ronin-vulns 0.1.0.beta1 → 0.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.github/workflows/ruby.yml +1 -0
- data/.yardopts +1 -1
- data/README.md +2 -1
- data/gemspec.yml +4 -4
- data/lib/ronin/vulns/cli/command.rb +1 -1
- data/lib/ronin/vulns/cli/commands/lfi.rb +3 -3
- data/lib/ronin/vulns/cli/commands/open_redirect.rb +3 -3
- data/lib/ronin/vulns/cli/commands/reflected_xss.rb +3 -3
- data/lib/ronin/vulns/cli/commands/rfi.rb +5 -5
- data/lib/ronin/vulns/cli/commands/scan.rb +5 -5
- data/lib/ronin/vulns/cli/commands/sqli.rb +3 -3
- data/lib/ronin/vulns/cli/commands/ssti.rb +3 -3
- data/lib/ronin/vulns/cli/logging.rb +1 -1
- data/lib/ronin/vulns/cli/web_vuln_command.rb +6 -6
- data/lib/ronin/vulns/cli.rb +6 -1
- data/lib/ronin/vulns/open_redirect.rb +1 -1
- data/lib/ronin/vulns/rfi.rb +1 -1
- data/lib/ronin/vulns/root.rb +1 -1
- data/lib/ronin/vulns/sqli/error_pattern.rb +1 -1
- data/lib/ronin/vulns/sqli.rb +1 -1
- data/lib/ronin/vulns/url_scanner.rb +1 -1
- data/lib/ronin/vulns/version.rb +2 -2
- data/man/ronin-vulns-rfi.1 +1 -1
- data/man/ronin-vulns-rfi.1.md +1 -1
- data/man/ronin-vulns-scan.1 +1 -1
- data/man/ronin-vulns-scan.1.md +1 -1
- data/ronin-vulns.gemspec +2 -2
- metadata +8 -8
checksums.yaml
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
---
|
|
2
2
|
SHA256:
|
|
3
|
-
metadata.gz:
|
|
4
|
-
data.tar.gz:
|
|
3
|
+
metadata.gz: fc8b11abf863d2340c92c0b15fea6261a433541d67b8e9f31c644a013c3b7736
|
|
4
|
+
data.tar.gz: d801f3f82d4cfdc55666353d0cdbf0e95e3dd205e93bc182be0922cccefcd0a4
|
|
5
5
|
SHA512:
|
|
6
|
-
metadata.gz:
|
|
7
|
-
data.tar.gz:
|
|
6
|
+
metadata.gz: 2bfbc57fee417d64e50330e218c103bde61e7a7d33c71e18bfbc60b021ad02f6976a3ea3d7151db9d7e0f777c0ae5cd38728789a99e5a349d9ad8f215c02c4db
|
|
7
|
+
data.tar.gz: f1effc752165f25c7d605d605f942f3f6f27e16f1587da22805d3d8e3e8bb9c60a6e9fc5445cfefc67419ae2d217d1bd52ffc198debb1ff2fe868245ff9978fb
|
data/.github/workflows/ruby.yml
CHANGED
data/.yardopts
CHANGED
|
@@ -1 +1 @@
|
|
|
1
|
-
--markup markdown --title '
|
|
1
|
+
--markup markdown --title 'Ronin::Vulns Documentation' --protected
|
data/README.md
CHANGED
|
@@ -2,6 +2,7 @@
|
|
|
2
2
|
|
|
3
3
|
[](https://github.com/ronin-rb/ronin-vulns/actions/workflows/ruby.yml)
|
|
4
4
|
[](https://codeclimate.com/github/ronin-rb/ronin-vulns)
|
|
5
|
+
[](https://badge.fury.io/rb/ronin-vulns)
|
|
5
6
|
|
|
6
7
|
* [Website](https://ronin-rb.dev/)
|
|
7
8
|
* [Source](https://github.com/ronin-rb/ronin-vulns)
|
|
@@ -15,7 +16,7 @@
|
|
|
15
16
|
|
|
16
17
|
ronin-vulns is a Ruby library for blind vulnerability testing. It currently
|
|
17
18
|
supports testing for Local File Inclusion (LFI), Remote File Inclusion (RFI),
|
|
18
|
-
SQL injection (SQLi), reflective Cross Site Scripting (XSS),
|
|
19
|
+
SQL injection (SQLi), reflective Cross Site Scripting (XSS), Server Side
|
|
19
20
|
Template Injection (SSTI), and Open Redirects.
|
|
20
21
|
|
|
21
22
|
ronin-vulns is part of the [ronin-rb] project, a [Ruby] toolkit for security
|
data/gemspec.yml
CHANGED
|
@@ -16,10 +16,10 @@ homepage: https://ronin-rb.dev/
|
|
|
16
16
|
has_yard: true
|
|
17
17
|
|
|
18
18
|
metadata:
|
|
19
|
-
documentation_uri: https://
|
|
19
|
+
documentation_uri: https://ronin-rb.dev/docs/ronin-vulns
|
|
20
20
|
source_code_uri: https://github.com/ronin-rb/ronin-vulns
|
|
21
21
|
bug_tracker_uri: https://github.com/ronin-rb/ronin-vulns/issues
|
|
22
|
-
changelog_uri: https://github.com/ronin-rb/ronin-vulns/blob/
|
|
22
|
+
changelog_uri: https://github.com/ronin-rb/ronin-vulns/blob/main/ChangeLog.md
|
|
23
23
|
rubygems_mfa_required: 'true'
|
|
24
24
|
|
|
25
25
|
required_ruby_version: ">= 3.0.0"
|
|
@@ -34,8 +34,8 @@ generated_files:
|
|
|
34
34
|
- man/ronin-vulns-scan.1
|
|
35
35
|
|
|
36
36
|
dependencies:
|
|
37
|
-
ronin-support: ~> 1.0
|
|
38
|
-
ronin-core: ~> 0.1
|
|
37
|
+
ronin-support: ~> 1.0
|
|
38
|
+
ronin-core: ~> 0.1
|
|
39
39
|
|
|
40
40
|
development_dependencies:
|
|
41
41
|
bundler: ~> 2.0
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -110,7 +110,7 @@ module Ronin
|
|
|
110
110
|
end
|
|
111
111
|
|
|
112
112
|
#
|
|
113
|
-
# Scans a URL for LFI
|
|
113
|
+
# Scans a URL for LFI vulnerabilities.
|
|
114
114
|
#
|
|
115
115
|
# @param [String] url
|
|
116
116
|
# The URL to scan.
|
|
@@ -126,7 +126,7 @@ module Ronin
|
|
|
126
126
|
end
|
|
127
127
|
|
|
128
128
|
#
|
|
129
|
-
# Tests a URL for LFI
|
|
129
|
+
# Tests a URL for LFI vulnerabilities.
|
|
130
130
|
#
|
|
131
131
|
# @param [String] url
|
|
132
132
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -83,7 +83,7 @@ module Ronin
|
|
|
83
83
|
end
|
|
84
84
|
|
|
85
85
|
#
|
|
86
|
-
# Scans a URL for Open Redirect
|
|
86
|
+
# Scans a URL for Open Redirect vulnerabilities.
|
|
87
87
|
#
|
|
88
88
|
# @param [String] url
|
|
89
89
|
# The URL to scan.
|
|
@@ -100,7 +100,7 @@ module Ronin
|
|
|
100
100
|
end
|
|
101
101
|
|
|
102
102
|
#
|
|
103
|
-
# Tests a URL for Open Redirect
|
|
103
|
+
# Tests a URL for Open Redirect vulnerabilities.
|
|
104
104
|
#
|
|
105
105
|
# @param [String] url
|
|
106
106
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -63,7 +63,7 @@ module Ronin
|
|
|
63
63
|
man_page 'ronin-vulns-reflected-xss.1'
|
|
64
64
|
|
|
65
65
|
#
|
|
66
|
-
# Scans a URL for Reflected XSS
|
|
66
|
+
# Scans a URL for Reflected XSS vulnerabilities.
|
|
67
67
|
#
|
|
68
68
|
# @param [String] url
|
|
69
69
|
# The URL to scan.
|
|
@@ -80,7 +80,7 @@ module Ronin
|
|
|
80
80
|
end
|
|
81
81
|
|
|
82
82
|
#
|
|
83
|
-
# Tests a URL for Reflected XSS
|
|
83
|
+
# Tests a URL for Reflected XSS vulnerabilities.
|
|
84
84
|
#
|
|
85
85
|
# @param [String] url
|
|
86
86
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -52,7 +52,7 @@ module Ronin
|
|
|
52
52
|
# --filter-bypass Optional filter-bypass strategy to use
|
|
53
53
|
# -S asp|asp.net|coldfusion|jsp|php|perl,
|
|
54
54
|
# --script-lang Explicitly specify the scripting language to test for
|
|
55
|
-
# -T, --test-script-url URL Use an
|
|
55
|
+
# -T, --test-script-url URL Use an alternative test script URL
|
|
56
56
|
# -h, --help Print help information
|
|
57
57
|
#
|
|
58
58
|
# ## Arguments
|
|
@@ -91,7 +91,7 @@ module Ronin
|
|
|
91
91
|
type: String,
|
|
92
92
|
usage: 'URL'
|
|
93
93
|
},
|
|
94
|
-
desc: 'Use an
|
|
94
|
+
desc: 'Use an alternative test script URL'
|
|
95
95
|
|
|
96
96
|
description 'Scans URL(s) for Remote File Inclusion (RFI) vulnerabilities'
|
|
97
97
|
|
|
@@ -121,7 +121,7 @@ module Ronin
|
|
|
121
121
|
end
|
|
122
122
|
|
|
123
123
|
#
|
|
124
|
-
# Scans a URL for RFI
|
|
124
|
+
# Scans a URL for RFI vulnerabilities.
|
|
125
125
|
#
|
|
126
126
|
# @param [String] url
|
|
127
127
|
# The URL to scan.
|
|
@@ -137,7 +137,7 @@ module Ronin
|
|
|
137
137
|
end
|
|
138
138
|
|
|
139
139
|
#
|
|
140
|
-
# Tests a URL for RFI
|
|
140
|
+
# Tests a URL for RFI vulnerabilities.
|
|
141
141
|
#
|
|
142
142
|
# @param [String] url
|
|
143
143
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -54,7 +54,7 @@ module Ronin
|
|
|
54
54
|
# Optional filter-bypass strategy to use
|
|
55
55
|
# --rfi-script-lang asp|asp.net|coldfusion|jsp|php|perl
|
|
56
56
|
# Explicitly specify the scripting language to test for
|
|
57
|
-
# --rfi-test-script-url URL Use an
|
|
57
|
+
# --rfi-test-script-url URL Use an alternative test script URL
|
|
58
58
|
# --sqli-escape-quote Escapes quotation marks
|
|
59
59
|
# --sqli-escape-parens Escapes parenthesis
|
|
60
60
|
# --sqli-terminate Terminates the SQL expression with a --
|
|
@@ -118,7 +118,7 @@ module Ronin
|
|
|
118
118
|
type: String,
|
|
119
119
|
usage: 'URL'
|
|
120
120
|
},
|
|
121
|
-
desc: 'Use an
|
|
121
|
+
desc: 'Use an alternative test script URL'
|
|
122
122
|
|
|
123
123
|
option :sqli_escape_quote, desc: 'Escapes quotation marks'
|
|
124
124
|
|
|
@@ -271,7 +271,7 @@ module Ronin
|
|
|
271
271
|
end
|
|
272
272
|
|
|
273
273
|
#
|
|
274
|
-
# Scans a URL for all web
|
|
274
|
+
# Scans a URL for all web vulnerabilities.
|
|
275
275
|
#
|
|
276
276
|
# @param [String] url
|
|
277
277
|
# The URL to scan.
|
|
@@ -292,7 +292,7 @@ module Ronin
|
|
|
292
292
|
end
|
|
293
293
|
|
|
294
294
|
#
|
|
295
|
-
# Tests a URL for any web
|
|
295
|
+
# Tests a URL for any web vulnerabilities.
|
|
296
296
|
#
|
|
297
297
|
# @param [String] url
|
|
298
298
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -98,7 +98,7 @@ module Ronin
|
|
|
98
98
|
end
|
|
99
99
|
|
|
100
100
|
#
|
|
101
|
-
# Scans a URL for SQLi
|
|
101
|
+
# Scans a URL for SQLi vulnerabilities.
|
|
102
102
|
#
|
|
103
103
|
# @param [String] url
|
|
104
104
|
# The URL to scan.
|
|
@@ -114,7 +114,7 @@ module Ronin
|
|
|
114
114
|
end
|
|
115
115
|
|
|
116
116
|
#
|
|
117
|
-
# Tests a URL for SQLi
|
|
117
|
+
# Tests a URL for SQLi vulnerabilities.
|
|
118
118
|
#
|
|
119
119
|
# @param [String] url
|
|
120
120
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -91,7 +91,7 @@ module Ronin
|
|
|
91
91
|
end
|
|
92
92
|
|
|
93
93
|
#
|
|
94
|
-
# Scans a URL for SSTI
|
|
94
|
+
# Scans a URL for SSTI vulnerabilities.
|
|
95
95
|
#
|
|
96
96
|
# @param [String] url
|
|
97
97
|
# The URL to scan.
|
|
@@ -107,7 +107,7 @@ module Ronin
|
|
|
107
107
|
end
|
|
108
108
|
|
|
109
109
|
#
|
|
110
|
-
# Tests a URL for SSTI
|
|
110
|
+
# Tests a URL for SSTI vulnerabilities.
|
|
111
111
|
#
|
|
112
112
|
# @param [String] url
|
|
113
113
|
# The URL to test.
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -191,7 +191,7 @@ module Ronin
|
|
|
191
191
|
# @return [Set<String>, nil]
|
|
192
192
|
attr_reader :test_query_params
|
|
193
193
|
|
|
194
|
-
#
|
|
194
|
+
# Indicates whether to test all of the query params of the URL.
|
|
195
195
|
#
|
|
196
196
|
# @return [Boolean, nil]
|
|
197
197
|
attr_reader :test_all_query_params
|
|
@@ -206,7 +206,7 @@ module Ronin
|
|
|
206
206
|
# @return [Set<String>, nil]
|
|
207
207
|
attr_reader :test_cookie_params
|
|
208
208
|
|
|
209
|
-
#
|
|
209
|
+
# Indicates whether to test all `Cookie` params for the URL.
|
|
210
210
|
#
|
|
211
211
|
# @return [Boolean, nil]
|
|
212
212
|
attr_reader :test_all_cookie_params
|
|
@@ -252,7 +252,7 @@ module Ronin
|
|
|
252
252
|
end
|
|
253
253
|
|
|
254
254
|
#
|
|
255
|
-
#
|
|
255
|
+
# Processes a URL.
|
|
256
256
|
#
|
|
257
257
|
# @param [String] url
|
|
258
258
|
# A URL to scan.
|
|
@@ -309,7 +309,7 @@ module Ronin
|
|
|
309
309
|
end
|
|
310
310
|
|
|
311
311
|
#
|
|
312
|
-
# Scans a URL for web
|
|
312
|
+
# Scans a URL for web vulnerabilities.
|
|
313
313
|
#
|
|
314
314
|
# @param [String] url
|
|
315
315
|
# The URL to scan.
|
|
@@ -327,7 +327,7 @@ module Ronin
|
|
|
327
327
|
end
|
|
328
328
|
|
|
329
329
|
#
|
|
330
|
-
# Tests a URL for web
|
|
330
|
+
# Tests a URL for web vulnerabilities.
|
|
331
331
|
#
|
|
332
332
|
# @param [String] url
|
|
333
333
|
# The URL to test.
|
data/lib/ronin/vulns/cli.rb
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -18,8 +18,11 @@
|
|
|
18
18
|
# along with ronin-vulns. If not, see <https://www.gnu.org/licenses/>.
|
|
19
19
|
#
|
|
20
20
|
|
|
21
|
+
require 'ronin/vulns/version'
|
|
22
|
+
|
|
21
23
|
require 'command_kit/commands'
|
|
22
24
|
require 'command_kit/commands/auto_load'
|
|
25
|
+
require 'command_kit/options/version'
|
|
23
26
|
|
|
24
27
|
module Ronin
|
|
25
28
|
module Vulns
|
|
@@ -35,8 +38,10 @@ module Ronin
|
|
|
35
38
|
dir: "#{__dir__}/cli/commands",
|
|
36
39
|
namespace: "#{self}::Commands"
|
|
37
40
|
)
|
|
41
|
+
include CommandKit::Options::Version
|
|
38
42
|
|
|
39
43
|
command_name 'ronin-vulns'
|
|
44
|
+
version Ronin::Vulns::VERSION
|
|
40
45
|
|
|
41
46
|
command_aliases['xss'] = 'reflected-xss'
|
|
42
47
|
|
data/lib/ronin/vulns/rfi.rb
CHANGED
|
@@ -162,7 +162,7 @@ module Ronin
|
|
|
162
162
|
# Optionally applies a filter bypass technique to the RFI URL.
|
|
163
163
|
#
|
|
164
164
|
# @param [URI::HTTP, String] url
|
|
165
|
-
# The RFI URL to
|
|
165
|
+
# The RFI URL to optionally encode before it will be injected into a
|
|
166
166
|
# HTTP request.
|
|
167
167
|
#
|
|
168
168
|
# @return [String]
|
data/lib/ronin/vulns/root.rb
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
data/lib/ronin/vulns/sqli.rb
CHANGED
|
@@ -280,7 +280,7 @@ module Ronin
|
|
|
280
280
|
# The HTTP response object to check.
|
|
281
281
|
#
|
|
282
282
|
# @return [Boolean]
|
|
283
|
-
# Indicates whether the response was a `500` and if the
|
|
283
|
+
# Indicates whether the response was a `500` and if the response body
|
|
284
284
|
# contained a SQL error message.
|
|
285
285
|
#
|
|
286
286
|
def check_for_sql_errors(response)
|
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
data/lib/ronin/vulns/version.rb
CHANGED
|
@@ -2,7 +2,7 @@
|
|
|
2
2
|
#
|
|
3
3
|
# ronin-vulns - A Ruby library for blind vulnerability testing.
|
|
4
4
|
#
|
|
5
|
-
# Copyright (c)
|
|
5
|
+
# Copyright (c) 2022-2023 Hal Brodigan (postmodern.mod3 at gmail.com)
|
|
6
6
|
#
|
|
7
7
|
# ronin-vulns is free software: you can redistribute it and/or modify
|
|
8
8
|
# it under the terms of the GNU Lesser General Public License as published
|
|
@@ -21,6 +21,6 @@
|
|
|
21
21
|
module Ronin
|
|
22
22
|
module Vulns
|
|
23
23
|
# The ronin-vulns version
|
|
24
|
-
VERSION = '0.1.0
|
|
24
|
+
VERSION = '0.1.0'
|
|
25
25
|
end
|
|
26
26
|
end
|
data/man/ronin-vulns-rfi.1
CHANGED
data/man/ronin-vulns-rfi.1.md
CHANGED
data/man/ronin-vulns-scan.1
CHANGED
data/man/ronin-vulns-scan.1.md
CHANGED
|
@@ -74,7 +74,7 @@ additional arguments or read from a file using the `--input` option.
|
|
|
74
74
|
Explicitly specify the scripting language to test for.
|
|
75
75
|
|
|
76
76
|
`--rfi-test-script-url` *URL*
|
|
77
|
-
Use an
|
|
77
|
+
Use an alternative test script URL.
|
|
78
78
|
|
|
79
79
|
`--sqli-escape-quote`
|
|
80
80
|
Escapes quotation marks.
|
data/ronin-vulns.gemspec
CHANGED
|
@@ -25,14 +25,14 @@ Gem::Specification.new do |gem|
|
|
|
25
25
|
gem.files = `git ls-files`.split($/)
|
|
26
26
|
gem.files = glob[gemspec['files']] if gemspec['files']
|
|
27
27
|
gem.files += Array(gemspec['generated_files'])
|
|
28
|
-
|
|
28
|
+
# exclude test files from the packages gem
|
|
29
|
+
gem.files -= glob[gemspec['test_files'] || 'spec/{**/}*']
|
|
29
30
|
|
|
30
31
|
gem.executables = gemspec.fetch('executables') do
|
|
31
32
|
glob['bin/*'].map { |path| File.basename(path) }
|
|
32
33
|
end
|
|
33
34
|
|
|
34
35
|
gem.extensions = glob[gemspec['extensions'] || 'ext/**/extconf.rb']
|
|
35
|
-
gem.test_files = glob[gemspec['test_files'] || 'spec/{**/}*_spec.rb']
|
|
36
36
|
gem.extra_rdoc_files = glob[gemspec['extra_doc_files'] || '*.{txt,md}']
|
|
37
37
|
|
|
38
38
|
gem.require_paths = Array(gemspec.fetch('require_paths') {
|
metadata
CHANGED
|
@@ -1,14 +1,14 @@
|
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
|
2
2
|
name: ronin-vulns
|
|
3
3
|
version: !ruby/object:Gem::Version
|
|
4
|
-
version: 0.1.0
|
|
4
|
+
version: 0.1.0
|
|
5
5
|
platform: ruby
|
|
6
6
|
authors:
|
|
7
7
|
- Postmodern
|
|
8
8
|
autorequire:
|
|
9
9
|
bindir: bin
|
|
10
10
|
cert_chain: []
|
|
11
|
-
date: 2023-
|
|
11
|
+
date: 2023-02-01 00:00:00.000000000 Z
|
|
12
12
|
dependencies:
|
|
13
13
|
- !ruby/object:Gem::Dependency
|
|
14
14
|
name: ronin-support
|
|
@@ -16,28 +16,28 @@ dependencies:
|
|
|
16
16
|
requirements:
|
|
17
17
|
- - "~>"
|
|
18
18
|
- !ruby/object:Gem::Version
|
|
19
|
-
version: 1.0
|
|
19
|
+
version: '1.0'
|
|
20
20
|
type: :runtime
|
|
21
21
|
prerelease: false
|
|
22
22
|
version_requirements: !ruby/object:Gem::Requirement
|
|
23
23
|
requirements:
|
|
24
24
|
- - "~>"
|
|
25
25
|
- !ruby/object:Gem::Version
|
|
26
|
-
version: 1.0
|
|
26
|
+
version: '1.0'
|
|
27
27
|
- !ruby/object:Gem::Dependency
|
|
28
28
|
name: ronin-core
|
|
29
29
|
requirement: !ruby/object:Gem::Requirement
|
|
30
30
|
requirements:
|
|
31
31
|
- - "~>"
|
|
32
32
|
- !ruby/object:Gem::Version
|
|
33
|
-
version: 0.1
|
|
33
|
+
version: '0.1'
|
|
34
34
|
type: :runtime
|
|
35
35
|
prerelease: false
|
|
36
36
|
version_requirements: !ruby/object:Gem::Requirement
|
|
37
37
|
requirements:
|
|
38
38
|
- - "~>"
|
|
39
39
|
- !ruby/object:Gem::Version
|
|
40
|
-
version: 0.1
|
|
40
|
+
version: '0.1'
|
|
41
41
|
- !ruby/object:Gem::Dependency
|
|
42
42
|
name: bundler
|
|
43
43
|
requirement: !ruby/object:Gem::Requirement
|
|
@@ -132,10 +132,10 @@ homepage: https://ronin-rb.dev/
|
|
|
132
132
|
licenses:
|
|
133
133
|
- LGPL-3.0
|
|
134
134
|
metadata:
|
|
135
|
-
documentation_uri: https://
|
|
135
|
+
documentation_uri: https://ronin-rb.dev/docs/ronin-vulns
|
|
136
136
|
source_code_uri: https://github.com/ronin-rb/ronin-vulns
|
|
137
137
|
bug_tracker_uri: https://github.com/ronin-rb/ronin-vulns/issues
|
|
138
|
-
changelog_uri: https://github.com/ronin-rb/ronin-vulns/blob/
|
|
138
|
+
changelog_uri: https://github.com/ronin-rb/ronin-vulns/blob/main/ChangeLog.md
|
|
139
139
|
rubygems_mfa_required: 'true'
|
|
140
140
|
post_install_message:
|
|
141
141
|
rdoc_options: []
|