pwn 0.4.731 → 0.4.733

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 714a8e7624b1623c1154e5c19305a09a653cc121f1450117d51b4179e6f536b4
4
- data.tar.gz: af52945bed9bf0d7b5b8d84e349a3d3c499512b0a8198aa4139475e725c920a2
3
+ metadata.gz: 6440be0b7c0dc86b8551df9a4b9cb2b5779924b77ffc3d6687a4872c9703b4e8
4
+ data.tar.gz: 5a16d32ada65b0bb631f0238c17760f25543db8a7082d2382054bfe37009a063
5
5
  SHA512:
6
- metadata.gz: f260b2d62f3b453631a38786ab3e626380c5ad2a464f3c9d041a2526695d04b6b75ceae2a83ef43d4cbf3f9ff5f5ac70139dcb5654922de2eb13ba45dc68efa9
7
- data.tar.gz: b7f8c4cf50029c92cd838c75dd55c03d1b1fa8d8fecb4f30be365b2e1c9bef60f26df7d0392ff0112d6fa320dd6049b0bd0a660f27e769cf2605ad16bdbab145
6
+ metadata.gz: 46e43c9b96e9a2d71fa1ec70fca237c71c6b1defae51d714a39b9f35603f822ac8eff72a604f2da2c84dabcd6722c2c8f683690acf89307587609550034c04ce
7
+ data.tar.gz: 7e88c613bfc17b98d37d54e8b6722751a88d4b377f73eb2f300d26374d61dc91f99522c8a0e7c686ab9cba474d68cb8286c982fdc1ac355482efc33fb81e6511
data/README.md CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
37
37
  $ rvm list gemsets
38
38
  $ gem install --verbose pwn
39
39
  $ pwn
40
- pwn[v0.4.731]:001 >>> PWN.help
40
+ pwn[v0.4.733]:001 >>> PWN.help
41
41
  ```
42
42
 
43
43
  [![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
52
52
  $ gem uninstall --all --executables pwn
53
53
  $ gem install --verbose pwn
54
54
  $ pwn
55
- pwn[v0.4.731]:001 >>> PWN.help
55
+ pwn[v0.4.733]:001 >>> PWN.help
56
56
  ```
57
57
 
58
58
 
@@ -59,30 +59,30 @@ module PWN
59
59
 
60
60
  when :post, :put
61
61
  headers = opts[:http_headers]
62
- if http_body.key?(:multipart)
63
- headers ||= {
64
- authorization: "Bearer #{token}"
65
- }
66
- response = rest_client.execute(
67
- method: :post,
68
- url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
69
- headers: headers,
70
- payload: http_body,
71
- verify_ssl: false
72
- )
73
- else
74
- headers ||= {
75
- content_type: content_type,
76
- authorization: "Bearer #{token}"
77
- }
78
- response = rest_client.execute(
79
- method: http_method,
80
- url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
81
- headers: headers,
82
- payload: http_body.to_json,
83
- verify_ssl: false
84
- )
85
- end
62
+ # if http_body.key?(:multipart)
63
+ headers ||= {
64
+ authorization: "Bearer #{token}"
65
+ }
66
+ response = rest_client.execute(
67
+ method: :post,
68
+ url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
69
+ headers: headers,
70
+ payload: http_body,
71
+ verify_ssl: false
72
+ )
73
+ # else
74
+ # headers ||= {
75
+ # content_type: content_type,
76
+ # authorization: "Bearer #{token}"
77
+ # }
78
+ # response = rest_client.execute(
79
+ # method: http_method,
80
+ # url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
81
+ # headers: headers,
82
+ # payload: http_body.to_json,
83
+ # verify_ssl: false
84
+ # )
85
+ # end
86
86
  else
87
87
  raise @@logger.error("Unsupported HTTP Method #{http_method} for #{self} Plugin")
88
88
  end
@@ -219,7 +219,7 @@ module PWN
219
219
  # include_historical_vulns: 'optional - include historical vulns nil|true|false (Default: nil == company default)',
220
220
  # cvss3_fallback: 'optional - cvss3 fallback nil|true|false (Default: nil == company default)',
221
221
  # assume_unknown_version_as_latest: 'optional - assume unknown version as latest nil|true|false (Default: nil == company default)',
222
- # custom_data: 'optional - custom data hash (see group metadata for details)',
222
+ # custom_data: 'optional - custom data hash (Default: {}, see group metadata for details)',
223
223
  # scan_infoleak: 'optional - scan infoleak nil|true|false (Default: nil == company default)',
224
224
  # code_analysis: 'optional - code analysis nil|true|false (Default: nil == company default)',
225
225
  # scan_code_similarity: 'optional - scan code similarity nil|true|false (Default: nil == company default)'
@@ -238,7 +238,7 @@ module PWN
238
238
  include_historical_vulns = opts[:include_historical_vulns]
239
239
  cvss3_fallback = opts[:cvss3_fallback]
240
240
  assume_unknown_version_as_latest = opts[:assume_unknown_version_as_latest]
241
- custom_data = opts[:custom_data]
241
+ custom_data = opts[:custom_data] ||= {}
242
242
  scan_infoleak = opts[:scan_infoleak]
243
243
  code_analysis = opts[:code_analysis]
244
244
  scan_code_similarity = opts[:scan_code_similarity]
@@ -521,7 +521,7 @@ module PWN
521
521
  include_historical_vulns: 'optional - include historical vulns nil|true|false (Default: nil == company default)',
522
522
  cvss3_fallback: 'optional - cvss3 fallback nil|true|false (Default: nil == company default)',
523
523
  assume_unknown_version_as_latest: 'optional - assume unknown version as latest nil|true|false (Default: nil == company default)',
524
- custom_data: 'optional - custom data hash (see group metadata for details)',
524
+ custom_data: 'optional - custom data hash (Default: {}, see group metadata for details)',
525
525
  scan_infoleak: 'optional - scan infoleak nil|true|false (Default: nil == company default)',
526
526
  code_analysis: 'optional - code analysis nil|true|false (Default: nil == company default)',
527
527
  scan_code_similarity: 'optional - scan code similarity nil|true|false (Default: nil == company default)'
data/lib/pwn/version.rb CHANGED
@@ -1,5 +1,5 @@
1
1
  # frozen_string_literal: true
2
2
 
3
3
  module PWN
4
- VERSION = '0.4.731'
4
+ VERSION = '0.4.733'
5
5
  end
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: pwn
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.731
4
+ version: 0.4.733
5
5
  platform: ruby
6
6
  authors:
7
7
  - 0day Inc.