Skip to content

Commit bc0358b

Browse files
author
devloop
committed
Changed version number from SVN to 2.3.0
1 parent 165b6ae commit bc0358b

27 files changed

+71
-66
lines changed

README

+15-8
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
WAPITI - VERSION SVN
1+
WAPITI - VERSION 2.3.0
22
Wapiti is a web application security auditor.
33
http://wapiti.sourceforge.net/
44
http://www.ict-romulus.eu/web/wapiti/home
@@ -109,6 +109,7 @@ You can :
109109
+ Create some tools to convert cookies from browsers to Wapiti JSON format
110110
+ Improve the Flash SWF parser (write a basic ABC interpreter ?)
111111
+ Create a tool to convert PCAP files to Wapiti XML status files
112+
+ Translate Wapiti in your language
112113
+ Talk about Wapiti around you
113114

114115

@@ -154,7 +155,13 @@ Source code structure (wapitiCore directory)
154155
| | |-- es
155156
| | | `-- LC_MESSAGES
156157
| | | `-- wapiti.mo
157-
| | `-- fr
158+
| | |-- de
159+
| | | `-- LC_MESSAGES
160+
| | | `-- wapiti.mo
161+
| | |-- fr
162+
| | | `-- LC_MESSAGES
163+
| | | `-- wapiti.mo
164+
| | `-- ms
158165
| | `-- LC_MESSAGES
159166
| | `-- wapiti.mo
160167
| |
@@ -212,17 +219,17 @@ Source code structure (wapitiCore directory)
212219
| |-- vulneranetxmlreportgenerator.py
213220
| `-- xmlreportgenerator.py
214221
|
215-
|-- report_template # Template used for HTML reports
222+
`-- report_template # Template used for HTML reports
216223
|-- css
217224
| |-- kube.css
218225
| |-- kube.min.css
219226
| `-- master.css
220227
|-- index.html
221-
`-- js
222-
|-- jquery-1.9.1.min.js
223-
|-- kube.buttons.js
224-
`-- kube.tabs.js
225-
228+
|-- js
229+
| |-- jquery-1.9.1.min.js
230+
| |-- kube.buttons.js
231+
| `-- kube.tabs.js
232+
`-- logo_clear.png
226233

227234
Licensing
228235
=========

VERSION

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,2 +1,2 @@
1-
Wapiti SVN
1+
Wapiti 2.3.0
22
lswww 2.3.1

bin/wapiti

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ import urlparse
2323
import time
2424

2525
BASE_DIR = None
26-
WAPITI_VERSION = "Wapiti SVN"
26+
WAPITI_VERSION = "Wapiti 2.3.0"
2727

2828
if hasattr(sys, "frozen"):
2929
# For py2exe
@@ -321,7 +321,7 @@ if __name__ == "__main__":
321321
crawlerFile = None
322322
attackFile = None
323323

324-
print(_("Wapiti-SVN (wapiti.sourceforge.net)"))
324+
print(_("Wapiti-2.3.0 (wapiti.sourceforge.net)"))
325325

326326
# Fix bor bug #31
327327
if sys.getdefaultencoding() != "utf-8":

doc/AUTHORS

+7-7
Original file line numberDiff line numberDiff line change
@@ -2,10 +2,10 @@ Main Developer - Nicolas Surribas <nicolas.surribas (at) gmail.com>
22
http://devloop.users.sourceforge.net/
33
http://wapiti.sourceforge.net/
44

5-
Developer: David del Pozo
6-
Company: Informática Gesfor
7-
ITC Romulus Project: http://www.ict-romulus.eu/
8-
9-
Developer: Alberto Pastor
10-
Company: Informática Gesfor
11-
ITC Romulus Project: http://www.ict-romulus.eu/
5+
A Special thanks to the following people for the work on the version 2.3.0 :
6+
* David del Pozo (spanish translations)
7+
* Alberto Pastor (spanish translations)
8+
* Mattia Barbon (bugfixing and testing)
9+
* Le Gnou & Ecirbaf from www.gimp-attitude.org (new logo)
10+
* int23h (german translations)
11+
* Sindhu Kumar (malaysian translations and Windows testing)

doc/ChangeLog_Wapiti

+5-3
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
1-
XX/XX/2013
2-
Version X.X.X
1+
20/10/2013
2+
Version 2.3.0
33
Fixed a colosseum of bugs, especially related to unicode.
44
Software is much more stable.
55
New report template for HTML (using Kube CSS).
@@ -27,12 +27,14 @@ XX/XX/2013
2727
Can work on parameters that don't have a value in query string.
2828
mod_crlf is not activated by default anymore (must call it with -m).
2929
Startings URLs (-s) will be fetched even if out of scope.
30-
Proxy support for wapiti-getcookie.py. and wapiti-cookie.py.
30+
Proxy support for wapiti-getcookie. and wapiti-cookie.
3131
Attempt to bring an OpenVAS report generator.
3232
Added an home-made SWF parser to extract URLs from flash files.
3333
Added an home-made (and more than basic) JS interpreter based on the
3434
pynarcissus parser. Lot of work still needs to be done on this.
3535
New logo and webpage at wapiti.sf.net.
36+
Added german and malaysian translations.
37+
Added a script to create standalone archive for Windows (with py2exe).
3638

3739
29/12/2009
3840
Version 2.2.1 (already)

doc/example.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ Then, I scan the vulnerable website using the cookie and excluding the logout sc
1515

1616
bash-4.2$ wapiti http://127.0.0.1/vuln/ -c cookies.json -x http://127.0.0.1/vuln/logout.php
1717

18-
Wapiti-SVN (wapiti.sourceforge.net)
18+
Wapiti-2.3.0 (wapiti.sourceforge.net)
1919

2020
Note
2121
========

doc/wapiti.1.gz

0 Bytes
Binary file not shown.

make_exe.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@
99
if "py2exe" not in sys.argv:
1010
sys.argv.append("py2exe")
1111

12-
VERSION = "SVN"
12+
VERSION = "2.3.0"
1313

1414

1515
# Build file lists

setup.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
#!/usr/bin/python
22
from setuptools import setup, find_packages
33

4-
VERSION = "SVN"
4+
VERSION = "2.3.0"
55
DOC_DIR = "share/doc/wapiti"
66

77
doc_and_conf_files = []

wapitiCore/attack/mod_crlf.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,7 @@ def attackGET(self, http_res):
4646
if referer:
4747
headers["referer"] = referer
4848

49-
payload = self.HTTP.quote("http://www.google.fr\r\nwapiti: SVN version")
49+
payload = self.HTTP.quote("http://www.google.fr\r\nwapiti: 2.3.0 version")
5050
if not params_list:
5151
# Do not attack application-type files
5252
if not "content-type" in resp_headers:

wapitiCore/attack/mod_nikto.py

-1
Original file line numberDiff line numberDiff line change
@@ -135,7 +135,6 @@ def attack(self, urls, forms):
135135
else:
136136
print(u"+ {0}".format(evil_req.http_repr))
137137
except Exception, e:
138-
# TODO: deal with unicode problems when we extract urls from nikto_db
139138
continue
140139

141140
try:
Binary file not shown.
Binary file not shown.
Binary file not shown.
728 Bytes
Binary file not shown.
Binary file not shown.

wapitiCore/language_sources/de.po

+3-3
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ msgstr "Öffnen Sie {0}/index.html in einem Browser um diesen Bericht zu sehen."
158158
#: ../wapiti.py:410
159159
msgid "wapitiDoc"
160160
msgstr ""
161-
"Wapiti-SVN - Sicherheitsscanner für Webanwendungen \n"
161+
"Wapiti-2.3.0 - Sicherheitsscanner für Webanwendungen \n"
162162
" \n"
163163
" Befehlszeile: python wapiti.py http://server.com/base/url/ [Optionen] \n"
164164
" \n"
@@ -274,8 +274,8 @@ msgstr ""
274274
" "
275275

276276
#: ../wapiti.py:418
277-
msgid "Wapiti-SVN (wapiti.sourceforge.net)"
278-
msgstr "Wapiti-SVN (wapiti.sourceforge.net)"
277+
msgid "Wapiti-2.3.0 (wapiti.sourceforge.net)"
278+
msgstr "Wapiti-2.3.0 (wapiti.sourceforge.net)"
279279

280280
#: ../wapiti.py:549
281281
msgid "File {0} loaded. Wapiti will use it to perform the attack"

wapitiCore/language_sources/en.po

+3-3
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ msgstr "Open {0}/index.html with a browser to see this report."
158158
#: ../wapiti.py:410
159159
msgid "wapitiDoc"
160160
msgstr ""
161-
"Wapiti-SVN - Web application vulnerability scanner \n"
161+
"Wapiti-2.3.0 - Web application vulnerability scanner \n"
162162
" \n"
163163
" Usage: python wapiti.py http://server.com/base/url/ [options] \n"
164164
" \n"
@@ -274,8 +274,8 @@ msgstr ""
274274
" "
275275

276276
#: ../wapiti.py:418
277-
msgid "Wapiti-SVN (wapiti.sourceforge.net)"
278-
msgstr "Wapiti-SVN (wapiti.sourceforge.net)"
277+
msgid "Wapiti-2.3.0 (wapiti.sourceforge.net)"
278+
msgstr "Wapiti-2.3.0 (wapiti.sourceforge.net)"
279279

280280
#: ../wapiti.py:549
281281
msgid "File {0} loaded. Wapiti will use it to perform the attack"

wapitiCore/language_sources/es.po

+3-3
Original file line numberDiff line numberDiff line change
@@ -162,7 +162,7 @@ msgstr "Abrir {0}/index.html con el navegador para ver el informe"
162162
#: ../wapiti.py:410
163163
msgid "wapitiDoc"
164164
msgstr ""
165-
"Wapiti-SVN - Web application vulnerability scanner \n"
165+
"Wapiti-2.3.0 - Web application vulnerability scanner \n"
166166
" \n"
167167
" Uso: python wapiti.py http://server.com/base/url/ [options] \n"
168168
" \n"
@@ -274,8 +274,8 @@ msgstr ""
274274
" "
275275

276276
#: ../wapiti.py:418
277-
msgid "Wapiti-SVN (wapiti.sourceforge.net)"
278-
msgstr "Wapiti-SVN (wapiti.sourceforge.net)"
277+
msgid "Wapiti-2.3.0 (wapiti.sourceforge.net)"
278+
msgstr "Wapiti-2.3.0 (wapiti.sourceforge.net)"
279279

280280
#: ../wapiti.py:549
281281
msgid "File {0} loaded. Wapiti will use it to perform the attack"

wapitiCore/language_sources/fr.po

+16-16
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ msgstr ""
1717

1818
#: ../vulnerability.py:23
1919
msgid " Evil url: {0}"
20-
msgstr ""
20+
msgstr " Evil url: {0}"
2121

2222
#: ../vulnerability.py:24
2323
msgid "{0} in {1} via injection in the parameter {2}"
@@ -41,7 +41,7 @@ msgstr "Paramètre en cause : {0}"
4141

4242
#: ../vulnerability.py:29
4343
msgid "Evil request:"
44-
msgstr ""
44+
msgstr "Evil request:"
4545

4646
#: ../vulnerability.py:67
4747
msgid "SQL Injection"
@@ -158,7 +158,7 @@ msgstr "Ouvrez {0}/index.html dans un navigateur pour voir ce rapport."
158158
#: ../wapiti.py:410
159159
msgid "wapitiDoc"
160160
msgstr ""
161-
"Wapiti-SVN - Un scanneur de vulnérabilités pour applications web \n"
161+
"Wapiti-2.3.0 - Un scanneur de vulnérabilités pour applications web \n"
162162
" \n"
163163
" Mode d'emploi : python wapiti.py http://server.com/base/url/ [options] \n"
164164
" \n"
@@ -273,16 +273,16 @@ msgstr ""
273273
" "
274274

275275
#: ../wapiti.py:418
276-
msgid "Wapiti-SVN (wapiti.sourceforge.net)"
277-
msgstr ""
276+
msgid "Wapiti-2.3.0 (wapiti.sourceforge.net)"
277+
msgstr "Wapiti-2.3.0 (wapiti.sourceforge.net)"
278278

279279
#: ../wapiti.py:549
280280
msgid "File {0} loaded. Wapiti will use it to perform the attack"
281281
msgstr "Fichier {0} chargé. Wapiti va s'en servir pour effectuer l'attaque"
282282

283283
#: ../attack/attack.py:166
284284
msgid "+ attackGET {0}"
285-
msgstr ""
285+
msgstr "+ attackGET {0}"
286286

287287
#: ../attack/attack.py:171 ../attack/attack.py:185
288288
#: ../attack/mod_permanentxss.py:87 ../attack/mod_permanentxss.py:89
@@ -328,7 +328,7 @@ msgstr "Injection CRLF"
328328

329329
#: ../attack/mod_crlf.py:70 ../attack/mod_crlf.py:77
330330
msgid "(QUERY_STRING)"
331-
msgstr ""
331+
msgstr "(QUERY_STRING)"
332332

333333
#: ../attack/mod_crlf.py:121
334334
msgid "Error: The server did not understand this request"
@@ -408,7 +408,7 @@ msgstr "Code source :"
408408

409409
#: ../attack/mod_htaccess.py:94
410410
msgid "{0} HtAccess"
411-
msgstr ""
411+
msgstr "{0} HtAccess"
412412

413413
#: ../attack/mod_htaccess.py:95
414414
msgid " .htaccess bypass vulnerability: {0}"
@@ -529,7 +529,7 @@ msgstr "Veuillez renseignr les champs pour le formulaire suivant : "
529529

530530
#: ../net/getcookie.py:121
531531
msgid "url = {0}"
532-
msgstr ""
532+
msgstr "url = {0}"
533533

534534
#: ../net/cookie.py:75
535535
msgid "Error getting url {0}"
@@ -593,7 +593,7 @@ msgstr "Pour reprendre ce scan, vous pouvez lancer wapiti avec l'option \"-i\""
593593

594594
#: ../net/lswww.py:729
595595
msgid "URLs"
596-
msgstr ""
596+
msgstr "URLs"
597597

598598
#: ../net/lswww.py:736
599599
msgid "Forms Info"
@@ -625,19 +625,19 @@ msgstr " * Méthode : {0}"
625625

626626
#: ../net/lswww.py:1016
627627
msgid " * Intputs:"
628-
msgstr ""
628+
msgstr " * Intputs:"
629629

630630
#: ../net/lswww.py:1021
631631
msgid " * Selects:"
632-
msgstr ""
632+
msgstr " * Selects:"
633633

634634
#: ../net/lswww.py:1026
635635
msgid " * TextAreas:"
636-
msgstr ""
636+
msgstr " * TextAreas:"
637637

638638
#: ../net/lswww.py:1032
639639
msgid "URLS"
640-
msgstr ""
640+
msgstr "URLS"
641641

642642
#: ../report/txtreportgenerator.py:69
643643
msgid "Report for {0}\n"
@@ -657,11 +657,11 @@ msgstr "Résumé des vulnérabilités :"
657657

658658
#: ../report/txtreportgenerator.py:78
659659
msgid "{0} : {1:>3}\n"
660-
msgstr ""
660+
msgstr "{0} : {1:>3}\n"
661661

662662
#: ../report/txtreportgenerator.py:88 ../report/txtreportgenerator.py:105
663663
msgid "Evil request:\n"
664-
msgstr ""
664+
msgstr "Evil request:\n"
665665

666666
#: ../report/txtreportgenerator.py:91
667667
msgid "cURL command PoC : \"{0}\""

wapitiCore/language_sources/ms.po

+3-3
Original file line numberDiff line numberDiff line change
@@ -158,7 +158,7 @@ msgstr "Buka {0}/index.html dengan pelayar web untuk melihat laporan ini."
158158
#: ../wapiti.py:410
159159
msgid "wapitiDoc"
160160
msgstr ""
161-
"Wapiti-SVN - Pengimbas kerentanan aplikasi web dan sekuriti auditor \n"
161+
"Wapiti-2.3.0 - Pengimbas kerentanan aplikasi web dan sekuriti auditor \n"
162162
" \n"
163163
" Usage: python wapiti.py http://server.com/base/url/ [options] \n"
164164
" \n"
@@ -274,8 +274,8 @@ msgstr ""
274274
" "
275275

276276
#: ../wapiti.py:418
277-
msgid "Wapiti-SVN (wapiti.sourceforge.net)"
278-
msgstr "Wapiti-SVN (wapiti.sourceforge.net)"
277+
msgid "Wapiti-2.3.0 (wapiti.sourceforge.net)"
278+
msgstr "Wapiti-2.3.0 (wapiti.sourceforge.net)"
279279

280280
#: ../wapiti.py:549
281281
msgid "File {0} loaded. Wapiti will use it to perform the attack"

wapitiCore/net/HTTP.py

-2
Original file line numberDiff line numberDiff line change
@@ -147,7 +147,6 @@ def __hash__(self):
147147
post_kv = tuple([tuple(param) for param in self._post_params])
148148
file_kv = tuple([tuple([param[0], param[1][0]]) for param in self._file_params])
149149

150-
# TODO: should the referer be in the hash ?
151150
self._cached_hash = hash((self._method, self._resource_path,
152151
get_kv, post_kv, file_kv))
153152
return self._cached_hash
@@ -518,7 +517,6 @@ def send(self, target, method="",
518517
if not file_data:
519518
_headers.update({'content-type': 'application/x-www-form-urlencoded'})
520519

521-
# TODO: For POST use the TooManyRedirects exception instead ?
522520
resp = self.h.post(target.path,
523521
params=get_data,
524522
data=post_data,

wapitiCore/net/crawlerpersister.py

-1
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,6 @@ class CrawlerPersister(object):
6565
browsed = []
6666
# forms contains only POST resources
6767
forms = []
68-
#TODO? Keep it for the moment
6968
uploads = []
7069
headers = {}
7170
rootURL = ""

0 commit comments

Comments
 (0)