diff --git a/.gitignore b/.gitignore index e69de29..a8e5ffb 100644 --- a/.gitignore +++ b/.gitignore @@ -0,0 +1 @@ +/xcat-0.7.1.zip diff --git a/sources b/sources index e69de29..d7a49d4 100644 --- a/sources +++ b/sources @@ -0,0 +1 @@ +c3acd9d0488eb5d091b6a8daa434a8eb xcat-0.7.1.zip diff --git a/xcat.spec b/xcat.spec new file mode 100644 index 0000000..b801a23 --- /dev/null +++ b/xcat.spec @@ -0,0 +1,47 @@ +Name: xcat +Version: 0.7.1 +Release: 1%{?dist} +Summary: A command line tool to explore blind XPath injection vulnerabilities + +License: MIT +URL: https://github.com/orf/xcat +Source0: https://pypi.python.org/packages/source/x/%{name}/%{name}-%{version}.zip +BuildArch: noarch + +BuildRequires: python3-devel +BuildRequires: python3-setuptools + +Requires: python3 >= 3.4.0 +Requires: python3-aiohttp +Requires: python3-click +Requires: python3-logbook +Requires: python3-xmltodict +Requires: python3-colorama +Requires: python3-ipgetter + +%description +XCat is a command line program that aides in the exploitation of blind XPath +injection vulnerabilities. It can be used to retrieve the whole XML document +being processed by a vulnerable XPath query, read arbitrary files on the +hosts filesystem and utilize out of bound HTTP requests to make the server +send data directly to xcat. + +%prep +%setup -q + +%build +%{__python3} setup.py build +rm -rf %{srcname}.egg-info +sed -i "s|\r||g" README.rst + +%install +%{__python3} setup.py install --skip-build --root %{buildroot} + +%files +%doc LICENSE README.rst +%{_bindir}/%{name} +%{python3_sitelib}/* + +%changelog +* Wed Feb 26 2014 Fabian Affolter - 0.7.1-1 +- Initial package for Fedora