Debian Bug report logs - #700556
O: wapiti -- web application vulnerability scanner

Package: wnpp; Maintainer for wnpp is wnpp@debian.org;

Reported by: Ricardo Mones <mones@debian.org>

Date: Thu, 14 Feb 2013 09:06:16 UTC

Severity: normal

Reply or subscribe to this bug.

Toggle useless messages

View this report as an mbox folder, status mbox, maintainer mbox


Report forwarded to thomasbl@pool.math.tu-berlin.de, Thomas Bläsing <thomasbl@pool.math.tu-berlin.de>:
Bug#700556; Package wapiti. (Thu, 14 Feb 2013 09:06:19 GMT) Full text and rfc822 format available.

Acknowledgement sent to Ricardo Mones <mones@debian.org>:
New Bug report received and forwarded. Copy sent to thomasbl@pool.math.tu-berlin.de, Thomas Bläsing <thomasbl@pool.math.tu-berlin.de>. (Thu, 14 Feb 2013 09:06:19 GMT) Full text and rfc822 format available.

Message #5 received at maintonly@bugs.debian.org (full text, mbox):

From: Ricardo Mones <mones@debian.org>
To: maintonly@bugs.debian.org
Subject: Updating the wapiti Uploaders list
Date: Thu, 14 Feb 2013 09:04:38 +0000
Package: wapiti
Version: 1.1.6-3
Severity: minor
User: mia@qa.debian.org
Usertags: mia-teammaint

Thomas Bläsing <thomasbl@pool.math.tu-berlin.de> has not been working on
the wapiti package for quite some time.

We are tracking their status in the MIA team and would like to ask you
to remove them from the Uploaders list of the package so we can close
that part of the file.

(If the person is listed as Maintainer, what we are asking is to please
step in as a new maintainer.)

Thanks.

-- 
 Ricardo Mones, on behalf of Debian QA/MIA team
 http://people.debian.org/~mones
 «Never send a human to do a machine's job.» ~ Agent Smith



Information forwarded to debian-bugs-dist@lists.debian.org, python-apps-team@lists.alioth.debian.org, Thomas Bläsing <thomasbl@pool.math.tu-berlin.de>:
Bug#700556; Package wapiti. (Fri, 28 Jun 2013 13:39:09 GMT) Full text and rfc822 format available.

Acknowledgement sent to 700556@bugs.debian.org:
Extra info received and forwarded to list. Copy sent to python-apps-team@lists.alioth.debian.org, Thomas Bläsing <thomasbl@pool.math.tu-berlin.de>. (Fri, 28 Jun 2013 13:39:09 GMT) Full text and rfc822 format available.

Message #10 received at 700556@bugs.debian.org (full text, mbox):

From: Arthur de Jong <adejong@debian.org>
To: 700556@bugs.debian.org
Subject: Re: Bug#700556: Updating the wapiti Uploaders list
Date: Fri, 28 Jun 2013 15:37:26 +0200
[Message part 1 (text/plain, inline)]
Control: reassign -1 wnpp
Control: retitle -1 O: wapiti -- web application vulnerability scanner
Control: severity -1 normal
X-Debbugs-Cc: Python Applications Packaging Team <python-apps-team@lists.alioth.debian.org>

> Thomas Bläsing <thomasbl@pool.math.tu-berlin.de> has not been working on
> the wapiti package for quite some time.
> 
> We are tracking their status in the MIA team and would like to ask you
> to remove them from the Uploaders list of the package so we can close
> that part of the file.

Since no-one has stepped up to do the maintenance, I'm orphaning this
package.

I've uploaded a new upstream version that also includes a number of
other changes and cleanups. With this, the package should be in
reasonable shape. However, since I'm not an active user of wapiti, I
don't think I can be a proper maintainer.

The package source is currently maintained in the Python Applications
Packaging Team Svn repository (see Vcs headers).

The package description is:
 Wapiti allows you to audit the security of your web applications.
 It performs "black-box" scans, i.e. it does not study the source code
 of the application but will scan the web pages of the deployed web
 applications, looking for scripts and forms where it can inject data.
 Once it gets this list, Wapiti acts like a fuzzer, injecting payloads
 to see if a script is vulnerable.
 .
 Wapiti can detect the following vulnerabilities:
  - file handling errors (local and remote include/require, fopen,
    readfile...)
  - database injection (PHP/JSP/ASP SQL Injections and XPath Injections)
  - XSS (Cross Site Scripting) injection
  - LDAP injection
  - command execution detection (eval(), system(), passtru()...)
  - CRLF injection (HTTP response splitting, session fixation...)

Thanks,

-- 
-- arthur - adejong@debian.org - http://people.debian.org/~adejong --
[signature.asc (application/pgp-signature, inline)]

Bug reassigned from package 'wapiti' to 'wnpp'. Request was from Arthur de Jong <adejong@debian.org> to 700556-submit@bugs.debian.org. (Fri, 28 Jun 2013 13:39:09 GMT) Full text and rfc822 format available.

No longer marked as found in versions wapiti/1.1.6-3. Request was from Arthur de Jong <adejong@debian.org> to 700556-submit@bugs.debian.org. (Fri, 28 Jun 2013 13:39:10 GMT) Full text and rfc822 format available.

Changed Bug title to 'O: wapiti -- web application vulnerability scanner' from 'Updating the wapiti Uploaders list' Request was from Arthur de Jong <adejong@debian.org> to 700556-submit@bugs.debian.org. (Fri, 28 Jun 2013 13:39:11 GMT) Full text and rfc822 format available.

Severity set to 'normal' from 'minor' Request was from Arthur de Jong <adejong@debian.org> to 700556-submit@bugs.debian.org. (Fri, 28 Jun 2013 13:39:12 GMT) Full text and rfc822 format available.

Send a report that this bug log contains spam.


Debian bug tracking system administrator <owner@bugs.debian.org>. Last modified: Fri Apr 18 03:38:44 2014; Machine Name: buxtehude.debian.org

Debian Bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.