Control: reassign -1 wnpp Control: retitle -1 O: wapiti -- web application vulnerability scanner Control: severity -1 normal X-Debbugs-Cc: Python Applications Packaging Team <python-apps-t...@lists.alioth.debian.org>
> Thomas Bläsing <thoma...@pool.math.tu-berlin.de> has not been working on > the wapiti package for quite some time. > > We are tracking their status in the MIA team and would like to ask you > to remove them from the Uploaders list of the package so we can close > that part of the file. Since no-one has stepped up to do the maintenance, I'm orphaning this package. I've uploaded a new upstream version that also includes a number of other changes and cleanups. With this, the package should be in reasonable shape. However, since I'm not an active user of wapiti, I don't think I can be a proper maintainer. The package source is currently maintained in the Python Applications Packaging Team Svn repository (see Vcs headers). The package description is: Wapiti allows you to audit the security of your web applications. It performs "black-box" scans, i.e. it does not study the source code of the application but will scan the web pages of the deployed web applications, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, injecting payloads to see if a script is vulnerable. . Wapiti can detect the following vulnerabilities: - file handling errors (local and remote include/require, fopen, readfile...) - database injection (PHP/JSP/ASP SQL Injections and XPath Injections) - XSS (Cross Site Scripting) injection - LDAP injection - command execution detection (eval(), system(), passtru()...) - CRLF injection (HTTP response splitting, session fixation...) Thanks, -- -- arthur - adej...@debian.org - http://people.debian.org/~adejong --
signature.asc
Description: This is a digitally signed message part