/w3af/core/data/constants/vulns.py

https://github.com/andresriancho/w3af · Python · 260 lines · 219 code · 11 blank · 30 comment · 0 complexity · 8bb1a749378faf14ce8159bf1adb30f7 MD5 · raw file

  1. """
  2. vulns.py
  3. Copyright 2012 Andres Riancho
  4. This file is part of w3af, http://w3af.org/ .
  5. w3af is free software; you can redistribute it and/or modify
  6. it under the terms of the GNU General Public License as published by
  7. the Free Software Foundation version 2 of the License.
  8. w3af is distributed in the hope that it will be useful,
  9. but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. GNU General Public License for more details.
  12. You should have received a copy of the GNU General Public License
  13. along with w3af; if not, write to the Free Software
  14. Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
  15. """
  16. VULNS = {
  17. 'TestCase': None,
  18. # Core
  19. 'Target redirect': None,
  20. # Audit
  21. 'Blind SQL injection vulnerability': 46,
  22. 'Buffer overflow vulnerability': None,
  23. 'Sensitive CORS methods enabled': None,
  24. 'Uncommon CORS methods enabled': None,
  25. 'Access-Control-Allow-Origin set to "*"': None,
  26. 'Insecure Access-Control-Allow-Origin with credentials': None,
  27. 'Insecure Access-Control-Allow-Origin': None,
  28. 'Incorrect withCredentials implementation': None,
  29. 'CSRF vulnerability': 13,
  30. 'Insecure DAV configuration': 52,
  31. 'Publicly writable directory': 23,
  32. 'DAV incorrect configuration': None,
  33. 'Insecure file upload': 65,
  34. 'Format string vulnerability': None,
  35. 'Insecure Frontpage extensions configuration': 69,
  36. 'Insecure redirection': 50,
  37. 'Misconfigured access control': 20,
  38. 'LDAP injection vulnerability': 30,
  39. 'Local file inclusion vulnerability': 17,
  40. 'File read error': 73,
  41. 'MX injection vulnerability': None,
  42. 'OS commanding vulnerability': 36,
  43. 'Phishing vector': 74,
  44. 'Unsafe preg_replace usage': None,
  45. 'ReDoS vulnerability': None,
  46. 'Response splitting vulnerability': 41,
  47. 'Remote code execution': 42,
  48. 'Remote file inclusion': 42,
  49. 'Potential remote file inclusion': 42,
  50. 'SQL injection': 45,
  51. 'Server side include vulnerability': None,
  52. 'Persistent server side include vulnerability': None,
  53. 'Insecure SSL version': 66,
  54. 'Self-signed SSL certificate': 67,
  55. 'Invalid SSL connection': None,
  56. 'Soon to expire SSL certificate': None,
  57. 'SSL Certificate dump': None,
  58. 'Secure content over insecure channel': None,
  59. 'XPATH injection vulnerability': 54,
  60. 'Persistent Cross-Site Scripting vulnerability': 70,
  61. 'Cross site scripting vulnerability': 55,
  62. 'Cross site tracing vulnerability': 63,
  63. 'Parameter modifies response headers': None,
  64. 'eval() input injection vulnerability': 6,
  65. 'Reflected File Download vulnerability': 71,
  66. 'Shell shock vulnerability': 68,
  67. 'Rosetta Flash': None,
  68. 'Memcache injection vulnerability': None,
  69. # WebSockets
  70. 'Insecure WebSocket Origin filter': None,
  71. 'Open WebSocket': None,
  72. 'Origin restricted WebSocket': None,
  73. 'Websockets CSRF vulnerability': None,
  74. # Crawl
  75. 'dwsync.xml file found': None,
  76. 'phpinfo() file found': None,
  77. 'PHP register_globals: On': None,
  78. 'PHP allow_url_fopen: On': None,
  79. 'PHP allow_url_include: On': None,
  80. 'PHP display_errors: On': None,
  81. 'PHP expose_php: On': None,
  82. 'PHP lowest_privilege_test:fail': None,
  83. 'PHP disable_functions:few': None,
  84. 'PHP curl_file_support:not_fixed': None,
  85. 'PHP cgi_force_redirect: Off': None,
  86. 'PHP session.cookie_httponly: Off': None,
  87. 'PHP session_save_path:Everyone': None,
  88. 'PHP session_use_trans: On': None,
  89. 'PHP default_charset: Off': None,
  90. 'PHP enable_dl: On': None,
  91. 'PHP memory_limit:high': None,
  92. 'PHP post_max_size:high': None,
  93. 'PHP upload_max_filesize:high': None,
  94. 'PHP upload_tmp_dir:Everyone': None,
  95. 'PHP file_uploads: On': None,
  96. 'PHP magic_quotes_gpc: On': None,
  97. 'PHP magic_quotes_gpc: Off': None,
  98. 'PHP open_basedir:disabled': None,
  99. 'PHP open_basedir:enabled': None,
  100. 'PHP session.hash_function:md5': None,
  101. 'PHP session.hash_function:sha': None,
  102. 'Insecure URL': 9,
  103. '.listing file found': None,
  104. 'Operating system username and group leak': None,
  105. 'Google hack database match': None,
  106. 'Phishing scam': None,
  107. 'Source code repository': 14,
  108. 'Insecure RIA settings': None,
  109. 'Cross-domain allow ACL': None,
  110. 'Potential web backdoor': 2,
  111. 'Captcha image detected': 5,
  112. 'Oracle Application Server': None,
  113. 'Potentially interesting file': 4,
  114. 'urllist.txt file': None,
  115. 'Fingerprinted operating system': None,
  116. 'Identified installed application': None,
  117. 'robots.txt file': None,
  118. 'HTTP Content Negotiation enabled': None,
  119. 'Fingerprinted Wordpress version': None,
  120. 'Gears manifest resource': None,
  121. 'Invalid RIA settings file': None,
  122. 'Identified WordPress user': None,
  123. 'WordPress path disclosure': None,
  124. 'PHP register_globals: Off': None,
  125. 'PHP enable_dl: Off': None,
  126. 'Web user home directory': None,
  127. # Grep
  128. 'US Social Security Number disclosure': 48,
  129. 'DOM Cross site scripting': 56,
  130. 'Parameter has SQL sentence': None,
  131. 'Uncommon query string parameter': None,
  132. 'Credit card number disclosure': 12,
  133. 'Code disclosure vulnerability': 44,
  134. 'Code disclosure vulnerability in 404 page': 44,
  135. 'Unhandled error in web application': 73,
  136. 'Basic HTTP credentials': None,
  137. 'Authentication without www-authenticate header': None,
  138. 'NTLM authentication': None,
  139. 'HTTP Basic authentication': 77,
  140. 'Cookie without HttpOnly': 22,
  141. 'Secure cookie over HTTP': None,
  142. 'Secure flag missing in HTTPS cookie': 25,
  143. 'Secure cookies over insecure channel': None,
  144. 'Identified cookie': None,
  145. 'Cookie': None,
  146. 'Invalid cookie': None,
  147. 'Click-Jacking vulnerability': 53,
  148. 'Private IP disclosure vulnerability': 40,
  149. 'Directory indexing': 15,
  150. 'Path disclosure vulnerability': None,
  151. 'Missing cache control for HTTPS content': 72,
  152. 'SVN user disclosure vulnerability': None,
  153. 'HTTP Request in HTTP body': None,
  154. 'HTTP Response in HTTP body': None,
  155. 'Auto-completable form': 38,
  156. 'Session ID in URL': None,
  157. 'WSDL resource': None,
  158. 'DISCO resource': None,
  159. 'Symfony Framework with CSRF protection disabled': None,
  160. 'Descriptive error page': 73,
  161. 'Multiple descriptive error pages': 73,
  162. 'Error page with information disclosure': 73,
  163. 'Oracle application server': None,
  164. 'Strange header': None,
  165. 'Content-Location HTTP header anomaly': None,
  166. '.NET Event Validation is disabled': None,
  167. '.NET ViewState encryption is disabled': None,
  168. 'Email address disclosure': 16,
  169. 'Interesting HTML comment': None,
  170. 'HTML comment contains HTML code': None,
  171. 'Strange HTTP response code': 29,
  172. 'File upload form': 18,
  173. 'Interesting META tag': None,
  174. 'User defined regular expression match': None,
  175. 'Mark of the web': None,
  176. 'Cross-domain javascript source': None,
  177. 'Insecure X-XSS-Protection header usage': None,
  178. 'Browser plugin content': None,
  179. 'Strange HTTP Reason message': None,
  180. 'Hash string in HTML content': None,
  181. 'Blank http response body': None,
  182. 'Content feed resource': None,
  183. 'Malware identified': None,
  184. 'Insecure password submission over HTTP': 49,
  185. 'CSP vulnerability': None,
  186. 'Missing X-Content-Type-Options header': 76,
  187. 'Missing Strict Transport Security header': 19,
  188. 'Missing Expect-CT header': None,
  189. 'HTML5 WebSocket detected': None,
  190. 'Insecure password form access over HTTP': 49,
  191. # Infrastructure
  192. 'Potential XSS vulnerability': None,
  193. 'HTTP and HTTPs hop distance': None,
  194. 'HTTP traceroute': None,
  195. 'Apache Server version': None,
  196. 'Shared hosting': None,
  197. 'Virtual host identified': None,
  198. 'Previous defacements': None,
  199. 'Email account': None,
  200. 'Internal hostname in HTML link': None,
  201. 'Default virtual host': None,
  202. 'No DNS wildcard': None,
  203. 'DNS wildcard': None,
  204. 'Webserver fingerprint': None,
  205. 'Web Application Firewall fingerprint': None,
  206. 'FrontPage configuration information': None,
  207. 'Customized frontpage configuration': None,
  208. 'FrontPage FPAdminScriptUrl': None,
  209. 'Operating system': None,
  210. 'Favicon identification': None,
  211. 'Favicon identification failed': None,
  212. 'Transparent proxy detected': None,
  213. 'PHP Egg': None,
  214. 'Fingerprinted PHP version': None,
  215. 'Server header': None,
  216. 'Omitted server header': None,
  217. 'Powered-by header': None,
  218. 'Non existent methods default to GET': None,
  219. 'DAV methods enabled': None,
  220. 'Allowed HTTP methods': 1,
  221. 'Active filter detected': None,
  222. 'Reverse proxy identified': None,
  223. 'HTTP load balancer detected': None,
  224. 'Information disclosure via .NET errors': 73,
  225. 'Potential virtual host misconfiguration': None,
  226. 'MS15-034': None,
  227. 'JetLeak': None,
  228. 'Werkzeug debugger enabled': None,
  229. # Bruteforce
  230. 'Guessable credentials': 75,
  231. # Attack
  232. 'DAV Misconfiguration': 23,
  233. 'Arbitrary file upload': 65,
  234. 'OS Commanding code execution': 36,
  235. 'Code execution via remote file inclusion': 42,
  236. '(Blind) SQL injection': 46,
  237. 'Arbitrary file read': 17,
  238. 'Eval() code execution': 6,
  239. # Users can add their vulnerabilities
  240. 'Manually added vulnerability': None,
  241. }
  242. def is_valid_name(name):
  243. return name in VULNS