pwn 0.5.272 → 0.5.273
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/README.md +3 -3
- data/lib/pwn/sast/csrf.rb +1 -1
- data/lib/pwn/sast/emoticon.rb +1 -1
- data/lib/pwn/sast/eval.rb +1 -1
- data/lib/pwn/sast/inner_html.rb +1 -1
- data/lib/pwn/sast/local_storage.rb +1 -1
- data/lib/pwn/sast/location_hash.rb +1 -1
- data/lib/pwn/sast/outer_html.rb +1 -1
- data/lib/pwn/sast/pom_version.rb +1 -1
- data/lib/pwn/sast/port.rb +1 -1
- data/lib/pwn/sast/post_message.rb +1 -1
- data/lib/pwn/sast/private_key.rb +1 -1
- data/lib/pwn/sast/redirect.rb +1 -1
- data/lib/pwn/sast/sudo.rb +1 -1
- data/lib/pwn/sast/task_tag.rb +1 -1
- data/lib/pwn/sast/token.rb +1 -1
- data/lib/pwn/sast/version.rb +1 -1
- data/lib/pwn/sast/window_location_hash.rb +1 -1
- data/lib/pwn/version.rb +1 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 8df2b66cb3a81dc603e2e710af61dbedb150f72a685e2ced67aa3a23b84edcb7
|
4
|
+
data.tar.gz: 9dfcad3b527799b06d383fd7a72832a1e031d7557b7055475386a2ab08d5dfeb
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: fc4c7bff92dc03d1b8519e9f81f66a4cd285e1f9028e9abb2d7c2511709a4a82fa89696b9ba7d211ee93130cad191322aa15832114623f6a349024cffdfdfca2
|
7
|
+
data.tar.gz: 786023096b9d88521748f602fafb2ae45ad764824457ffacb216c7fe6db368b27382d283ac121e9c66ac46c71c1e204c650b80b0ab1fdf3530b7ff0f599546fb
|
data/README.md
CHANGED
@@ -37,7 +37,7 @@ $ cd /opt/pwn
|
|
37
37
|
$ ./install.sh
|
38
38
|
$ ./install.sh ruby-gem
|
39
39
|
$ pwn
|
40
|
-
pwn[v0.5.
|
40
|
+
pwn[v0.5.273]:001 >>> PWN.help
|
41
41
|
```
|
42
42
|
|
43
43
|
[](https://youtu.be/G7iLUY4FzsI)
|
@@ -52,7 +52,7 @@ $ rvm use ruby-3.4.1@pwn
|
|
52
52
|
$ gem uninstall --all --executables pwn
|
53
53
|
$ gem install --verbose pwn
|
54
54
|
$ pwn
|
55
|
-
pwn[v0.5.
|
55
|
+
pwn[v0.5.273]:001 >>> PWN.help
|
56
56
|
```
|
57
57
|
|
58
58
|
If you're using a multi-user install of RVM do:
|
@@ -62,7 +62,7 @@ $ rvm use ruby-3.4.1@pwn
|
|
62
62
|
$ rvmsudo gem uninstall --all --executables pwn
|
63
63
|
$ rvmsudo gem install --verbose pwn
|
64
64
|
$ pwn
|
65
|
-
pwn[v0.5.
|
65
|
+
pwn[v0.5.273]:001 >>> PWN.help
|
66
66
|
```
|
67
67
|
|
68
68
|
PWN periodically upgrades to the latest version of Ruby which is reflected in `/opt/pwn/.ruby-version`. The easiest way to upgrade to the latest version of Ruby from a previous PWN installation is to run the following script:
|
data/lib/pwn/sast/csrf.rb
CHANGED
@@ -109,7 +109,7 @@ module PWN
|
|
109
109
|
{
|
110
110
|
sast_module: self,
|
111
111
|
section: 'MALICIOUS CODE PROTECTION',
|
112
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
112
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
113
113
|
cwe_id: '352',
|
114
114
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/352.html'
|
115
115
|
}
|
data/lib/pwn/sast/emoticon.rb
CHANGED
@@ -118,7 +118,7 @@ module PWN
|
|
118
118
|
{
|
119
119
|
sast_module: self,
|
120
120
|
section: 'LEAST PRIVILEGE',
|
121
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-
|
121
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-06',
|
122
122
|
cwe_id: '546',
|
123
123
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/546.html'
|
124
124
|
}
|
data/lib/pwn/sast/eval.rb
CHANGED
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'MALICIOUS CODE PROTECTION',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
115
115
|
cwe_id: '95',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/95.html'
|
117
117
|
}
|
data/lib/pwn/sast/inner_html.rb
CHANGED
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'MALICIOUS CODE PROTECTION',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
115
115
|
cwe_id: '79',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
117
117
|
}
|
@@ -112,7 +112,7 @@ module PWN
|
|
112
112
|
{
|
113
113
|
sast_module: self,
|
114
114
|
section: 'MALICIOUS CODE PROTECTION',
|
115
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
115
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
116
116
|
cwe_id: '79',
|
117
117
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
118
118
|
}
|
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'MALICIOUS CODE PROTECTION',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
115
115
|
cwe_id: '79',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
117
117
|
}
|
data/lib/pwn/sast/outer_html.rb
CHANGED
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'MALICIOUS CODE PROTECTION',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
115
115
|
cwe_id: '79',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
117
117
|
}
|
data/lib/pwn/sast/pom_version.rb
CHANGED
@@ -119,7 +119,7 @@ module PWN
|
|
119
119
|
{
|
120
120
|
sast_module: self,
|
121
121
|
section: 'VULNERABILITY SCANNING',
|
122
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=RA-
|
122
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=RA-05',
|
123
123
|
cwe_id: '.0',
|
124
124
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/1104.html'
|
125
125
|
}
|
data/lib/pwn/sast/port.rb
CHANGED
@@ -117,7 +117,7 @@ module PWN
|
|
117
117
|
{
|
118
118
|
sast_module: self,
|
119
119
|
section: 'TRANSMISSION CONFIDENTIALITY AND INTEGRITY',
|
120
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SC-
|
120
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SC-08',
|
121
121
|
cwe_id: '319',
|
122
122
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/319.html'
|
123
123
|
}
|
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'MALICIOUS CODE PROTECTION',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
115
115
|
cwe_id: '79',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
117
117
|
}
|
data/lib/pwn/sast/private_key.rb
CHANGED
@@ -110,7 +110,7 @@ module PWN
|
|
110
110
|
{
|
111
111
|
sast_module: self,
|
112
112
|
section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
|
113
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=IA-
|
113
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=IA-07',
|
114
114
|
cwe_id: '321',
|
115
115
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/321.html'
|
116
116
|
}
|
data/lib/pwn/sast/redirect.rb
CHANGED
@@ -112,7 +112,7 @@ module PWN
|
|
112
112
|
{
|
113
113
|
sast_module: self,
|
114
114
|
section: 'LEAST PRIVILEGE',
|
115
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-
|
115
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-06',
|
116
116
|
cwe_id: '601',
|
117
117
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/601.html'
|
118
118
|
}
|
data/lib/pwn/sast/sudo.rb
CHANGED
@@ -110,7 +110,7 @@ module PWN
|
|
110
110
|
{
|
111
111
|
sast_module: self,
|
112
112
|
section: 'LEAST PRIVILEGE',
|
113
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-
|
113
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-06',
|
114
114
|
cwe_id: '250',
|
115
115
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/250.html'
|
116
116
|
}
|
data/lib/pwn/sast/task_tag.rb
CHANGED
@@ -124,7 +124,7 @@ module PWN
|
|
124
124
|
{
|
125
125
|
sast_module: self,
|
126
126
|
section: 'LEAST PRIVILEGE',
|
127
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-
|
127
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=AC-06',
|
128
128
|
cwe_id: '546',
|
129
129
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/546.html'
|
130
130
|
}
|
data/lib/pwn/sast/token.rb
CHANGED
@@ -112,7 +112,7 @@ module PWN
|
|
112
112
|
{
|
113
113
|
sast_module: self,
|
114
114
|
section: 'CRYPTOGRAPHIC MODULE AUTHENTICATION',
|
115
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=IA-
|
115
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=IA-07',
|
116
116
|
cwe_id: '798',
|
117
117
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/798.html'
|
118
118
|
}
|
data/lib/pwn/sast/version.rb
CHANGED
@@ -111,7 +111,7 @@ module PWN
|
|
111
111
|
{
|
112
112
|
sast_module: self,
|
113
113
|
section: 'VULNERABILITY SCANNING',
|
114
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=RA-
|
114
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=RA-05',
|
115
115
|
cwe_id: '672',
|
116
116
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/672.html'
|
117
117
|
}
|
@@ -110,7 +110,7 @@ module PWN
|
|
110
110
|
{
|
111
111
|
sast_module: self,
|
112
112
|
section: 'MALICIOUS CODE PROTECTION',
|
113
|
-
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-
|
113
|
+
nist_800_53_uri: 'https://csrc.nist.gov/projects/cprt/catalog#/cprt/framework/version/SP_800_53_5_1_1/home?element=SI-03',
|
114
114
|
cwe_id: '79',
|
115
115
|
cwe_uri: 'https://cwe.mitre.org/data/definitions/79.html'
|
116
116
|
}
|
data/lib/pwn/version.rb
CHANGED