: 116<br><br>__VIEWSTATE=%2FwEPDw<wbr>UKMTI0NzE5MjI0MGRkoX<wbr>v4BXfugQRsGddxJO96PBvk5rI<wbr>%3D&Name=&Email=&Phone=<wbr>&Search=Search&Address=<span class="HIGHLIGHT">''</span>&Age=</span></div>
|
|
34
|
+
<h2>Response 2</h2>
|
|
35
|
+
<div class="rr_div"><span>HTTP/1.1 200 OK<br>Date: Wed, 10 Apr 2013 12:40:58 GMT<br>Server: Microsoft-IIS/6.0<br>MicrosoftOfficeWebServer: 5.0_Pub<br>X-Powered-By: ASP.NET<br>X-AspNet-Version: 2.0.50727<br>Cache-Control: private<br>Content-Type: text/html; charset=utf-8<br>Content-Length: 2721<br><br><!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR<wbr>/xhtml1/DTD/xhtml1<wbr>-transitional.dtd"><br><html xmlns="http://www.w3.org<wbr>/1999/xhtml" ><br><head><br><title>Contacts</title><br><b>...[SNIP]...</b><br></span></div>
|
|
36
|
+
<div class="rule"></div>
|
|
@@ -0,0 +1,50 @@
|
|
|
1
|
+
#[Host]#
|
|
2
|
+
%issue.host%
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
#[Path]#
|
|
6
|
+
%issue.path%
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
#[Location]#
|
|
10
|
+
%issue.location%
|
|
11
|
+
|
|
12
|
+
|
|
13
|
+
#[Severity]#
|
|
14
|
+
%issue.severity%
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
#[Confidence]#
|
|
18
|
+
%issue.confidence%
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
#[Request]#
|
|
22
|
+
bc.. %issue.request%
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
#[Response]#
|
|
26
|
+
bc.. %issue.response%
|
|
27
|
+
|
|
28
|
+
|
|
29
|
+
#[Request 1]#
|
|
30
|
+
bc.. %issue.request_1%
|
|
31
|
+
|
|
32
|
+
|
|
33
|
+
#[Response 1]#
|
|
34
|
+
bc.. %issue.response_1%
|
|
35
|
+
|
|
36
|
+
|
|
37
|
+
#[Request 2]#
|
|
38
|
+
bc.. %issue.request_2%
|
|
39
|
+
|
|
40
|
+
|
|
41
|
+
#[Response 2]#
|
|
42
|
+
bc.. %issue.response_2%
|
|
43
|
+
|
|
44
|
+
|
|
45
|
+
#[Request 3]#
|
|
46
|
+
bc.. %issue.request_3%
|
|
47
|
+
|
|
48
|
+
|
|
49
|
+
#[Response 3]#
|
|
50
|
+
bc.. %issue.response_3%
|
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
<issue>
|
|
2
|
+
<serialNumber>5863488220648493056</serialNumber>
|
|
3
|
+
<type>16777984</type>
|
|
4
|
+
<name><![CDATA[Strict transport security not enforced]]></name>
|
|
5
|
+
<host ip="192.168.1.1">https://this.is.a.url</host>
|
|
6
|
+
<path><![CDATA[/]]></path>
|
|
7
|
+
<location><![CDATA[/]]></location>
|
|
8
|
+
<severity>Low</severity>
|
|
9
|
+
<confidence>Certain</confidence>
|
|
10
|
+
<issueBackground><![CDATA[<p> The application fails to prevent users from connecting to it over unencrypted connections. An attacker able to modify a legitimate user's network traffic could bypass the application's use of SSL/TLS encryption, and use the application as a platform for attacks against its users. This attack is performed by rewriting HTTPS links as HTTP, so that if a targeted user follows a link to the site from an HTTP page, their browser never attempts to use an encrypted connection. The sslstrip tool automates this process. </p>
|
|
11
|
+
<p>
|
|
12
|
+
To exploit this vulnerability, an attacker must be suitably positioned to intercept and modify the victim's network traffic.This scenario typically occurs when a client communicates with the server over an insecure connection such as public Wi-Fi, or a corporate or home network that is shared with a compromised computer. Common defenses such as switched networks are not sufficient to prevent this. An attacker situated in the user's ISP or the application's hosting infrastructure could also perform this attack. Note that an advanced adversary could potentially target any connection made over the Internet's core infrastructure. </p>]]></issueBackground>
|
|
13
|
+
<remediationBackground><![CDATA[<p>The application should instruct web browsers to only access the application using HTTPS. To do this, enable HTTP Strict Transport Security (HSTS) by adding a response header with the name 'Strict-Transport-Security' and the value 'max-age=expireTime', where expireTime is the time in seconds that browsers should remember that the site should only be accessed using HTTPS. Consider adding the 'includeSubDomains' flag if appropriate.</p>
|
|
14
|
+
<p>Note that because HSTS is a "trust on first use" (TOFU) protocol, a user who has never accessed the application will never have seen the HSTS header, and will therefore still be vulnerable to SSL stripping attacks. To mitigate this risk, you can optionally add the 'preload' flag to the HSTS header, and submit the domain for review by browser vendors.</p>]]></remediationBackground>
|
|
15
|
+
<references><![CDATA[<ul>
|
|
16
|
+
<li><a href="https://developer.mozilla.org/en-US/docs/Web/Security/HTTP_strict_transport_security">HTTP Strict Transport Security</a></li>
|
|
17
|
+
<li><a href="http://www.thoughtcrime.org/software/sslstrip/">sslstrip</a></li>
|
|
18
|
+
<li><a href="https://hstspreload.appspot.com/">HSTS Preload Form</a></li>
|
|
19
|
+
</ul>]]></references>
|
|
20
|
+
<vulnerabilityClassifications><![CDATA[<ul>
|
|
21
|
+
<li><a href="https://cwe.mitre.org/data/definitions/523.html">CWE-523: Unprotected Transport of Credentials</a></li>
|
|
22
|
+
</ul>]]></vulnerabilityClassifications>
|
|
23
|
+
</issue>
|
|
@@ -0,0 +1,30 @@
|
|
|
1
|
+
#[Title]#
|
|
2
|
+
%issue.name%
|
|
3
|
+
|
|
4
|
+
|
|
5
|
+
#[Severity]#
|
|
6
|
+
%issue.severity%
|
|
7
|
+
|
|
8
|
+
|
|
9
|
+
#[Background]#
|
|
10
|
+
%issue.background%
|
|
11
|
+
|
|
12
|
+
|
|
13
|
+
#[RemediationBackground]#
|
|
14
|
+
%issue.remediation_background%
|
|
15
|
+
|
|
16
|
+
|
|
17
|
+
#[Detail]#
|
|
18
|
+
%issue.detail%
|
|
19
|
+
|
|
20
|
+
|
|
21
|
+
#[RemediationDetails]#
|
|
22
|
+
%issue.remediation_detail%
|
|
23
|
+
|
|
24
|
+
|
|
25
|
+
#[References]#
|
|
26
|
+
%issue.references%
|
|
27
|
+
|
|
28
|
+
|
|
29
|
+
#[Classifications]#
|
|
30
|
+
%issue.vulnerability_classifications%
|
metadata
ADDED
|
@@ -0,0 +1,174 @@
|
|
|
1
|
+
--- !ruby/object:Gem::Specification
|
|
2
|
+
name: dradis-burp
|
|
3
|
+
version: !ruby/object:Gem::Version
|
|
4
|
+
version: 3.18.0
|
|
5
|
+
platform: ruby
|
|
6
|
+
authors:
|
|
7
|
+
- Daniel Martin
|
|
8
|
+
autorequire:
|
|
9
|
+
bindir: bin
|
|
10
|
+
cert_chain: []
|
|
11
|
+
date: 2020-07-22 00:00:00.000000000 Z
|
|
12
|
+
dependencies:
|
|
13
|
+
- !ruby/object:Gem::Dependency
|
|
14
|
+
name: dradis-plugins
|
|
15
|
+
requirement: !ruby/object:Gem::Requirement
|
|
16
|
+
requirements:
|
|
17
|
+
- - "~>"
|
|
18
|
+
- !ruby/object:Gem::Version
|
|
19
|
+
version: '3.6'
|
|
20
|
+
type: :runtime
|
|
21
|
+
prerelease: false
|
|
22
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
23
|
+
requirements:
|
|
24
|
+
- - "~>"
|
|
25
|
+
- !ruby/object:Gem::Version
|
|
26
|
+
version: '3.6'
|
|
27
|
+
- !ruby/object:Gem::Dependency
|
|
28
|
+
name: nokogiri
|
|
29
|
+
requirement: !ruby/object:Gem::Requirement
|
|
30
|
+
requirements:
|
|
31
|
+
- - "~>"
|
|
32
|
+
- !ruby/object:Gem::Version
|
|
33
|
+
version: '1.3'
|
|
34
|
+
type: :runtime
|
|
35
|
+
prerelease: false
|
|
36
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
37
|
+
requirements:
|
|
38
|
+
- - "~>"
|
|
39
|
+
- !ruby/object:Gem::Version
|
|
40
|
+
version: '1.3'
|
|
41
|
+
- !ruby/object:Gem::Dependency
|
|
42
|
+
name: bundler
|
|
43
|
+
requirement: !ruby/object:Gem::Requirement
|
|
44
|
+
requirements:
|
|
45
|
+
- - ">="
|
|
46
|
+
- !ruby/object:Gem::Version
|
|
47
|
+
version: '0'
|
|
48
|
+
type: :development
|
|
49
|
+
prerelease: false
|
|
50
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
51
|
+
requirements:
|
|
52
|
+
- - ">="
|
|
53
|
+
- !ruby/object:Gem::Version
|
|
54
|
+
version: '0'
|
|
55
|
+
- !ruby/object:Gem::Dependency
|
|
56
|
+
name: rake
|
|
57
|
+
requirement: !ruby/object:Gem::Requirement
|
|
58
|
+
requirements:
|
|
59
|
+
- - "~>"
|
|
60
|
+
- !ruby/object:Gem::Version
|
|
61
|
+
version: '10.0'
|
|
62
|
+
type: :development
|
|
63
|
+
prerelease: false
|
|
64
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
65
|
+
requirements:
|
|
66
|
+
- - "~>"
|
|
67
|
+
- !ruby/object:Gem::Version
|
|
68
|
+
version: '10.0'
|
|
69
|
+
- !ruby/object:Gem::Dependency
|
|
70
|
+
name: rspec-rails
|
|
71
|
+
requirement: !ruby/object:Gem::Requirement
|
|
72
|
+
requirements:
|
|
73
|
+
- - ">="
|
|
74
|
+
- !ruby/object:Gem::Version
|
|
75
|
+
version: '0'
|
|
76
|
+
type: :development
|
|
77
|
+
prerelease: false
|
|
78
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
79
|
+
requirements:
|
|
80
|
+
- - ">="
|
|
81
|
+
- !ruby/object:Gem::Version
|
|
82
|
+
version: '0'
|
|
83
|
+
- !ruby/object:Gem::Dependency
|
|
84
|
+
name: combustion
|
|
85
|
+
requirement: !ruby/object:Gem::Requirement
|
|
86
|
+
requirements:
|
|
87
|
+
- - "~>"
|
|
88
|
+
- !ruby/object:Gem::Version
|
|
89
|
+
version: 0.5.2
|
|
90
|
+
type: :development
|
|
91
|
+
prerelease: false
|
|
92
|
+
version_requirements: !ruby/object:Gem::Requirement
|
|
93
|
+
requirements:
|
|
94
|
+
- - "~>"
|
|
95
|
+
- !ruby/object:Gem::Version
|
|
96
|
+
version: 0.5.2
|
|
97
|
+
description: This plugin allows you to upload and parse output produced from Portswigger's
|
|
98
|
+
Burp Scanner into Dradis.
|
|
99
|
+
email:
|
|
100
|
+
- etd@nomejortu.com
|
|
101
|
+
executables: []
|
|
102
|
+
extensions: []
|
|
103
|
+
extra_rdoc_files: []
|
|
104
|
+
files:
|
|
105
|
+
- ".github/issue_template.md"
|
|
106
|
+
- ".github/pull_request_template.md"
|
|
107
|
+
- ".gitignore"
|
|
108
|
+
- ".rspec"
|
|
109
|
+
- CHANGELOG.md
|
|
110
|
+
- CONTRIBUTING.md
|
|
111
|
+
- Gemfile
|
|
112
|
+
- LICENSE
|
|
113
|
+
- README.md
|
|
114
|
+
- Rakefile
|
|
115
|
+
- dradis-burp.gemspec
|
|
116
|
+
- lib/burp/html/issue.rb
|
|
117
|
+
- lib/burp/issue.rb
|
|
118
|
+
- lib/burp/xml/issue.rb
|
|
119
|
+
- lib/dradis-burp.rb
|
|
120
|
+
- lib/dradis/plugins/burp.rb
|
|
121
|
+
- lib/dradis/plugins/burp/engine.rb
|
|
122
|
+
- lib/dradis/plugins/burp/field_processor.rb
|
|
123
|
+
- lib/dradis/plugins/burp/gem_version.rb
|
|
124
|
+
- lib/dradis/plugins/burp/html/importer.rb
|
|
125
|
+
- lib/dradis/plugins/burp/version.rb
|
|
126
|
+
- lib/dradis/plugins/burp/xml/importer.rb
|
|
127
|
+
- lib/tasks/thorfile.rb
|
|
128
|
+
- spec/burp_upload_spec.rb
|
|
129
|
+
- spec/fixtures/files/burp.html
|
|
130
|
+
- spec/fixtures/files/burp.xml
|
|
131
|
+
- spec/fixtures/files/burp_issue_severity.xml
|
|
132
|
+
- spec/fixtures/files/invalid-utf-issue.xml
|
|
133
|
+
- spec/fixtures/files/without-base64.xml
|
|
134
|
+
- spec/spec_helper.rb
|
|
135
|
+
- templates/evidence.fields
|
|
136
|
+
- templates/evidence.sample
|
|
137
|
+
- templates/evidence.template
|
|
138
|
+
- templates/html_evidence.fields
|
|
139
|
+
- templates/html_evidence.sample
|
|
140
|
+
- templates/html_evidence.template
|
|
141
|
+
- templates/issue.fields
|
|
142
|
+
- templates/issue.sample
|
|
143
|
+
- templates/issue.template
|
|
144
|
+
homepage: http://dradisframework.org
|
|
145
|
+
licenses:
|
|
146
|
+
- GPL-2
|
|
147
|
+
metadata: {}
|
|
148
|
+
post_install_message:
|
|
149
|
+
rdoc_options: []
|
|
150
|
+
require_paths:
|
|
151
|
+
- lib
|
|
152
|
+
required_ruby_version: !ruby/object:Gem::Requirement
|
|
153
|
+
requirements:
|
|
154
|
+
- - ">="
|
|
155
|
+
- !ruby/object:Gem::Version
|
|
156
|
+
version: '0'
|
|
157
|
+
required_rubygems_version: !ruby/object:Gem::Requirement
|
|
158
|
+
requirements:
|
|
159
|
+
- - ">="
|
|
160
|
+
- !ruby/object:Gem::Version
|
|
161
|
+
version: '0'
|
|
162
|
+
requirements: []
|
|
163
|
+
rubygems_version: 3.1.2
|
|
164
|
+
signing_key:
|
|
165
|
+
specification_version: 4
|
|
166
|
+
summary: Burp Scanner upload plugin for the Dradis Framework.
|
|
167
|
+
test_files:
|
|
168
|
+
- spec/burp_upload_spec.rb
|
|
169
|
+
- spec/fixtures/files/burp.html
|
|
170
|
+
- spec/fixtures/files/burp.xml
|
|
171
|
+
- spec/fixtures/files/burp_issue_severity.xml
|
|
172
|
+
- spec/fixtures/files/invalid-utf-issue.xml
|
|
173
|
+
- spec/fixtures/files/without-base64.xml
|
|
174
|
+
- spec/spec_helper.rb
|