Date: Fri, 1 Jun 2001 16:36:28 +0930 (CST) From: mark@kyne.com.au To: FreeBSD-gnats-submit@freebsd.org Subject: ports/27808: New port: www/cgichk: A web site vulnerability scanner Message-ID: <200106010706.f5176Sa04944@aeris.kyne.com.au>
next in thread | raw e-mail | index | archive | help
>Number: 27808 >Category: ports >Synopsis: New port: www/cgichk: A web site vulnerability scanner >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports >State: open >Quarter: >Keywords: >Date-Required: >Class: change-request >Submitter-Id: current-users >Arrival-Date: Fri Jun 01 00:10:02 PDT 2001 >Closed-Date: >Last-Modified: >Originator: Mark Pulford >Release: FreeBSD 4.3-STABLE i386 >Organization: none >Environment: System: FreeBSD aeris.kyne.com.au 4.3-STABLE FreeBSD 4.3-STABLE #0: Fri Jun 1 14:44:38 CST 2001 root@aeris.kyne.com.au:/usr/obj/usr/src/sys/MAIN i386 >Description: cgichk is a security utility which can scan web sites for potential vulnerabilities. >How-To-Repeat: >Fix: # This is a shell archive. Save it in a file, remove anything before # this line, and then unpack it by entering "sh file". Note, it may # create directories; files and directories will be owned by you and # have default permissions. # # This archive contains: # # cgichk # cgichk/Makefile # cgichk/distinfo # cgichk/pkg-message # cgichk/files # cgichk/files/patch-cgichk.h # cgichk/pkg-plist # cgichk/pkg-comment # cgichk/pkg-descr # echo c - cgichk mkdir -p cgichk > /dev/null 2>&1 echo x - cgichk/Makefile sed 's/^X//' >cgichk/Makefile << 'END-of-cgichk/Makefile' X# New ports collection makefile for: cgichk X# Date created: Jun 1, 2001 X# Whom: Mark Pulford <mark@kyne.com.au> X# X# $FreeBSD$ X# X XPORTNAME= cgichk XPORTVERSION= 2.60 XCATEGORIES= www XMASTER_SITES= ${MASTER_SITE_SOURCEFORGE} XMASTER_SITE_SUBDIR= ${PORTNAME} XDISTNAME= ${PORTNAME}_${PORTVERSION} X XMAINTAINER= mark@kyne.com.au X XWRKSRC= ${WRKDIR}/${PORTNAME} XALL_TARGET= cgichk X Xpre-patch: X ${PERL} -pi -e "s/^(CC|CFLAGS).+//g" ${WRKSRC}/Makefile X ${PERL} -pi -e "s@/etc/@${PREFIX}/etc/@g" ${WRKSRC}/cgichk.h X Xdo-install: X ${INSTALL_PROGRAM} ${WRKSRC}/cgichk ${PREFIX}/bin X ${INSTALL_DATA} ${WRKSRC}/cgichk.cfg ${PREFIX}/etc/cgichk.cfg.sample X Xpost-install: X @${CAT} ${PKGMESSAGE} X X.include <bsd.port.mk> END-of-cgichk/Makefile echo x - cgichk/distinfo sed 's/^X//' >cgichk/distinfo << 'END-of-cgichk/distinfo' XMD5 (cgichk_2.60.tar.gz) = 7356d93d0f8b19b226f84fc0e91da66f END-of-cgichk/distinfo echo x - cgichk/pkg-message sed 's/^X//' >cgichk/pkg-message << 'END-of-cgichk/pkg-message' XCopy etc/cgichk.cfg.sample to etc/cgichk.cfg before using cgichk END-of-cgichk/pkg-message echo c - cgichk/files mkdir -p cgichk/files > /dev/null 2>&1 echo x - cgichk/files/patch-cgichk.h sed 's/^X//' >cgichk/files/patch-cgichk.h << 'END-of-cgichk/files/patch-cgichk.h' X--- cgichk.h.orig Fri Jun 1 15:58:21 2001 X+++ cgichk.h Fri Jun 1 15:58:53 2001 X@@ -19,11 +19,11 @@ X X #include <stdio.h> X #include <stdlib.h> X+#include <sys/types.h> X #include <sys/socket.h> X #include <netinet/in.h> X #include <netdb.h> X #include <stdarg.h> X-#include <getopt.h> X #include <time.h> X #include <unistd.h> X END-of-cgichk/files/patch-cgichk.h echo x - cgichk/pkg-plist sed 's/^X//' >cgichk/pkg-plist << 'END-of-cgichk/pkg-plist' Xbin/cgichk Xetc/cgichk.cfg.sample END-of-cgichk/pkg-plist echo x - cgichk/pkg-comment sed 's/^X//' >cgichk/pkg-comment << 'END-of-cgichk/pkg-comment' XA web site vulnerability scanner END-of-cgichk/pkg-comment echo x - cgichk/pkg-descr sed 's/^X//' >cgichk/pkg-descr << 'END-of-cgichk/pkg-descr' Xcgichk is a security utility which can scan web sites for potential Xvulnerabilities. END-of-cgichk/pkg-descr exit >Release-Note: >Audit-Trail: >Unformatted: To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-ports" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200106010706.f5176Sa04944>