pwn 0.4.731 → 0.4.733
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +2 -2
- data/lib/pwn/plugins/black_duck_binary_analysis.rb +27 -27
- data/lib/pwn/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 6440be0b7c0dc86b8551df9a4b9cb2b5779924b77ffc3d6687a4872c9703b4e8
|
4
|
+
data.tar.gz: 5a16d32ada65b0bb631f0238c17760f25543db8a7082d2382054bfe37009a063
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 46e43c9b96e9a2d71fa1ec70fca237c71c6b1defae51d714a39b9f35603f822ac8eff72a604f2da2c84dabcd6722c2c8f683690acf89307587609550034c04ce
|
7
|
+
data.tar.gz: 7e88c613bfc17b98d37d54e8b6722751a88d4b377f73eb2f300d26374d61dc91f99522c8a0e7c686ab9cba474d68cb8286c982fdc1ac355482efc33fb81e6511
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
37
37
|
$ rvm list gemsets
|
38
38
|
$ gem install --verbose pwn
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.4.
|
40
|
+
pwn[v0.4.733]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[![Installing the pwn Security Automation Framework](https://raw.githubusercontent.com/0dayInc/pwn/master/documentation/pwn_install.png)](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.2.2@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.4.
|
55
|
+
pwn[v0.4.733]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
|
@@ -59,30 +59,30 @@ module PWN
|
|
59
59
|
|
60
60
|
when :post, :put
|
61
61
|
headers = opts[:http_headers]
|
62
|
-
if http_body.key?(:multipart)
|
63
|
-
|
64
|
-
|
65
|
-
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
|
71
|
-
|
72
|
-
|
73
|
-
else
|
74
|
-
|
75
|
-
|
76
|
-
|
77
|
-
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
end
|
62
|
+
# if http_body.key?(:multipart)
|
63
|
+
headers ||= {
|
64
|
+
authorization: "Bearer #{token}"
|
65
|
+
}
|
66
|
+
response = rest_client.execute(
|
67
|
+
method: :post,
|
68
|
+
url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
|
69
|
+
headers: headers,
|
70
|
+
payload: http_body,
|
71
|
+
verify_ssl: false
|
72
|
+
)
|
73
|
+
# else
|
74
|
+
# headers ||= {
|
75
|
+
# content_type: content_type,
|
76
|
+
# authorization: "Bearer #{token}"
|
77
|
+
# }
|
78
|
+
# response = rest_client.execute(
|
79
|
+
# method: http_method,
|
80
|
+
# url: "#{base_bd_bin_analysis_api_uri}/#{rest_call}",
|
81
|
+
# headers: headers,
|
82
|
+
# payload: http_body.to_json,
|
83
|
+
# verify_ssl: false
|
84
|
+
# )
|
85
|
+
# end
|
86
86
|
else
|
87
87
|
raise @@logger.error("Unsupported HTTP Method #{http_method} for #{self} Plugin")
|
88
88
|
end
|
@@ -219,7 +219,7 @@ module PWN
|
|
219
219
|
# include_historical_vulns: 'optional - include historical vulns nil|true|false (Default: nil == company default)',
|
220
220
|
# cvss3_fallback: 'optional - cvss3 fallback nil|true|false (Default: nil == company default)',
|
221
221
|
# assume_unknown_version_as_latest: 'optional - assume unknown version as latest nil|true|false (Default: nil == company default)',
|
222
|
-
# custom_data: 'optional - custom data hash (see group metadata for details)',
|
222
|
+
# custom_data: 'optional - custom data hash (Default: {}, see group metadata for details)',
|
223
223
|
# scan_infoleak: 'optional - scan infoleak nil|true|false (Default: nil == company default)',
|
224
224
|
# code_analysis: 'optional - code analysis nil|true|false (Default: nil == company default)',
|
225
225
|
# scan_code_similarity: 'optional - scan code similarity nil|true|false (Default: nil == company default)'
|
@@ -238,7 +238,7 @@ module PWN
|
|
238
238
|
include_historical_vulns = opts[:include_historical_vulns]
|
239
239
|
cvss3_fallback = opts[:cvss3_fallback]
|
240
240
|
assume_unknown_version_as_latest = opts[:assume_unknown_version_as_latest]
|
241
|
-
custom_data = opts[:custom_data]
|
241
|
+
custom_data = opts[:custom_data] ||= {}
|
242
242
|
scan_infoleak = opts[:scan_infoleak]
|
243
243
|
code_analysis = opts[:code_analysis]
|
244
244
|
scan_code_similarity = opts[:scan_code_similarity]
|
@@ -521,7 +521,7 @@ module PWN
|
|
521
521
|
include_historical_vulns: 'optional - include historical vulns nil|true|false (Default: nil == company default)',
|
522
522
|
cvss3_fallback: 'optional - cvss3 fallback nil|true|false (Default: nil == company default)',
|
523
523
|
assume_unknown_version_as_latest: 'optional - assume unknown version as latest nil|true|false (Default: nil == company default)',
|
524
|
-
custom_data: 'optional - custom data hash (see group metadata for details)',
|
524
|
+
custom_data: 'optional - custom data hash (Default: {}, see group metadata for details)',
|
525
525
|
scan_infoleak: 'optional - scan infoleak nil|true|false (Default: nil == company default)',
|
526
526
|
code_analysis: 'optional - code analysis nil|true|false (Default: nil == company default)',
|
527
527
|
scan_code_similarity: 'optional - scan code similarity nil|true|false (Default: nil == company default)'
|
data/lib/pwn/version.rb
CHANGED