ronin-vulns 0.1.0.beta1

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (64) hide show
  1. checksums.yaml +7 -0
  2. data/.document +5 -0
  3. data/.github/workflows/ruby.yml +31 -0
  4. data/.gitignore +13 -0
  5. data/.rspec +1 -0
  6. data/.ruby-version +1 -0
  7. data/.yardopts +1 -0
  8. data/COPYING.txt +165 -0
  9. data/ChangeLog.md +22 -0
  10. data/Gemfile +34 -0
  11. data/README.md +328 -0
  12. data/Rakefile +34 -0
  13. data/bin/ronin-vulns +19 -0
  14. data/data/rfi_test.asp +21 -0
  15. data/data/rfi_test.aspx +25 -0
  16. data/data/rfi_test.cfm +27 -0
  17. data/data/rfi_test.jsp +19 -0
  18. data/data/rfi_test.php +24 -0
  19. data/data/rfi_test.pl +25 -0
  20. data/gemspec.yml +41 -0
  21. data/lib/ronin/vulns/cli/command.rb +39 -0
  22. data/lib/ronin/vulns/cli/commands/lfi.rb +145 -0
  23. data/lib/ronin/vulns/cli/commands/open_redirect.rb +119 -0
  24. data/lib/ronin/vulns/cli/commands/reflected_xss.rb +99 -0
  25. data/lib/ronin/vulns/cli/commands/rfi.rb +156 -0
  26. data/lib/ronin/vulns/cli/commands/scan.rb +316 -0
  27. data/lib/ronin/vulns/cli/commands/sqli.rb +133 -0
  28. data/lib/ronin/vulns/cli/commands/ssti.rb +126 -0
  29. data/lib/ronin/vulns/cli/logging.rb +78 -0
  30. data/lib/ronin/vulns/cli/web_vuln_command.rb +347 -0
  31. data/lib/ronin/vulns/cli.rb +45 -0
  32. data/lib/ronin/vulns/lfi/test_file.rb +91 -0
  33. data/lib/ronin/vulns/lfi.rb +266 -0
  34. data/lib/ronin/vulns/open_redirect.rb +118 -0
  35. data/lib/ronin/vulns/reflected_xss/context.rb +224 -0
  36. data/lib/ronin/vulns/reflected_xss/test_string.rb +149 -0
  37. data/lib/ronin/vulns/reflected_xss.rb +184 -0
  38. data/lib/ronin/vulns/rfi.rb +224 -0
  39. data/lib/ronin/vulns/root.rb +28 -0
  40. data/lib/ronin/vulns/sqli/error_pattern.rb +89 -0
  41. data/lib/ronin/vulns/sqli.rb +397 -0
  42. data/lib/ronin/vulns/ssti/test_expression.rb +104 -0
  43. data/lib/ronin/vulns/ssti.rb +203 -0
  44. data/lib/ronin/vulns/url_scanner.rb +218 -0
  45. data/lib/ronin/vulns/version.rb +26 -0
  46. data/lib/ronin/vulns/vuln.rb +49 -0
  47. data/lib/ronin/vulns/web_vuln/http_request.rb +223 -0
  48. data/lib/ronin/vulns/web_vuln.rb +774 -0
  49. data/man/ronin-vulns-lfi.1 +107 -0
  50. data/man/ronin-vulns-lfi.1.md +80 -0
  51. data/man/ronin-vulns-open-redirect.1 +98 -0
  52. data/man/ronin-vulns-open-redirect.1.md +73 -0
  53. data/man/ronin-vulns-reflected-xss.1 +95 -0
  54. data/man/ronin-vulns-reflected-xss.1.md +71 -0
  55. data/man/ronin-vulns-rfi.1 +107 -0
  56. data/man/ronin-vulns-rfi.1.md +80 -0
  57. data/man/ronin-vulns-scan.1 +138 -0
  58. data/man/ronin-vulns-scan.1.md +103 -0
  59. data/man/ronin-vulns-sqli.1 +107 -0
  60. data/man/ronin-vulns-sqli.1.md +80 -0
  61. data/man/ronin-vulns-ssti.1 +99 -0
  62. data/man/ronin-vulns-ssti.1.md +74 -0
  63. data/ronin-vulns.gemspec +60 -0
  64. metadata +161 -0
checksums.yaml ADDED
@@ -0,0 +1,7 @@
1
+ ---
2
+ SHA256:
3
+ metadata.gz: 3a7f0f97531b93caf6893b805e9326dc9836d903db94b0b5387d96b3d555986b
4
+ data.tar.gz: ea9163ac70cac3ebb7ad3ee66090e1e0a1c90f6f66c04d9112fe5c093632ed7f
5
+ SHA512:
6
+ metadata.gz: d307c996fa6692769a953a53e9931c6fd067ea4f13d2a642be8a575a1020766aa85be7dbdc1b02b1dcf123013be3859aff61562b17528609e68d3d37b4cd60e5
7
+ data.tar.gz: '048a760dbbbb9dcd3dedcbe2ba8730e819d8441065e7df2c2a0cead82f694f26c9c78141590b1455d44f64ac09554f64b57c8ca71c643473da09f9c99d8f1463'
data/.document ADDED
@@ -0,0 +1,5 @@
1
+ lib/**/*.rb
2
+ -
3
+ ChangeLog.md
4
+ COPYING.txt
5
+ man/*.md
@@ -0,0 +1,31 @@
1
+ name: CI
2
+
3
+ on: [ push, pull_request ]
4
+
5
+ jobs:
6
+ tests:
7
+ runs-on: ubuntu-latest
8
+ strategy:
9
+ fail-fast: false
10
+ matrix:
11
+ ruby:
12
+ - '3.0'
13
+ - '3.1'
14
+ - '3.2'
15
+ # - jruby
16
+ - truffleruby
17
+ name: Ruby ${{ matrix.ruby }}
18
+ steps:
19
+ - uses: actions/checkout@v2
20
+ - name: Set up Ruby
21
+ uses: ruby/setup-ruby@v1
22
+ with:
23
+ ruby-version: ${{ matrix.ruby }}
24
+ - name: Install libsqlite3
25
+ run: |
26
+ sudo apt update -y && \
27
+ sudo apt install -y --no-install-recommends --no-install-suggests libsqlite3-dev
28
+ - name: Install dependencies
29
+ run: bundle install --jobs 4 --retry 3
30
+ - name: Run tests
31
+ run: bundle exec rake test
data/.gitignore ADDED
@@ -0,0 +1,13 @@
1
+ /coverage
2
+ /doc
3
+ /pkg
4
+ /man/*.[1-9]
5
+ /vendor/bundle
6
+ /Gemfile.lock
7
+ /.bundle
8
+ /.yardoc
9
+ .DS_Store
10
+ *.db
11
+ *.log
12
+ *.swp
13
+ *~
data/.rspec ADDED
@@ -0,0 +1 @@
1
+ --colour --format documentation
data/.ruby-version ADDED
@@ -0,0 +1 @@
1
+ ruby-3.1
data/.yardopts ADDED
@@ -0,0 +1 @@
1
+ --markup markdown --title 'ronin-vulns Documentation' --protected
data/COPYING.txt ADDED
@@ -0,0 +1,165 @@
1
+ GNU LESSER GENERAL PUBLIC LICENSE
2
+ Version 3, 29 June 2007
3
+
4
+ Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
5
+ Everyone is permitted to copy and distribute verbatim copies
6
+ of this license document, but changing it is not allowed.
7
+
8
+
9
+ This version of the GNU Lesser General Public License incorporates
10
+ the terms and conditions of version 3 of the GNU General Public
11
+ License, supplemented by the additional permissions listed below.
12
+
13
+ 0. Additional Definitions.
14
+
15
+ As used herein, "this License" refers to version 3 of the GNU Lesser
16
+ General Public License, and the "GNU GPL" refers to version 3 of the GNU
17
+ General Public License.
18
+
19
+ "The Library" refers to a covered work governed by this License,
20
+ other than an Application or a Combined Work as defined below.
21
+
22
+ An "Application" is any work that makes use of an interface provided
23
+ by the Library, but which is not otherwise based on the Library.
24
+ Defining a subclass of a class defined by the Library is deemed a mode
25
+ of using an interface provided by the Library.
26
+
27
+ A "Combined Work" is a work produced by combining or linking an
28
+ Application with the Library. The particular version of the Library
29
+ with which the Combined Work was made is also called the "Linked
30
+ Version".
31
+
32
+ The "Minimal Corresponding Source" for a Combined Work means the
33
+ Corresponding Source for the Combined Work, excluding any source code
34
+ for portions of the Combined Work that, considered in isolation, are
35
+ based on the Application, and not on the Linked Version.
36
+
37
+ The "Corresponding Application Code" for a Combined Work means the
38
+ object code and/or source code for the Application, including any data
39
+ and utility programs needed for reproducing the Combined Work from the
40
+ Application, but excluding the System Libraries of the Combined Work.
41
+
42
+ 1. Exception to Section 3 of the GNU GPL.
43
+
44
+ You may convey a covered work under sections 3 and 4 of this License
45
+ without being bound by section 3 of the GNU GPL.
46
+
47
+ 2. Conveying Modified Versions.
48
+
49
+ If you modify a copy of the Library, and, in your modifications, a
50
+ facility refers to a function or data to be supplied by an Application
51
+ that uses the facility (other than as an argument passed when the
52
+ facility is invoked), then you may convey a copy of the modified
53
+ version:
54
+
55
+ a) under this License, provided that you make a good faith effort to
56
+ ensure that, in the event an Application does not supply the
57
+ function or data, the facility still operates, and performs
58
+ whatever part of its purpose remains meaningful, or
59
+
60
+ b) under the GNU GPL, with none of the additional permissions of
61
+ this License applicable to that copy.
62
+
63
+ 3. Object Code Incorporating Material from Library Header Files.
64
+
65
+ The object code form of an Application may incorporate material from
66
+ a header file that is part of the Library. You may convey such object
67
+ code under terms of your choice, provided that, if the incorporated
68
+ material is not limited to numerical parameters, data structure
69
+ layouts and accessors, or small macros, inline functions and templates
70
+ (ten or fewer lines in length), you do both of the following:
71
+
72
+ a) Give prominent notice with each copy of the object code that the
73
+ Library is used in it and that the Library and its use are
74
+ covered by this License.
75
+
76
+ b) Accompany the object code with a copy of the GNU GPL and this license
77
+ document.
78
+
79
+ 4. Combined Works.
80
+
81
+ You may convey a Combined Work under terms of your choice that,
82
+ taken together, effectively do not restrict modification of the
83
+ portions of the Library contained in the Combined Work and reverse
84
+ engineering for debugging such modifications, if you also do each of
85
+ the following:
86
+
87
+ a) Give prominent notice with each copy of the Combined Work that
88
+ the Library is used in it and that the Library and its use are
89
+ covered by this License.
90
+
91
+ b) Accompany the Combined Work with a copy of the GNU GPL and this license
92
+ document.
93
+
94
+ c) For a Combined Work that displays copyright notices during
95
+ execution, include the copyright notice for the Library among
96
+ these notices, as well as a reference directing the user to the
97
+ copies of the GNU GPL and this license document.
98
+
99
+ d) Do one of the following:
100
+
101
+ 0) Convey the Minimal Corresponding Source under the terms of this
102
+ License, and the Corresponding Application Code in a form
103
+ suitable for, and under terms that permit, the user to
104
+ recombine or relink the Application with a modified version of
105
+ the Linked Version to produce a modified Combined Work, in the
106
+ manner specified by section 6 of the GNU GPL for conveying
107
+ Corresponding Source.
108
+
109
+ 1) Use a suitable shared library mechanism for linking with the
110
+ Library. A suitable mechanism is one that (a) uses at run time
111
+ a copy of the Library already present on the user's computer
112
+ system, and (b) will operate properly with a modified version
113
+ of the Library that is interface-compatible with the Linked
114
+ Version.
115
+
116
+ e) Provide Installation Information, but only if you would otherwise
117
+ be required to provide such information under section 6 of the
118
+ GNU GPL, and only to the extent that such information is
119
+ necessary to install and execute a modified version of the
120
+ Combined Work produced by recombining or relinking the
121
+ Application with a modified version of the Linked Version. (If
122
+ you use option 4d0, the Installation Information must accompany
123
+ the Minimal Corresponding Source and Corresponding Application
124
+ Code. If you use option 4d1, you must provide the Installation
125
+ Information in the manner specified by section 6 of the GNU GPL
126
+ for conveying Corresponding Source.)
127
+
128
+ 5. Combined Libraries.
129
+
130
+ You may place library facilities that are a work based on the
131
+ Library side by side in a single library together with other library
132
+ facilities that are not Applications and are not covered by this
133
+ License, and convey such a combined library under terms of your
134
+ choice, if you do both of the following:
135
+
136
+ a) Accompany the combined library with a copy of the same work based
137
+ on the Library, uncombined with any other library facilities,
138
+ conveyed under the terms of this License.
139
+
140
+ b) Give prominent notice with the combined library that part of it
141
+ is a work based on the Library, and explaining where to find the
142
+ accompanying uncombined form of the same work.
143
+
144
+ 6. Revised Versions of the GNU Lesser General Public License.
145
+
146
+ The Free Software Foundation may publish revised and/or new versions
147
+ of the GNU Lesser General Public License from time to time. Such new
148
+ versions will be similar in spirit to the present version, but may
149
+ differ in detail to address new problems or concerns.
150
+
151
+ Each version is given a distinguishing version number. If the
152
+ Library as you received it specifies that a certain numbered version
153
+ of the GNU Lesser General Public License "or any later version"
154
+ applies to it, you have the option of following the terms and
155
+ conditions either of that published version or of any later version
156
+ published by the Free Software Foundation. If the Library as you
157
+ received it does not specify a version number of the GNU Lesser
158
+ General Public License, you may choose any version of the GNU Lesser
159
+ General Public License ever published by the Free Software Foundation.
160
+
161
+ If the Library as you received it specifies that a proxy can decide
162
+ whether future versions of the GNU Lesser General Public License shall
163
+ apply, that proxy's public statement of acceptance of any version is
164
+ permanent authorization for you to choose that version for the
165
+ Library.
data/ChangeLog.md ADDED
@@ -0,0 +1,22 @@
1
+ ### 0.1.0 / 2023-XX-XX
2
+
3
+ * Initial release:
4
+ * Require `ruby` >= 3.0.0.
5
+ * Supports testing for:
6
+ * Local File Inclusion (LFI)
7
+ * Remote File Inclusion (RFI)
8
+ * PHP
9
+ * ASP Class / ASP.NET
10
+ * JSP
11
+ * ColdFusion
12
+ * Perl
13
+ * SQL Injection (SQLi)
14
+ * Reflected Cross Site Scripting (XSS)
15
+ * Server Side Template Injection (SSTI)
16
+ * Open Redirects
17
+ * Supports testing:
18
+ * URL query parameters.
19
+ * HTTP Headers.
20
+ * HTTP `Cookie` parameters.
21
+ * Form parameters.
22
+
data/Gemfile ADDED
@@ -0,0 +1,34 @@
1
+ source 'https://rubygems.org'
2
+
3
+ gemspec
4
+
5
+ gem 'jruby-openssl', '~> 0.7', platforms: :jruby
6
+
7
+ # gem 'command_kit', '~> 0.4', github: 'postmodern/command_kit.rb',
8
+ # branch: '0.4.0'
9
+
10
+ # Ronin dependencies
11
+ # gem 'ronin-support', '~> 1.0', github: "ronin-rb/ronin-support",
12
+ # branch: 'main'
13
+ # gem 'ronin-core', '~> 0.1', github: "ronin-rb/ronin-core",
14
+ # branch: 'main'
15
+
16
+ group :development do
17
+ gem 'rake'
18
+ gem 'rubygems-tasks', '~> 0.2'
19
+
20
+ gem 'rspec', '~> 3.0'
21
+ gem 'webmock', '~> 3.0'
22
+ gem 'simplecov', '~> 0.20'
23
+
24
+ gem 'kramdown', '~> 2.0'
25
+ gem 'kramdown-man', '~> 0.1'
26
+
27
+ gem 'redcarpet', platform: :mri
28
+ gem 'yard', '~> 0.9'
29
+ gem 'yard-spellcheck', require: false
30
+
31
+ gem 'dead_end', require: false
32
+ gem 'sord', require: false
33
+ gem 'stackprof', require: false
34
+ end
data/README.md ADDED
@@ -0,0 +1,328 @@
1
+ # ronin-vulns
2
+
3
+ [![CI](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml/badge.svg)](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml)
4
+ [![Code Climate](https://codeclimate.com/github/ronin-rb/ronin-vulns.svg)](https://codeclimate.com/github/ronin-rb/ronin-vulns)
5
+
6
+ * [Website](https://ronin-rb.dev/)
7
+ * [Source](https://github.com/ronin-rb/ronin-vulns)
8
+ * [Issues](https://github.com/ronin-rb/ronin-vulns/issues)
9
+ * [Documentation](https://ronin-rb.dev/docs/ronin-vulns/frames)
10
+ * [Discord](https://discord.gg/6WAb3PsVX9) |
11
+ [Twitter](https://twitter.com/ronin_rb) |
12
+ [Mastodon](https://infosec.exchange/@ronin_rb)
13
+
14
+ ## Description
15
+
16
+ ronin-vulns is a Ruby library for blind vulnerability testing. It currently
17
+ supports testing for Local File Inclusion (LFI), Remote File Inclusion (RFI),
18
+ SQL injection (SQLi), reflective Cross Site Scripting (XSS), and Server Side
19
+ Template Injection (SSTI), and Open Redirects.
20
+
21
+ ronin-vulns is part of the [ronin-rb] project, a [Ruby] toolkit for security
22
+ research and development.
23
+
24
+ ## Features
25
+
26
+ * Supports testing for:
27
+ * Local File Inclusion (LFI)
28
+ * Remote File Inclusion (RFI)
29
+ * PHP
30
+ * ASP Class / ASP.NET
31
+ * JSP
32
+ * ColdFusion
33
+ * Perl
34
+ * SQL Injection (SQLi)
35
+ * Reflected Cross Site Scripting (XSS)
36
+ * Server Side Template Injection (SSTI)
37
+ * Open Redirects
38
+ * Supports testing:
39
+ * URL query parameters.
40
+ * HTTP Headers.
41
+ * HTTP `Cookie` parameters.
42
+ * Form parameters.
43
+ * Has 96% documentation coverage.
44
+ * Has 99% test coverage.
45
+
46
+ ## Synopsis
47
+
48
+ ```
49
+ Usage: ronin-vulns [options] [COMMAND [ARGS...]]
50
+
51
+ Options:
52
+ -h, --help Print help information
53
+
54
+ Arguments:
55
+ [COMMAND] The command name to run
56
+ [ARGS ...] Additional arguments for the command
57
+
58
+ Commands:
59
+ help
60
+ lfi
61
+ open-redirect
62
+ reflected-xss, xss
63
+ rfi
64
+ scan
65
+ sqli
66
+ ssti
67
+ ```
68
+
69
+ Test a URL for any web vulnerabilities:
70
+
71
+ ```shell
72
+ $ ronin-vulns scan "http://www.example.com/page.php?lang=en"
73
+ ```
74
+
75
+ Test a URL for Remote File Inclusion (RFI):
76
+
77
+ ```shell
78
+ $ ronin-vulns rfi "http://www.example.com/page.php?lang=en"
79
+ ```
80
+
81
+ Test a URL for Local File Inclusion (LFI):
82
+
83
+ ```shell
84
+ $ ronin-vulns lfi "http://www.example.com/page.php?lang=en"
85
+ ```
86
+
87
+ Test a URL for SQL injection (SQLi):
88
+
89
+ ```shell
90
+ $ ronin-vulns sqli "http://www.example.com/page.php?lang=en"
91
+ ```
92
+
93
+ Test a URL for Server Side Template Injection (SSTI):
94
+
95
+ ```shell
96
+ $ ronin-vulns sqli "http://www.example.com/page.php?lang=en"
97
+ ```
98
+
99
+ Test a URL for Open Redirects:
100
+
101
+ ```shell
102
+ $ ronin-vulns open-redirect "http://www.example.com/page.php?lang=en"
103
+ ```
104
+
105
+ Test a URL for reflected Cross Site Scripting (XSS):
106
+
107
+ ```shell
108
+ $ ronin-vulns reflected-xss "http://www.example.com/page.php?lang=en"
109
+ ```
110
+
111
+ ## Examples
112
+
113
+ Test a URL for any web vulnerability:
114
+
115
+ ```ruby
116
+ require 'ronin/vulns/url_scanner'
117
+
118
+ vuln = Ronin::Vulns::URLScanner.test('http://www.example.com/page.php?lang=en')
119
+ # => #<Ronin::Vulns::SQLI: ...>
120
+ ```
121
+
122
+ Scan a URL for all web vulnerabilities:
123
+
124
+ ```ruby
125
+ require 'ronin/vulns/url_scanner'
126
+
127
+ vulns = Ronin::Vulns::URLScanner.scan('http://www.example.com/page.php?lang=en')
128
+ do |vuln|
129
+ puts "Found #{vuln.class} on #{vuln.url} query param #{vuln.query_param}"
130
+ end
131
+ # => [#<Ronin::Vulns::SQLI: ...>, #<Ronin::Vulns::ReflectedXSS: ...>, ...]
132
+ ```
133
+
134
+ ### Remote File Inclusion (RFI)
135
+
136
+ Test a URL for Remote File Inclusion (RFI):
137
+
138
+ ```ruby
139
+ require 'ronin/vulns/rfi'
140
+
141
+ vuln = Ronin::Vulns::RFI.test('http://www.example.com/page.php?lang=en')
142
+ # => #<Ronin::Vulns::RFI: ...>
143
+ ```
144
+
145
+ Finds all Remote File Inclusion (RFI) vulnerabilities for a given URL:
146
+
147
+ ```ruby
148
+ vulns = Ronin::Vulns::RFI.scan('http://www.example.com/page.php?lang=en')
149
+ # => [#<Ronin::Vulns::RFI: ...>, ...]
150
+
151
+ vulns = Ronin::Vulns::RFI.scan('http://www.example.com/page.php?lang=en') do |vuln|
152
+ puts "Found RFI on #{vuln.url} query param #{vuln.query_param}"
153
+ end
154
+ # => [#<Ronin::Vulns::RFI: ...>, ...]
155
+ ```
156
+
157
+ ### Local File Inclusion (LFI)
158
+
159
+ Test a URL for Local File Inclusion (LFI):
160
+
161
+ ```ruby
162
+ require 'ronin/vulns/lfi'
163
+
164
+ vuln = Ronin::Vulns::LFI.test('http://www.example.com/page.php?lang=en')
165
+ # => #<Ronin::Vulns::LFI: ...>
166
+ ```
167
+
168
+ Finds all Local File Inclusion (LFI) vulnerabilities for a given URL:
169
+
170
+ ```ruby
171
+ vulns = Ronin::Vulns::LFI.scan('http://www.example.com/page.php?lang=en')
172
+ # => [#<Ronin::Vulns::LFI: ...>, ...]
173
+
174
+ vulns = Ronin::Vulns::LFI.scan('http://www.example.com/page.php?lang=en') do |vuln|
175
+ puts "Found LFI on #{vuln.url} query param #{vuln.query_param}"
176
+ end
177
+ ```
178
+
179
+ ### SQL Injection (SQLI)
180
+
181
+ Test a URL for SQL Injection (SQLi):
182
+
183
+ ```ruby
184
+ require 'ronin/vulns/sqli'
185
+
186
+ vuln = Ronin::Vulns::SQLI.test('http://www.example.com/page.php?lang=en')
187
+ # => #<Ronin::Vulns::SQLI: ...>
188
+ ```
189
+
190
+ Finds all Server Side Template Injection (SQLI) vulnerabilities for a given URL:
191
+
192
+ ```ruby
193
+ vulns = Ronin::Vulns::SQLI.scan('http://www.example.com/page.php?lang=en')
194
+ # => [#<Ronin::Vulns::SQLI: ...>, ...]
195
+
196
+ vulns = Ronin::Vulns::SQLI.scan('http://www.example.com/page.php?lang=en') do |vuln|
197
+ puts "Found SQLi on #{vuln.url} query param #{vuln.query_param}"
198
+ end
199
+ # => [#<Ronin::Vulns::SQLI: ...>, ...]
200
+ ```
201
+
202
+ ### Server Side Template Injection (SSTI)
203
+
204
+ Test a URL for Server Side Template Injection (SSTI):
205
+
206
+ ```ruby
207
+ require 'ronin/vulns/ssti'
208
+
209
+ vuln = Ronin::Vulns::SSTI.test('http://www.example.com/page.php?lang=en')
210
+ # => #<Ronin::Vulns::SSTI: ...>
211
+ ```
212
+
213
+ Finds all Server Side Template Injection (SSTI) vulnerabilities for a given URL:
214
+
215
+ ```ruby
216
+ vulns = Ronin::Vulns::SSTI.scan('http://www.example.com/page.php?lang=en')
217
+ # => [#<Ronin::Vulns::SSTI: ...>, ...]
218
+
219
+ vulns = Ronin::Vulns::SSTI.scan('http://www.example.com/page.php?lang=en') do |vuln|
220
+ puts "Found SSTI on #{vuln.url} query param #{vuln.query_param}"
221
+ end
222
+ # => [#<Ronin::Vulns::SSTI: ...>, ...]
223
+ ```
224
+
225
+ ### Reflected Cross Site Scripting (XSS)
226
+
227
+ Test a URL for an (Reflected) Cross Site Scripting (XSS) vulnerability:
228
+
229
+ ```ruby
230
+ require 'ronin/vulns/reflected_xss'
231
+
232
+ vuln = Ronin::Vulns::ReflectedXSS.test('http://www.example.com/page.php?lang=en')
233
+ # => #<Ronin::Vulns::ReflectedXSS: ...>
234
+ ```
235
+
236
+ Finds all (Reflected) Cross Site Scripting (XSS) vulnerabilities for a given
237
+ URL:
238
+
239
+ ```ruby
240
+ vulns = Ronin::Vulns::ReflectedXSS.scan('http://www.example.com/page.php?lang=en')
241
+ # => [#<Ronin::Vulns::ReflectedXSS: ...>, ...]
242
+
243
+ vulns = Ronin::Vulns::ReflectedXSS.scan('http://www.example.com/page.php?lang=en') do |vuln|
244
+ puts "Found ReflectedXSS on #{vuln.url} query param #{vuln.query_param}"
245
+ end
246
+ # => [#<Ronin::Vulns::ReflectedXSS: ...>, ...]
247
+ ```
248
+
249
+ ### Open Redirect
250
+
251
+ Test a URL for an Open Redirect vulnerability:
252
+
253
+ ```ruby
254
+ require 'ronin/vulns/open_redirect'
255
+
256
+ vuln = Ronin::Vulns::OpenRedirect.test('http://www.example.com/page.php?lang=en')
257
+ # => #<Ronin::Vulns::OpenRedirect: ...>
258
+ ```
259
+
260
+ Finds all Open Redirect vulnerabilities for a given URL:
261
+
262
+ ```ruby
263
+ vulns = Ronin::Vulns::OpenRedirect.scan('http://www.example.com/page.php?lang=en')
264
+ # => [#<Ronin::Vulns::OpenRedirect: ...>, ...]
265
+
266
+ vulns = Ronin::Vulns::OpenRedirect.scan('http://www.example.com/page.php?lang=en') do |vuln|
267
+ puts "Found OpenRedirect on #{vuln.url} query param #{vuln.query_param}"
268
+ end
269
+ # => [#<Ronin::Vulns::OpenRedirect: ...>, ...]
270
+ ```
271
+
272
+ ## Requirements
273
+
274
+ * [Ruby] >= 3.0.0
275
+ * [ronin-support] ~> 1.0
276
+ * [ronin-core] ~> 0.1
277
+
278
+ ## Install
279
+
280
+ ```shell
281
+ $ gem install ronin-vulns
282
+ ```
283
+
284
+ ### Gemfile
285
+
286
+ ```ruby
287
+ gem 'ronin-vulns', '~> 0.1'
288
+ ```
289
+
290
+ ### gemspec
291
+
292
+ ```ruby
293
+ gem.add_dependency 'ronin-vulns', '~> 0.1'
294
+ ```
295
+
296
+ ## Development
297
+
298
+ 1. [Fork It!](https://github.com/ronin-rb/ronin-vulns/fork)
299
+ 2. Clone It!
300
+ 3. `cd ronin-vulns/`
301
+ 4. `bundle install`
302
+ 5. `git checkout -b my_feature`
303
+ 6. Code It!
304
+ 7. `bundle exec rake spec`
305
+ 8. `git push origin my_feature`
306
+
307
+ ## License
308
+
309
+ Copyright (c) 2022 Hal Brodigan (postmodern.mod3 at gmail.com)
310
+
311
+ ronin-vulns is free software: you can redistribute it and/or modify
312
+ it under the terms of the GNU Lesser General Public License as published
313
+ by the Free Software Foundation, either version 3 of the License, or
314
+ (at your option) any later version.
315
+
316
+ ronin-vulns is distributed in the hope that it will be useful,
317
+ but WITHOUT ANY WARRANTY; without even the implied warranty of
318
+ MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
319
+ GNU Lesser General Public License for more details.
320
+
321
+ You should have received a copy of the GNU Lesser General Public License
322
+ along with ronin-vulns. If not, see <https://www.gnu.org/licenses/>.
323
+
324
+ [Ruby]: https://www.ruby-lang.org
325
+ [ronin-rb]: https://ronin-rb.dev
326
+
327
+ [ronin-support]: https://github.com/ronin-rb/ronin-support#readme
328
+ [ronin-core]: https://github.com/ronin-rb/ronin-core#readme
data/Rakefile ADDED
@@ -0,0 +1,34 @@
1
+ require 'rubygems'
2
+
3
+ begin
4
+ require 'bundler'
5
+ rescue LoadError => e
6
+ warn e.message
7
+ warn "Run `gem install bundler` to install Bundler"
8
+ exit -1
9
+ end
10
+
11
+ begin
12
+ Bundler.setup(:development)
13
+ rescue Bundler::BundlerError => e
14
+ warn e.message
15
+ warn "Run `bundle install` to install missing gems"
16
+ exit e.status_code
17
+ end
18
+
19
+ require 'rake'
20
+
21
+ require 'rubygems/tasks'
22
+ Gem::Tasks.new(sign: {checksum: true, pgp: true})
23
+
24
+ require 'rspec/core/rake_task'
25
+ RSpec::Core::RakeTask.new
26
+ task :test => :spec
27
+ task :default => :spec
28
+
29
+ require 'yard'
30
+ YARD::Rake::YardocTask.new
31
+ task :docs => :yard
32
+
33
+ require 'kramdown/man/task'
34
+ Kramdown::Man::Task.new
data/bin/ronin-vulns ADDED
@@ -0,0 +1,19 @@
1
+ #!/usr/bin/env ruby
2
+
3
+ require 'rubygems'
4
+
5
+ root = File.expand_path(File.join(File.dirname(__FILE__),'..'))
6
+ if File.file?(File.join(root,'Gemfile.lock'))
7
+ Dir.chdir(root) do
8
+ begin
9
+ require 'bundler/setup'
10
+ rescue LoadError => e
11
+ warn e.message
12
+ warn "Run `gem install bundler` to install Bundler"
13
+ exit -1
14
+ end
15
+ end
16
+ end
17
+
18
+ require 'ronin/vulns/cli'
19
+ Ronin::Vulns::CLI.start