Skip to content

Commit de83aee

Browse files
authored
updated to v5.6.1
1 parent c41bbce commit de83aee

File tree

19 files changed

+553
-1186
lines changed

19 files changed

+553
-1186
lines changed

README.md

Lines changed: 95 additions & 60 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
11
# Waymap - Web Vulnerability Scanner.
22

3-
**Current Version**: 5.5.1
3+
**Current Version**: 5.6.1
44
**Author**: Trix Cyrus
55
**Copyright**: © 2024 Trixsec Org
66
**Maintained**: Yes
77

88
## What is Waymap?
9-
Waymap is a fast and optimized And Automated web vulnerability scanner designed for penetration testers. It effectively identifies vulnerabilities by testing against a variety of payloads.
9+
**Waymap** is a fast and optimized web vulnerability scanner designed to identify security flaws in web applications. With support for multiple scan types and customizable configurations, it is a versatile tool for ethical hackers, penetration testers, and security enthusiasts. And Is Able To Scan For **75+ Web Vulnerabilities**
1010

1111
### Demo Video
1212
Check out this video to see Waymap in action:
@@ -51,76 +51,111 @@ Check out this video to see Waymap in action:
5151
- 11 Critical-Risk CVEs And 34 High-Risk CVEs
5252
- For CVEs Info Read The CVEVULN.md File
5353

54-
### Waymap Features
55-
56-
1. **Vulnerability Scanning Modules:**
57-
- SQL Injection (SQLi)
58-
- Command Injection
59-
- Server-Side Template Injection (SSTI)
60-
- Cross-Site Scripting (XSS) with filter bypass payload testing
61-
- Local File Inclusion (LFI)
62-
- Open Redirect
63-
- Carriage Return and Line Feed (CRLF)
64-
- Cross-Origin Resource Sharing (CORS)
65-
- Critical and High-Risk Scan Profiles (45 CVEs: WordPress - 19, Drupal - 4, Joomla - 7, Generic/Others - 2)
66-
67-
2. **Web Crawling:**
68-
- Initial crawling functionality
69-
- Enhanced crawler to operate within target domain boundaries and handle URL redirection
70-
- Advanced crawler capable of any-depth crawling
71-
- Improved v3 crawler (competitive with SQLmap crawler)
72-
73-
3. **Concurrency & Threading:**
74-
- Concurrency to utilize multiple CPU threads for faster scans
75-
- Custom thread count for Open Redirect, CRLF, and CORS scans
76-
- New argument `--threads/-T` for global threading count (no prompt for threads)
77-
78-
4. **Multi-Target Scanning:**
79-
- Support for scanning multiple URLs with `--multi-target {targetfilename}.txt`
80-
- Ability to scan URLs directly without crawling using `--url/-u` and `--multi-url/-mu` arguments
81-
82-
5. **Automation and Convenience:**
83-
- Auto-update functionality (version-dependent)
84-
- New argument `--check-updates` to check for and perform updates
85-
- New argument `--random-agent` to randomize user-agents
86-
- Header usage to make requests appear more legitimate and reduce detection/blocking
87-
- Argument `--no-prompt/-np` to disable prompts (default input = 'n')
88-
89-
6. **Scan Profiles & Severity-Based Scanning:**
90-
- New critical and high-risk scan profiles (`--scan critical-risk` and `--scan high-risk`) using severity-based CVE exploits
91-
- Argument `--profile critical-risk/high-risk` with `--profileurl` for streamlined scanning based on CVE severity
92-
93-
7. **Logging and Stability:**
94-
- Logging functionality for scan sessions
95-
- Various bug fixes and optimizations for stability and processing speed
54+
#### v5.6.1
55+
- Added New 19 CVEs Vulnerability Detections Logics
56+
- 8 Critical-Risk CVEs And 11 High-Risk CVEs
57+
- For CVEs Info Read The CVEVULN.md File
9658

9759
---
9860

99-
## Installation and Usage
61+
## 🚀 **Features**
62+
63+
### 1. **Flexible Scanning Options**
64+
- **Target-based scanning:**
65+
Scan single or multiple targets using `--target` or `--multi-target` options (Requires Crawling).
66+
- **Direct URL scanning:**
67+
Use `--url` or `--multi-url` to scan specific URLs without crawling.
68+
- **Profile-based scanning:**
69+
Supports high-risk and critical-risk scan profiles for targeted assessments.
70+
71+
### 2. **Supported Scan Types**
72+
- **SQL Injection (SQLi):**
73+
Detect vulnerabilities related to SQL injection.
74+
- **Command Injection (CMDi):**
75+
Identify potential command execution vulnerabilities.
76+
- **Server-Side Template Injection (SSTI):**
77+
Scan for template injection risks in server-side frameworks.
78+
- **Cross-Site Scripting (XSS):**
79+
Check for reflective XSS vulnerabilities.
80+
- **Local File Inclusion (LFI):**
81+
Locate file inclusion vulnerabilities.
82+
- **Open Redirect:**
83+
Identify redirect-related issues.
84+
- **Carriage Return and Line Feed (CRLF):**
85+
Scan for CRLF injection flaws.
86+
- **Cross-Origin Resource Sharing (CORS):**
87+
Check for misconfigurations in CORS policies.
88+
- **All-in-one scanning:**
89+
Perform all available scans in a single command.
90+
91+
### 3. **Profile-based Scanning**
92+
- **High-Risk Profile:**
93+
- **Critical-Risk Profile:**
94+
Focuses on severe vulnerabilities, such as CVE-based attacks.
95+
96+
### 4. **Crawling Capabilities**
97+
- Crawl target websites with customizable depth (`--crawl`).
98+
- Automatically discover and extract URLs for scanning.
99+
100+
### 5. **Threaded Scanning**
101+
- Speed up scans with multithreading (`--threads`).
102+
103+
### 6. **User-Agent Randomization**
104+
- Randomize requests using different user agents (`--random-agent`).
105+
106+
### 7. **Automation Features**
107+
- Skip prompts using the `--no-prompt` option.
108+
- Automatically handle missing directories, files, and session data.
109+
110+
### 8. **Update Checker**
111+
- Easily check for the latest updates (`--check-updates`).
100112

101-
### Clone the repository:
102-
```bash
103-
git clone https://github.com/TrixSec/waymap.git
104-
```
113+
---
105114

106-
### Install the required dependencies:
107-
```bash
108-
pip install .
109-
```
115+
## 🛠️ **How to Use**
116+
117+
### Basic Commands
118+
1. **Scan a single target:**
119+
```bash
120+
python waymap.py --crawl 3 --target https://example.com --scan {scan_type}
121+
```
122+
2. **Scan multiple targets from a file:**
123+
```bash
124+
python waymap.py --crawl 3 --multi-target targets.txt --scan {scan_type}
125+
```
126+
3. **Directly scan a single URL:**
127+
```bash
128+
python waymap.py --url https://example.com/page?id=1 --scan {scan_type}
129+
```
130+
4. **Profile-based scanning:**
131+
```bash
132+
python waymap.py --profileurl https://example.com --profile high-risk/critical-risk
133+
```
134+
135+
### Thread Configuration
136+
1. **Use threading for faster scans:**
137+
```bash
138+
python waymap.py --crawl 3 --target https://example.com --scan ssti --threads 10
139+
```
140+
141+
### Update Check
142+
1. **Ensure you have the latest version:**
143+
```bash
144+
python waymap.py --check-updates
145+
```
110146

111-
### Run Waymap:
112-
```bash
113-
python waymap.py --crawl 1 --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --target/--multi-target https://example.com/{filename}.txt
114-
```
115-
```bash
116-
python waymap.py --scan sql/cmdi/ssti/xss/lfi/open-redirect/crlf/cors/all --url/--mutli-url https://example.com/index.php?id=1/{filename}.txt
117-
```
118147
### Check Help
119148
```bash
120149
python waymap.py -h
121150

122151
```
123152

153+
---
154+
155+
156+
### Waymap makes web vulnerability scanning efficient and accessible. Start securing your applications today! 🎯
157+
158+
124159
#### Credits
125160
- Thanks SQLMAP For Payloads Xml File
126161

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
5.5.1
1+
5.6.1

data/cveinfo.py

Lines changed: 26 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,6 @@
11
# Copyright (c) 2024 waymap developers
22
# See the file 'LICENSE' for copying permission.
3+
# Note: IF YOU ARE USING/COPYING THESE DATA YOU SHOULD HAVE ENOUGH PERMISSIONS FROM THE AUTHOR
34

45
# cve vuln version data
56
# cveinfo.py
@@ -16,7 +17,6 @@
1617
{"cve_id": "CVE-2023-28121", "plugin_name": "woocommerce-payments", "vulnerable_version": "5.6.2"},
1718
{"cve_id": "CVE-2024-7854", "plugin_name": "woo-inquiry", "vulnerable_version": "0.2"},
1819
{"cve_id": "CVE-2024-3673", "plugin_name": "web-directory-free", "vulnerable_version": "1.7.3"},
19-
2020
]
2121

2222
wphighcves = [
@@ -55,3 +55,28 @@
5555
{"cve_id": "CVE-2021-24741", "plugin_name": "supportboard", "vulnerable_version": "3.3.4"},
5656
{"cve_id": "CVE-2021-24774", "plugin_name": "check-email", "vulnerable_version": "1.0.3"},
5757
]
58+
59+
CVE_DATABASE_DRUPAL = [
60+
{"cve_id": "CVE-2006-2742", "vulnerable_version": "4.6 - 4.6.6, 4.7.0"},
61+
{"cve_id": "CVE-2007-6299", "vulnerable_version": "4.7 - 4.7.9, 5.0 - 5.4"},
62+
{"cve_id": "CVE-2014-3704", "vulnerable_version": "7.0 - 7.31"},
63+
{"cve_id": "CVE-2016-3163", "vulnerable_version": "6.0 - 6.38, 7.0 - 7.43"},
64+
{"cve_id": "CVE-2006-2831", "vulnerable_version": "4.6 - 4.6.8, 4.7 - 4.7.2"},
65+
{"cve_id": "CVE-2006-5476", "vulnerable_version": "4.6 - 4.6.10, 4.7 - 4.7.4"},
66+
{"cve_id": "CVE-2020-13671", "vulnerable_version": "9.0 - 9.0.8, 8.9 - 8.9.9, 8.8 - 8.8.11, 7 - 7.74"},
67+
{"cve_id": "CVE-2011-2687", "vulnerable_version": "7.0 - 7.3"},
68+
{"cve_id": "CVE-2016-6211", "vulnerable_version": "7.0 - 7.44"},
69+
{"cve_id": "CVE-2011-2726", "vulnerable_version": "7.0 - 7.5"},
70+
{"cve_id": "CVE-2016-3165", "vulnerable_version": "6 - 6.38"},
71+
]
72+
73+
CVE_DATACRIT_DRUPAL = [
74+
{"cve_id": "CVE-2008-6171", "vulnerable_version": "5.0 - 5.12, 6.0 - 6.6"},
75+
{"cve_id": "CVE-2018-7600", "vulnerable_version": "7.5 - 7.58, 8.0 - 8.3.9, 8.4 - 8.4.6, 8.5 - 8.5.1"},
76+
{"cve_id": "CVE-2017-6925", "vulnerable_version": "8 - 8.3.7"},
77+
{"cve_id": "CVE-2018-7602", "vulnerable_version": "7.0 - 8.0"},
78+
{"cve_id": "CVE-2020-13665", "vulnerable_version": "8.8 - 8.8.8, 8.9 - 8.9.1, 9.0 - 9.0.1"},
79+
{"cve_id": "CVE-2017-6920", "vulnerable_version": "8.0 - 8.3.3"},
80+
{"cve_id": "CVE-2019-6339", "vulnerable_version": "7 - 7.62, 8.6 - 8.6.6, 8.5 - 8.5.9"},
81+
{"cve_id": "CVE-2011-2715", "vulnerable_version": "6.20"},
82+
]

doc/CVEVULN.md

Lines changed: 73 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
1-
# WordPress CVE Vulnerabilities
1+
# CVE Vulnerabilities Tested By WAYMAP
22

3-
This document lists WordPress plugin vulnerabilities categorized by their severity.
4-
Which Are Being Tested By Waymap
3+
#### **Current Total Count: 67**
4+
5+
This document lists WordPress/Drupal vulnerabilities categorized by their severity.
6+
Which Are Being Tested By Waymap
57

68

79
### **Critical Risk CVEs**:
8-
**Total CVEs**: 11
10+
**Total CVEs**: 19
911
- CVE-2023-2732
1012
- CVE-2022-1386
1113
- CVE-2022-0739
@@ -17,9 +19,18 @@ Which Are Being Tested By Waymap
1719
- CVE-2023-28121
1820
- CVE-2024-7854
1921
- CVE-2024-3673
22+
- CVE-2008-6171
23+
- CVE-2018-7600
24+
- CVE-2017-6925
25+
- CVE-2018-7602
26+
- CVE-2020-13665
27+
- CVE-2017-6920
28+
- CVE-2019-6339
29+
- CVE-2011-2715
30+
2031

2132
### **High Risk CVEs**:
22-
**Total CVEs**: 34
33+
**Total CVEs**: 48
2334
- CVE-2024-7780
2435
- CVE-2024-7766
2536
- CVE-2021-24142
@@ -54,12 +65,27 @@ Which Are Being Tested By Waymap
5465
- CVE-2021-24626
5566
- CVE-2021-24741
5667
- CVE-2021-24774
68+
- CVE-2006-2742
69+
- CVE-2007-6299
70+
- CVE-2014-3704
71+
- CVE-2006-2742
72+
- CVE-2007-6299
73+
- CVE-2014-3704
74+
- CVE-2016-3163
75+
- CVE-2006-2831
76+
- CVE-2006-5476
77+
- CVE-2020-13671
78+
- CVE-2011-2687
79+
- CVE-2016-6211
80+
- CVE-2011-2726
81+
- CVE-2016-3165
82+
5783

5884
---
5985

6086
### Summary:
61-
- **Critical Risk CVEs**: 11 vulnerabilities
62-
- **High Risk CVEs**: 34 vulnerabilities
87+
- **Critical Risk CVEs**: 19 vulnerabilities
88+
- **High Risk CVEs**: 48 vulnerabilities
6389

6490
---
6591

@@ -120,4 +146,43 @@ Which Are Being Tested By Waymap
120146
| CVE-2021-24741 | supportboard | < 3.3.4 |
121147
| CVE-2021-24774 | check-email | < 1.0.3 |
122148

123-
---
149+
---
150+
151+
Here’s a table for the Drupal CVEs you provided with the associated vulnerable versions:
152+
153+
### Critical Severity Drupal CVEs
154+
155+
Here's the updated table with the additional CVEs included:
156+
157+
| **CVE ID** | **Vulnerable Component** | **Vulnerable Version** |
158+
|-------------------|--------------------------------------------------|-------------------------------------------------------|
159+
| CVE-2006-2742 | Drupal Core | 4.6 - 4.7.0 |
160+
| CVE-2007-6299 | Drupal Core | 4.7 - 4.7.9, 5.0 - 5.4 |
161+
| CVE-2014-3704 | Drupal Core | 7.0 - 7.31 |
162+
| CVE-2016-3163 | Drupal Core | 6.0 - 6.38, 7.0 - 7.43 |
163+
| CVE-2006-2831 | Drupal Core | 4.6 - 4.6.8, 4.7 - 4.7.2 |
164+
| CVE-2006-5476 | Drupal Core | 4.6 - 4.6.10, 4.7 - 4.7.4 |
165+
| CVE-2020-13671 | Drupal Core | 9.0 - 9.0.8, 8.9 - 8.9.9, 8.8 - 8.8.11, 7 - 7.74 |
166+
| CVE-2011-2687 | Drupal Core | 7.0 - 7.3 |
167+
| CVE-2016-6211 | Drupal Core | 7.0 - 7.44 |
168+
| CVE-2011-2726 | Drupal Core | 7.0 - 7.5 |
169+
| CVE-2016-3165 | Drupal Core | 6 - 6.38 |
170+
171+
---
172+
173+
### High Severity Drupal CVEs
174+
175+
Here is a separate table for the **CVE_DATACRIT_DRUPAL** data:
176+
177+
| **CVE ID** | **Vulnerable Component** | **Vulnerable Version** |
178+
|-------------------|--------------------------------------------------|-------------------------------------------------------|
179+
| CVE-2008-6171 | Drupal Core | 5.0 - 5.12, 6.0 - 6.6 |
180+
| CVE-2018-7600 | Drupal Core | 7.5 - 7.58, 8.0 - 8.3.9, 8.4 - 8.4.6, 8.5 - 8.5.1 |
181+
| CVE-2017-6925 | Drupal Core | 8 - 8.3.7 |
182+
| CVE-2018-7602 | Drupal Core | 7.0 - 8.0 |
183+
| CVE-2020-13665 | Drupal Core | 8.8 - 8.8.8, 8.9 - 8.9.1, 9.0 - 9.0.1 |
184+
| CVE-2017-6920 | Drupal Core | 8.0 - 8.3.3 |
185+
| CVE-2019-6339 | Drupal Core | 7 - 7.62, 8.6 - 8.6.6, 8.5 - 8.5.9 |
186+
| CVE-2011-2715 | Drupal Core | 6.20 |
187+
188+
---

lib/ProfileCritical/cms_detector.py

Lines changed: 0 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -53,23 +53,6 @@ def detect_drupal(response, profile_url):
5353

5454
return None
5555

56-
def detect_joomla(response, profile_url):
57-
joomla_paths = ['/administrator/', '/index.php']
58-
for path in joomla_paths:
59-
full_url = urljoin(profile_url, path)
60-
if requests.get(full_url).status_code == 200:
61-
return "Joomla"
62-
63-
if 'meta name="generator" content="Joomla' in response.text:
64-
return "Joomla"
65-
66-
joomla_common_files = ['/templates/', '/media/system/js/']
67-
for file in joomla_common_files:
68-
full_url = urljoin(profile_url, file)
69-
if requests.get(full_url).status_code == 200:
70-
return "Joomla"
71-
72-
return None
7356

7457
def detect_cms(profile_url):
7558
try:
@@ -83,10 +66,6 @@ def detect_cms(profile_url):
8366
if cms:
8467
return cms
8568

86-
cms = detect_joomla(response, profile_url)
87-
if cms:
88-
return cms
89-
9069
return "Unknown/Other"
9170

9271
except requests.RequestException as e:

0 commit comments

Comments
 (0)