Bug 80639 - [NEW PORT] www/gwee: Tool to exploit command execution vulnerabilities in web scripts
Summary: [NEW PORT] www/gwee: Tool to exploit command execution vulnerabilities in web...
Status: Closed FIXED
Alias: None
Product: Ports & Packages
Classification: Unclassified
Component: Individual Port(s) (show other bugs)
Version: Latest
Hardware: Any Any
: Normal Affects Only Me
Assignee: Emanuel Haupt
URL:
Keywords:
Depends on:
Blocks:
 
Reported: 2005-05-05 06:10 UTC by chinsan
Modified: 2005-10-09 19:25 UTC (History)
0 users

See Also:


Attachments
gwee.shar (1.97 KB, text/plain)
2005-05-05 06:10 UTC, chinsan
no flags Details

Note You need to log in before you can comment on or make changes to this bug.
Description chinsan 2005-05-05 06:10:00 UTC
gwee (Generic Web Exploitation Engine) is a small program written in C
designed to exploit input validation vulnerabilities in web scripts, such as
Perl CGIs, PHP, etc.

WWW: http://tigerteam.se/dl/gwee/

How-To-Repeat: # mkdir /usr/ports/www/gwee ; cd /usr/ports/www/gwee
# sh gwee.shar 
# make install clean
Comment 1 Edwin Groothuis freebsd_committer freebsd_triage 2005-05-30 23:43:22 UTC
Commiter, please make sure that the maintainer section is set to
chinsan@mail2000.com.tw instead of ports@.

-- 
Edwin Groothuis
edwin@freebsd.org
http://www.mavetju.org
Comment 2 chinsan 2005-06-13 20:33:00 UTC
Sorry, please sign me(chinsan.tw@gmail.com) as port's maintainer.
Thank you. ~_~"
Comment 3 chinsan 2005-09-20 16:30:36 UTC
Hi:

Please fetch http://bbs.ilc.edu.tw/~chinsan/gwee.shar
This shar file including mime current email as port's maintainer.
Thank you! ^_^
Comment 4 Emanuel Haupt freebsd_committer freebsd_triage 2005-10-09 18:29:28 UTC
Responsible Changed
From-To: freebsd-ports-bugs->ehaupt

I will take it.
Comment 5 Emanuel Haupt freebsd_committer freebsd_triage 2005-10-09 19:23:35 UTC
State Changed
From-To: open->closed

Note: Port did not respect CFLAGS, use USE_PYTHON instead of pulling 
lang/python as RUN_DEPEND. Committed, thanks!