Skip to content

Releases: ronin-rb/ronin-vulns

0.1.4

19 Sep 22:29
v0.1.4
Compare
Choose a tag to compare

CLI

  • Improved the performance of ronin-vulns commands when scanning multiple URLs
    or a file of URLs by not rebuilding an identical
    Ronin::Vulns::CLI::WebVulnCommand#scan_kwargs for each URL.
  • Allow the --cookie "..." option to be repeated multiple times and merge the
    cookie strings together.
  • Allow the --cookie-param NAME=VALUE option to be used with the
    --cookie "..." option and merge the cookie values together.
  • Print vulnerable param names in single quotes.

0.1.3

08 Jul 00:46
v0.1.3
Compare
Choose a tag to compare
  • Fixed a bug in Ronin::Vulns::SSTI.scan where when called without escape:
    it would not return all found vulnerabilities.
  • Fixed a bug in Ronin::Vulns::SQLI.scan where repeat requests would be sent
    even if escape_quote:, escape_parens:, or terminate: keyword arguments
    are given.
  • Improved Ronin::Vulns::ReflectedXSS::Context to detect when the XSS occurs
    after or inside of an HTML comment. (@quadule)

0.1.2

10 Jun 00:48
v0.1.2
Compare
Choose a tag to compare
  • Require ronin-support ~> 1.0, >= 1.0.1

0.1.1

10 Jun 00:47
v0.1.1
Compare
Choose a tag to compare
  • Fixed typo in Ronin::Vulns::CLI::WebVulnCommand#process_url which effected
    the ronin-vulns lfi command and others.

0.1.0

10 Jun 00:46
v0.1.0
Compare
Choose a tag to compare
  • Initial release:
    • Require ruby >= 3.0.0.
    • Supports testing for:
      • Local File Inclusion (LFI)
      • Remote File Inclusion (RFI)
        • PHP
        • ASP Class / ASP.NET
        • JSP
        • ColdFusion
        • Perl
      • SQL Injection (SQLi)
      • Reflected Cross Site Scripting (XSS)
      • Server Side Template Injection (SSTI)
      • Open Redirects
    • Supports testing:
      • URL query parameters.
      • HTTP Headers.
      • HTTP Cookie parameters.
      • Form parameters.