Date: Wed, 21 May 2008 13:43:34 +0900 (JST) From: Tomoyuki Sakurai <cherry@trombik.org> To: FreeBSD-gnats-submit@FreeBSD.org Subject: ports/123851: [NEW PORT] security/sqlmap: An automatic SQL injection tool Message-ID: <20080521044334.E3D1C175C39@spica.trombik.org> Resent-Message-ID: <200805210450.m4L4o1K5062343@freefall.freebsd.org>
next in thread | raw e-mail | index | archive | help
>Number: 123851 >Category: ports >Synopsis: [NEW PORT] security/sqlmap: An automatic SQL injection tool >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Wed May 21 04:50:00 UTC 2008 >Closed-Date: >Last-Modified: >Originator: Tomoyuki Sakurai >Release: FreeBSD 7.0-STABLE i386 >Organization: >Environment: System: FreeBSD spica.trombik.org 7.0-STABLE FreeBSD 7.0-STABLE #0: Sun May 11 18:07:51 JST 2008 >Description: sqlmap is an automatic SQL injection tool entirely developed in Python. It is capable to perform an extensive database management system back-end fingerprint, retrieve remote DBMS databases, usernames, tables, columns, enumerate entire DBMS, read system files and much more taking advantage of web application programming security flaws that lead to SQL injection vulnerabilities. WWW: http://sqlmap.sourceforge.net/ Generated with FreeBSD Port Tools 0.77 >How-To-Repeat: >Fix: --- sqlmap-0.5.shar begins here --- # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # sqlmap # sqlmap/pkg-descr # sqlmap/Makefile # sqlmap/pkg-plist # sqlmap/distinfo # sqlmap/files # sqlmap/files/patch-sqlmap # echo c - sqlmap mkdir -p sqlmap > /dev/null 2>&1 echo x - sqlmap/pkg-descr sed 's/^X//' >sqlmap/pkg-descr << 'END-of-sqlmap/pkg-descr' Xsqlmap is an automatic SQL injection tool entirely developed in Python. It is Xcapable to perform an extensive database management system back-end Xfingerprint, retrieve remote DBMS databases, usernames, tables, columns, Xenumerate entire DBMS, read system files and much more taking advantage of web Xapplication programming security flaws that lead to SQL injection Xvulnerabilities. X XWWW: http://sqlmap.sourceforge.net/ END-of-sqlmap/pkg-descr echo x - sqlmap/Makefile sed 's/^X//' >sqlmap/Makefile << 'END-of-sqlmap/Makefile' X# New ports collection makefile for: sqlmap X# Date created: 2008-05-21 X# Whom: Tomoyuki Sakurai <cherry@trombik.org> X# X# $FreeBSD$ X# X XPORTNAME= sqlmap XPORTVERSION= 0.5 XCATEGORIES= security python XMASTER_SITES= ${MASTER_SITE_SOURCEFORGE} XMASTER_SITE_SUBDIR= sqlmap X XMAINTAINER= cherry@trombik.org XCOMMENT= An automatic SQL injection tool X XUSE_PYTHON= yes XNO_BUILD= yes X# XXX report to upstream XWRKSRC= ${WRKDIR}/${PORTNAME} XSQLMAP_TXT_FILES= fuzz_vectors.txt user-agents.txt XSQLMAP_DOC_FILES= AUTHORS ChangeLog README.html THANKS TODO X Xpost-patch: X# XXX report to upstream X ${REINPLACE_CMD} -e 's|%%PYTHON_SITELIBDIR%%|${PYTHON_SITELIBDIR}|g' \ X -e 's|%%PORTNAME%%|${PORTNAME}|g' ${WRKSRC}/sqlmap.py X ${REINPLACE_CMD} -e 's|from lib\.|from ${PORTNAME}.|' \ X -e 's|from plugins\.|from ${PORTNAME}.plugins.|' ${WRKSRC}/lib/* X ${REINPLACE_CMD} -e 's|from lib\.|from ${PORTNAME}.|' \ X -e 's|from plugins\.|from ${PORTNAME}.plugins.|' ${WRKSRC}/plugins/* X Xdo-install: X ${INSTALL_SCRIPT} ${WRKSRC}/sqlmap.py ${PREFIX}/bin/sqlmap X ${RM} -rf ${WRKSRC}/lib/.svn X ${RM} -rf ${WRKSRC}/lib/*.bak X ${MKDIR} ${PYTHONPREFIX_SITELIBDIR}/sqlmap X ( cd ${WRKSRC}/lib && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/sqlmap ) X ${RM} -rf ${WRKSRC}/plugins/.svn X ${RM} -rf ${WRKSRC}/plugins/*.bak X ${MKDIR} ${PYTHONPREFIX_SITELIBDIR:}/sqlmap/plugins X ( cd ${WRKSRC}/plugins && ${COPYTREE_SHARE} . ${PYTHONPREFIX_SITELIBDIR}/sqlmap/plugins ) X ${MKDIR} ${DATADIR}/txt X.for F in ${SQLMAP_TXT_FILES} X ${INSTALL_DATA} ${WRKSRC}/txt/${F} ${DATADIR}/txt/ X.endfor X.if !defined(NOPORTDOCS) X ${MKDIR} ${DOCSDIR} X.for F in ${SQLMAP_DOC_FILES} X ${INSTALL_DATA} ${WRKSRC}/doc/${F} ${DOCSDIR}/ X.endfor X.endif X X.include <bsd.port.pre.mk> X.include <bsd.port.post.mk> END-of-sqlmap/Makefile echo x - sqlmap/pkg-plist sed 's/^X//' >sqlmap/pkg-plist << 'END-of-sqlmap/pkg-plist' X@comment $FreeBSD$ Xbin/sqlmap X%%PYTHON_SITELIBDIR%%/sqlmap/option.py X%%PYTHON_SITELIBDIR%%/sqlmap/google.py X%%PYTHON_SITELIBDIR%%/sqlmap/resume.py X%%PYTHON_SITELIBDIR%%/sqlmap/settings.py X%%PYTHON_SITELIBDIR%%/sqlmap/injection.py X%%PYTHON_SITELIBDIR%%/sqlmap/query.py X%%PYTHON_SITELIBDIR%%/sqlmap/request.py X%%PYTHON_SITELIBDIR%%/sqlmap/blind.py X%%PYTHON_SITELIBDIR%%/sqlmap/__init__.py X%%PYTHON_SITELIBDIR%%/sqlmap/dump.py X%%PYTHON_SITELIBDIR%%/sqlmap/progress.py X%%PYTHON_SITELIBDIR%%/sqlmap/smdict.py X%%PYTHON_SITELIBDIR%%/sqlmap/common.py X%%PYTHON_SITELIBDIR%%/sqlmap/union.py X%%PYTHON_SITELIBDIR%%/sqlmap/parser.py X%%PYTHON_SITELIBDIR%%/sqlmap/plugins/mysql.py X%%PYTHON_SITELIBDIR%%/sqlmap/plugins/postgresql.py X%%PYTHON_SITELIBDIR%%/sqlmap/plugins/__init__.py X%%PYTHON_SITELIBDIR%%/sqlmap/plugins/oracle.py X%%PYTHON_SITELIBDIR%%/sqlmap/plugins/mssqlserver.py X@dirrm %%PYTHON_SITELIBDIR%%/sqlmap/plugins X@dirrm %%PYTHON_SITELIBDIR%%/sqlmap X%%PORTDOCS%%%%DOCSDIR%%/AUTHORS X%%PORTDOCS%%%%DOCSDIR%%/ChangeLog X%%PORTDOCS%%%%DOCSDIR%%/README.html X%%PORTDOCS%%%%DOCSDIR%%/THANKS X%%PORTDOCS%%%%DOCSDIR%%/TODO X%%PORTDOCS%%@dirrm %%DOCSDIR%% X%%DATADIR%%/txt/fuzz_vectors.txt X%%DATADIR%%/txt/user-agents.txt X@dirrm %%DATADIR%%/txt X@dirrm %%DATADIR%% END-of-sqlmap/pkg-plist echo x - sqlmap/distinfo sed 's/^X//' >sqlmap/distinfo << 'END-of-sqlmap/distinfo' XMD5 (sqlmap-0.5.tar.gz) = 74ceaecd24f830b9b23ec27c90e25f5b XSHA256 (sqlmap-0.5.tar.gz) = 4c1c491de3c1ba151bbb4e0d7c5b72b4445beca08eab802281cc7bcc7be7555e XSIZE (sqlmap-0.5.tar.gz) = 463059 END-of-sqlmap/distinfo echo c - sqlmap/files mkdir -p sqlmap/files > /dev/null 2>&1 echo x - sqlmap/files/patch-sqlmap sed 's/^X//' >sqlmap/files/patch-sqlmap << 'END-of-sqlmap/files/patch-sqlmap' X--- sqlmap.py.orig 2007-11-05 06:01:41.000000000 +0900 X+++ sqlmap.py 2008-05-21 12:01:04.000000000 +0900 X@@ -7,11 +7,11 @@ X from optparse import OptionParser X from optparse import OptionError X X-from lib import settings X-from lib.option import Option X-from lib.injection import Injection X-from lib.settings import VERSION X-from lib.smdict import sqlmapDict X+from sqlmap import settings X+from sqlmap.option import Option X+from sqlmap.injection import Injection X+from sqlmap.settings import VERSION X+from sqlmap.smdict import sqlmapDict X X X def showBanner(): END-of-sqlmap/files/patch-sqlmap exit --- sqlmap-0.5.shar ends here --- >Release-Note: >Audit-Trail: >Unformatted:
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20080521044334.E3D1C175C39>