FreeBSD Bugzilla – Attachment 53302 Details for
Bug 80639
[NEW PORT] www/gwee: Tool to exploit command execution vulnerabilities in web scripts
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
gwee.shar
gwee.shar (text/plain), 1.97 KB, created by
chinsan
on 2005-05-05 06:10:00 UTC
(
hide
)
Description:
gwee.shar
Filename:
MIME Type:
Creator:
chinsan
Created:
2005-05-05 06:10:00 UTC
Size:
1.97 KB
patch
obsolete
># This is a shell archive. Save it in a file, remove anything before ># this line, and then unpack it by entering "sh file". Note, it may ># create directories; files and directories will be owned by you and ># have default permissions. ># ># This archive contains: ># ># . ># ./Makefile ># ./distinfo ># ./pkg-descr ># >echo c - . >mkdir -p . > /dev/null 2>&1 >echo x - ./Makefile >sed 's/^X//' >./Makefile << 'END-of-./Makefile' >X# New ports collection makefile for: gwee >X# Date created: 2005-05-04 >X# Whom: chinsan <chinsan@mail2000.com.tw> >X# >X# $FreeBSD$ >X# >X >XPORTNAME= gwee >XPORTVERSION= 1.36 >XCATEGORIES= www security >XMASTER_SITES= http://tigerteam.se/dl/gwee/ >X >XMAINTAINER= ports@FreeBSD.org >XCOMMENT= Tool to exploit command execution vulnerabilities in web scripts >X >XRUN_DEPENDS= ${PYTHON_CMD}:${PORTSDIR}/lang/python >X >XUSE_OPENSSL= yes >XUSE_PERL5= yes >X >XMAKE_ARGS= unix >XALL_TARGET= ${PORTNAME} >XMAN1= ${PORTNAME}.1 >X >XPLIST_FILES= bin/${PORTNAME} >X >Xdo-install: >X ${INSTALL_PROGRAM} ${WRKSRC}/${PORTNAME} ${PREFIX}/bin >X ${INSTALL_MAN} ${WRKSRC}/${PORTNAME}.1 ${MANPREFIX}/man/man1 >X >X.include <bsd.port.mk> >END-of-./Makefile >echo x - ./distinfo >sed 's/^X//' >./distinfo << 'END-of-./distinfo' >XMD5 (gwee-1.36.tar.gz) = 4e0c09fdc6a261e80bdba34aba1f9a29 >XSIZE (gwee-1.36.tar.gz) = 313562 >END-of-./distinfo >echo x - ./pkg-descr >sed 's/^X//' >./pkg-descr << 'END-of-./pkg-descr' >Xgwee (Generic Web Exploitation Engine) is a small program written in C >Xdesigned to exploit input validation vulnerabilities in web scripts, such as >XPerl CGIs, PHP, etc. >X >Xgwee is much like an exploit, except more general-purpose. It features several >Xreverse (connecting) shellcodes (x86 Linux, FreeBSD, NetBSD, Perl script (universal), >XPython script (universal)), 4 methods of injecting (executing) them, >Xbuilt-in http/https client and built-in server (listener) for receiving connections >X(and remote shell) from injected shellcodes. >X >XWWW: http://tigerteam.se/dl/gwee/ >END-of-./pkg-descr >exit
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 80639
: 53302