This is a simple web application vulnerability scanner that checks if a given URL or IP address is vulnerable to common web application security vulnerabilities. The tool is designed to help website owners and security researchers identify vulnerabilities in their web applications that can be exploited by attackers.
pip install cwv-scanner
cwv-scanner example.com
The scanner checks for the following 36 vulnerabilities:
Vulnerability | Description |
---|---|
SQL Injection | Injecting malicious SQL code into inputs to manipulate database queries. |
XSS (Cross-Site Scripting) | Injecting malicious scripts into web pages viewed by users. |
File Inclusion | Loading unauthorized files due to unsanitized user input. |
Directory Traversal | Accessing restricted directories via manipulated input paths. |
Remote File Inclusion | Including malicious code from remote servers via user input. |
Command Injection | Executing arbitrary commands by injecting malicious input. |
Cross-Site Request Forgery (CSRF) | Tricking users into submitting unauthorized requests. |
Unrestricted File Upload | Uploading malicious files that can be executed on the server. |
Password Cracking | Exploiting weak passwords to gain unauthorized access. |
Session Hijacking | Stealing session IDs to impersonate authenticated users. |
Broken Auth and Session Management | Bypassing authentication or hijacking sessions due to poor implementation. |
Remote Code Execution | Executing arbitrary code on the server via malicious input. |
Local File Inclusion | Loading local files that should not be accessible via user input. |
Server Side Request Forgery (SSRF) | Sending unauthorized requests to internal/external servers. |
XML External Entity (XXE) Injection | Exploiting XML parsing to access sensitive data or execute code. |
Cross-Site Script Inclusion (XSSI) | Loading external JavaScript to execute malicious code in the browser. |
Server-Side Template Injection (SSTI) | Injecting malicious code into server-side templates for execution. |
HTML Injection | Injecting malicious HTML to steal data or manipulate page content. |
XPath Injection | Manipulating XPath queries to access unauthorized data. |
Code Injection | Injecting executable code into the application to run on the server. |
Object Injection | Manipulating serialized objects to execute arbitrary code. |
Cross-Domain Scripting | Injecting scripts from external domains to steal browser data. |
HTTP Response Splitting | Injecting newlines into HTTP headers to manipulate responses. |
Buffer Overflow | Exploiting buffer overruns to execute arbitrary code. |
Format String Attack | Exploiting format string vulnerabilities to execute code. |
Command Injection (Windows) | Injecting commands into Windows systems via malicious input. |
Insecure Cryptographic Storage | Exploiting weak encryption to access sensitive data. |
Insecure Direct Object References | Accessing unauthorized resources via unvalidated input. |
Insufficient Logging and Monitoring | Failing to log or monitor security events, enabling undetected attacks. |
Security Misconfiguration | Exploiting misconfigured server or application settings. |
Cross-Site Script Inclusion (CSSI) | Including external stylesheets that could be controlled by attackers. |
Click Fraud | Generating fake ad clicks to manipulate revenue or budgets. |
Broken Access Control | Bypassing access controls to gain unauthorized access to resources. |
Clickjacking | Tricking users into clicking disguised malicious elements. |
Hidden Form Fields | Submitting unexpected data via hidden form fields to bypass validation. |
Shellshock | Exploiting Bash vulnerabilities to execute arbitrary code. |
- Results cannot be 100% Gaurenteed