Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 1 Jun 2001 16:36:28 +0930 (CST)
From:      mark@kyne.com.au
To:        FreeBSD-gnats-submit@freebsd.org
Subject:   ports/27808: New port: www/cgichk: A web site vulnerability scanner
Message-ID:  <200106010706.f5176Sa04944@aeris.kyne.com.au>

next in thread | raw e-mail | index | archive | help

>Number:         27808
>Category:       ports
>Synopsis:       New port: www/cgichk: A web site vulnerability scanner
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          change-request
>Submitter-Id:   current-users
>Arrival-Date:   Fri Jun 01 00:10:02 PDT 2001
>Closed-Date:
>Last-Modified:
>Originator:     Mark Pulford
>Release:        FreeBSD 4.3-STABLE i386
>Organization:
none
>Environment:
System: FreeBSD aeris.kyne.com.au 4.3-STABLE FreeBSD 4.3-STABLE #0: Fri Jun 1 14:44:38 CST 2001 root@aeris.kyne.com.au:/usr/obj/usr/src/sys/MAIN i386

>Description:

cgichk is a security utility which can scan web sites for potential
vulnerabilities.

>How-To-Repeat:

>Fix:
# This is a shell archive.  Save it in a file, remove anything before
# this line, and then unpack it by entering "sh file".  Note, it may
# create directories; files and directories will be owned by you and
# have default permissions.
#
# This archive contains:
#
#	cgichk
#	cgichk/Makefile
#	cgichk/distinfo
#	cgichk/pkg-message
#	cgichk/files
#	cgichk/files/patch-cgichk.h
#	cgichk/pkg-plist
#	cgichk/pkg-comment
#	cgichk/pkg-descr
#
echo c - cgichk
mkdir -p cgichk > /dev/null 2>&1
echo x - cgichk/Makefile
sed 's/^X//' >cgichk/Makefile << 'END-of-cgichk/Makefile'
X# New ports collection makefile for:	cgichk
X# Date created:			Jun 1, 2001
X# Whom:				Mark Pulford <mark@kyne.com.au>
X#
X# $FreeBSD$
X#
X
XPORTNAME=	cgichk
XPORTVERSION=	2.60
XCATEGORIES=	www
XMASTER_SITES=	${MASTER_SITE_SOURCEFORGE}
XMASTER_SITE_SUBDIR=	${PORTNAME}
XDISTNAME=	${PORTNAME}_${PORTVERSION}
X
XMAINTAINER=	mark@kyne.com.au
X
XWRKSRC=		${WRKDIR}/${PORTNAME}
XALL_TARGET=	cgichk
X
Xpre-patch:
X	${PERL} -pi -e "s/^(CC|CFLAGS).+//g" ${WRKSRC}/Makefile
X	${PERL} -pi -e "s@/etc/@${PREFIX}/etc/@g" ${WRKSRC}/cgichk.h
X
Xdo-install:
X	${INSTALL_PROGRAM} ${WRKSRC}/cgichk ${PREFIX}/bin
X	${INSTALL_DATA} ${WRKSRC}/cgichk.cfg ${PREFIX}/etc/cgichk.cfg.sample
X
Xpost-install:
X	@${CAT} ${PKGMESSAGE}
X
X.include <bsd.port.mk>
END-of-cgichk/Makefile
echo x - cgichk/distinfo
sed 's/^X//' >cgichk/distinfo << 'END-of-cgichk/distinfo'
XMD5 (cgichk_2.60.tar.gz) = 7356d93d0f8b19b226f84fc0e91da66f
END-of-cgichk/distinfo
echo x - cgichk/pkg-message
sed 's/^X//' >cgichk/pkg-message << 'END-of-cgichk/pkg-message'
XCopy etc/cgichk.cfg.sample to etc/cgichk.cfg before using cgichk
END-of-cgichk/pkg-message
echo c - cgichk/files
mkdir -p cgichk/files > /dev/null 2>&1
echo x - cgichk/files/patch-cgichk.h
sed 's/^X//' >cgichk/files/patch-cgichk.h << 'END-of-cgichk/files/patch-cgichk.h'
X--- cgichk.h.orig	Fri Jun  1 15:58:21 2001
X+++ cgichk.h	Fri Jun  1 15:58:53 2001
X@@ -19,11 +19,11 @@
X 
X #include <stdio.h>
X #include <stdlib.h>
X+#include <sys/types.h>
X #include <sys/socket.h>
X #include <netinet/in.h>
X #include <netdb.h>
X #include <stdarg.h>
X-#include <getopt.h>
X #include <time.h>
X #include <unistd.h>
X 
END-of-cgichk/files/patch-cgichk.h
echo x - cgichk/pkg-plist
sed 's/^X//' >cgichk/pkg-plist << 'END-of-cgichk/pkg-plist'
Xbin/cgichk
Xetc/cgichk.cfg.sample
END-of-cgichk/pkg-plist
echo x - cgichk/pkg-comment
sed 's/^X//' >cgichk/pkg-comment << 'END-of-cgichk/pkg-comment'
XA web site vulnerability scanner
END-of-cgichk/pkg-comment
echo x - cgichk/pkg-descr
sed 's/^X//' >cgichk/pkg-descr << 'END-of-cgichk/pkg-descr'
Xcgichk is a security utility which can scan web sites for potential
Xvulnerabilities. 
END-of-cgichk/pkg-descr
exit

>Release-Note:
>Audit-Trail:
>Unformatted:

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-ports" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200106010706.f5176Sa04944>