Common Web Application Vulnerability Scanner
Project description
Common Web Application Vulnerability Scanner. [python Version]
This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.
Installation
pip install cwv-scanner
Usage
cwv-scanner example.com
Vulnerabilities Checked by cwv-scanner
The scanner checks for the following 36 vulnerabilities:
| Vulnerability | Description |
|---|---|
| SQL Injection | Injecting malicious SQL code into inputs to manipulate database queries. |
| XSS (Cross-Site Scripting) | Injecting malicious scripts into web pages viewed by users. |
| File Inclusion | Loading unauthorized files due to unsanitized user input. |
| Directory Traversal | Accessing restricted directories via manipulated input paths. |
| Remote File Inclusion | Including malicious code from remote servers via user input. |
| Command Injection | Executing arbitrary commands by injecting malicious input. |
| Cross-Site Request Forgery (CSRF) | Tricking users into submitting unauthorized requests. |
| Unrestricted File Upload | Uploading malicious files that can be executed on the server. |
| Password Cracking | Exploiting weak passwords to gain unauthorized access. |
| Session Hijacking | Stealing session IDs to impersonate authenticated users. |
| Broken Auth and Session Management | Bypassing authentication or hijacking sessions due to poor implementation. |
| Remote Code Execution | Executing arbitrary code on the server via malicious input. |
| Local File Inclusion | Loading local files that should not be accessible via user input. |
| Server Side Request Forgery (SSRF) | Sending unauthorized requests to internal/external servers. |
| XML External Entity (XXE) Injection | Exploiting XML parsing to access sensitive data or execute code. |
| Cross-Site Script Inclusion (XSSI) | Loading external JavaScript to execute malicious code in the browser. |
| Server-Side Template Injection (SSTI) | Injecting malicious code into server-side templates for execution. |
| HTML Injection | Injecting malicious HTML to steal data or manipulate page content. |
| XPath Injection | Manipulating XPath queries to access unauthorized data. |
| Code Injection | Injecting executable code into the application to run on the server. |
| Object Injection | Manipulating serialized objects to execute arbitrary code. |
| Cross-Domain Scripting | Injecting scripts from external domains to steal browser data. |
| HTTP Response Splitting | Injecting newlines into HTTP headers to manipulate responses. |
| Buffer Overflow | Exploiting buffer overruns to execute arbitrary code. |
| Format String Attack | Exploiting format string vulnerabilities to execute code. |
| Command Injection (Windows) | Injecting commands into Windows systems via malicious input. |
| Insecure Cryptographic Storage | Exploiting weak encryption to access sensitive data. |
| Insecure Direct Object References | Accessing unauthorized resources via unvalidated input. |
| Insufficient Logging and Monitoring | Failing to log or monitor security events, enabling undetected attacks. |
| Security Misconfiguration | Exploiting misconfigured server or application settings. |
| Cross-Site Script Inclusion (CSSI) | Including external stylesheets that could be controlled by attackers. |
| Click Fraud | Generating fake ad clicks to manipulate revenue or budgets. |
| Broken Access Control | Bypassing access controls to gain unauthorized access to resources. |
| Clickjacking | Tricking users into clicking disguised malicious elements. |
| Hidden Form Fields | Submitting unexpected data via hidden form fields to bypass validation. |
| Shellshock | Exploiting Bash vulnerabilities to execute arbitrary code. |
Credits
FootNote/s
- Results cannot be 100% Gaurenteed
Project details
Release history Release notifications | RSS feed
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file cwv_scanner-1.0.2.tar.gz.
File metadata
- Download URL: cwv_scanner-1.0.2.tar.gz
- Upload date:
- Size: 28.1 kB
- Tags: Source
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
7c825b3fb7357ac23685e1dd7d37e3b3b44cba6b946b42bd20b8b5a61d7e3047
|
|
| MD5 |
58f43739fbb8b6264f3fc120bb83fcf0
|
|
| BLAKE2b-256 |
8bf4639a94d5071e45f63dcb3a08144898e9eb2bc3ca218742b965903efcb8d1
|
Provenance
The following attestation bundles were made for cwv_scanner-1.0.2.tar.gz:
Publisher:
publish.yml on SirCryptic/cwv-scanner
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cwv_scanner-1.0.2.tar.gz -
Subject digest:
7c825b3fb7357ac23685e1dd7d37e3b3b44cba6b946b42bd20b8b5a61d7e3047 - Sigstore transparency entry: 747820360
- Sigstore integration time:
-
Permalink:
SirCryptic/cwv-scanner@493832e0af31c9879c4d0e41d233c12ab830b533 -
Branch / Tag:
refs/tags/1.0.2 - Owner: https://github.com/SirCryptic
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@493832e0af31c9879c4d0e41d233c12ab830b533 -
Trigger Event:
release
-
Statement type:
File details
Details for the file cwv_scanner-1.0.2-py3-none-any.whl.
File metadata
- Download URL: cwv_scanner-1.0.2-py3-none-any.whl
- Upload date:
- Size: 27.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? Yes
- Uploaded via: twine/6.1.0 CPython/3.13.7
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
43a2ff9cdd239f6eb11f267594d69f5d33ffecac2fd8ec51bf6198b7f57bb01d
|
|
| MD5 |
b1411f825a71e6f2793be0bcdd29bce6
|
|
| BLAKE2b-256 |
c23af4c1ee79bcab6fdab90d27b7ac45b4d13cf0ee4fd4eb9ad06d9c9b7dc41e
|
Provenance
The following attestation bundles were made for cwv_scanner-1.0.2-py3-none-any.whl:
Publisher:
publish.yml on SirCryptic/cwv-scanner
-
Statement:
-
Statement type:
https://in-toto.io/Statement/v1 -
Predicate type:
https://docs.pypi.org/attestations/publish/v1 -
Subject name:
cwv_scanner-1.0.2-py3-none-any.whl -
Subject digest:
43a2ff9cdd239f6eb11f267594d69f5d33ffecac2fd8ec51bf6198b7f57bb01d - Sigstore transparency entry: 747820363
- Sigstore integration time:
-
Permalink:
SirCryptic/cwv-scanner@493832e0af31c9879c4d0e41d233c12ab830b533 -
Branch / Tag:
refs/tags/1.0.2 - Owner: https://github.com/SirCryptic
-
Access:
public
-
Token Issuer:
https://token.actions.githubusercontent.com -
Runner Environment:
github-hosted -
Publication workflow:
publish.yml@493832e0af31c9879c4d0e41d233c12ab830b533 -
Trigger Event:
release
-
Statement type: