#!/usr/bin/python -tO # freewvs 0.1 - the free web vulnerability scanner # # https://source.schokokeks.org/freewvs/ # # Written 2007-2012 by schokokeks.org Hosting, https://schokokeks.org # # Contributions by # Hanno Boeck, https://hboeck.de/ # Fabian Fingerle, https://fabian-fingerle.de/ # Bernd Wurst, https://bwurst.org/ # # To the extent possible under law, the author(s) have dedicated all copyright # and related and neighboring rights to this software to the public domain # worldwide. This software is distributed without any warranty. # # You should have received a copy of the CC0 Public Domain Dedication along # with this software. If not, see # https://creativecommons.org/publicdomain/zero/1.0/ # Nevertheless, in case you use a significant part of this code, we ask (but # not require, see the license) that you keep the authors' names in place and # return your changes to the public. We would be especially happy if you tell # us what you're going to do with this code. try: # python3 import configparser except ImportError: # python2 import ConfigParser as configparser # overwrite default open() function # this one supports encoding='...' from codecs import open import os import glob import pprint import re import optparse import sys import gettext from xml.sax.saxutils import escape gettext.textdomain('freewvs') _ = gettext.gettext def versioncompare(safe_version, find_version): if safe_version == [""]: return True for i in range(min(len(find_version), len(safe_version))): if int(find_version[i]) < int(safe_version[i]): return True if int(find_version[i]) > int(safe_version[i]): return False return (len(find_version) < len(safe_version)) def vulnprint(appname, version, safeversion, vuln, vfilename, subdir, style=None): appdir = '/'.join(os.path.abspath(vfilename).split('/')[:-1-subdir]) if not style: print("%(appname)s %(version)s (%(safeversion)s) %(vuln)s " "%(appdir)s" % vars()) elif style == 'fancy': print(_("Directory: %(appdir)s") % vars()) if safeversion != "ok": if safeversion != "": print(_("Vulnerable %(appname)s %(version)s found, please " "update to %(safeversion)s or above.") % vars()) else: print(_("Vulnerable %(appname)s %(version)s found, no fixed " "version available.") % vars()) if vuln[:3] == "CVE": print(_("https://cve.mitre.org/cgi-bin/cvename.cgi?name=" "%(vuln)s") % vars()) else: print(vuln) else: print(_("%(appname)s %(version)s found.") % vars()) print("") elif style == 'xml': state = 'vulnerable' if safeversion == 'ok': state = 'ok' print(' ' % state) print(' %s' % escape(appname)) print(' %s' % escape(version)) print(' %s' % escape(appdir)) if state == 'vulnerable': print(' %s' % escape(safeversion)) print(' %s' % escape(vuln)) print(' ') pp = pprint.PrettyPrinter(indent=4) # Command-line options parser = optparse.OptionParser(usage="usage: %prog [options] " "[ ...]") parser.add_option("-a", "--all", action="store_true", dest="ALL", help="Show all webapps found, not just vulnerable") parser.add_option("-d", "--debug", action="store_true", dest="DEBUG", help="Show lots of debugging output, mainly useful" "for development") parser.add_option("-f", "--fancy", action="store_const", dest="OUTPUT", const="fancy", help="Show more fancy output") parser.add_option("-x", "--xml", action="store_const", dest="OUTPUT", const="xml", help="Output results as XML") opts, args = parser.parse_args() # Parse vulnerability database config = configparser.ConfigParser() try: config.read(glob.glob('/usr/share/freewvs/*.freewvs')) config.read(glob.glob('/usr/local/share/freewvs/*.freewvs')) config.read(glob.glob(os.path.dirname(sys.argv[0])+'/freewvsdb/*.freewvs')) except configparser.MissingSectionHeaderError as err: print("Error parsing config files: %s" % err) vdb = [] for sect in config.sections(): item = {} # base options item['name'] = sect item['safe'] = config.get(sect, 'safe') item['file'] = config.get(sect, 'file') item['vuln'] = config.get(sect, 'vuln') item['subdir'] = int(config.get(sect, 'subdir')) # match magic item['variable'] = [] for var in config.get(sect, 'variable').split(","): item['variable'].append(re.compile(re.escape(var) + r"[^0-9\n\r]*[.]*([0-9.]*[0-9])[^0-9.]")) # optional options if config.has_option(sect, 'extra_match'): item['extra_match'] = config.get(sect, 'extra_match') else: item['extra_match'] = False if config.has_option(sect, 'extra_nomatch'): item['extra_nomatch'] = config.get(sect, 'extra_nomatch') else: item['extra_nomatch'] = False if config.has_option(sect, 'add_minor'): item['add_minor'] = config.get(sect, 'add_minor') else: item['add_minor'] = False if config.has_option(sect, 'old_safe'): item['old_safe'] = config.get(sect, 'old_safe').split(",") else: item['old_safe'] = [] vdb.append(item) if opts.DEBUG: pp.pprint(vdb) if opts.OUTPUT == 'xml': print('') print('') # start the search for fdir in args: for root, NULL, files in os.walk(fdir): for filename in files: for item in vdb: if filename == item['file']: mfile = os.path.join(root, filename) try: file = open(mfile) except: continue filestr = file.read() file.close() if item['extra_match']: ematch = (filestr.find(item['extra_match']) != -1) elif item['extra_nomatch']: ematch = not (filestr.find(item['extra_nomatch']) != -1) else: ematch = True findversion = [] for var in item['variable']: var = var.search(filestr) if not var: findversion = False break else: findversion.append(var.group(1)) if findversion and ematch: findversion = '.'.join(findversion) # Very ugly phpbb workaround if item['add_minor']: findversion = findversion.split('.') findversion[-1] = str(int(findversion[-1]) + int(item['add_minor'])) findversion = '.'.join(findversion) if not (versioncompare(item['safe'].split('.'), findversion.split('.'))) or \ item['old_safe'].count(findversion) > 0: if opts.ALL: if opts.DEBUG: print("File "+mfile) vulnprint(item['name'], findversion, "ok", "", mfile, item['subdir'], opts.OUTPUT) else: if opts.DEBUG: print("File " + mfile) safev = "9999" for ver in item['old_safe']: if(versioncompare(ver.split('.'), findversion.split('.')) and not versioncompare(ver.split('.'), safev.split('.'))): safev = ver if safev == "9999": safev = item['safe'] vulnprint(item['name'], findversion, safev, item['vuln'], mfile, item['subdir'], opts.OUTPUT) else: if opts.DEBUG: print("regexp failed for " + item['name'] + " on " + mfile) if opts.OUTPUT == 'xml': print('')