Name: xcat
Version: 0.7.1
Release: 1%{?dist}
Summary: A command line tool to explore blind XPath injection vulnerabilities
License: MIT
URL: https://github.com/orf/xcat
Source0: https://pypi.python.org/packages/source/x/%{name}/%{name}-%{version}.zip
BuildArch: noarch
BuildRequires: python3-devel
BuildRequires: python3-setuptools
Requires: python3 >= 3.4.0
Requires: python3-aiohttp
Requires: python3-click
Requires: python3-logbook
Requires: python3-xmltodict
Requires: python3-colorama
Requires: python3-ipgetter
%description
XCat is a command line program that aides in the exploitation of blind XPath
injection vulnerabilities. It can be used to retrieve the whole XML document
being processed by a vulnerable XPath query, read arbitrary files on the
hosts filesystem and utilize out of bound HTTP requests to make the server
send data directly to xcat.
%prep
%setup -q
%build
%{__python3} setup.py build
rm -rf %{srcname}.egg-info
sed -i "s|\r||g" README.rst
%install
%{__python3} setup.py install --skip-build --root %{buildroot}
%files
%doc LICENSE README.rst
%{_bindir}/%{name}
%{python3_sitelib}/*
%changelog
* Wed Feb 26 2014 Fabian Affolter <mail@fabian-affolter.ch> - 0.7.1-1
- Initial package for Fedora