Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/BitTheByte/BitTraversal
Burpsuite Plugin to detect Directory Traversal vulnerabilities
https://github.com/BitTheByte/BitTraversal
bugbounty burp-extensions burp-plugin burpsuite burpsuite-extender java path-traversal traversal web
Last synced: 21 days ago
JSON representation
Burpsuite Plugin to detect Directory Traversal vulnerabilities
- Host: GitHub
- URL: https://github.com/BitTheByte/BitTraversal
- Owner: BitTheByte
- Created: 2021-01-07T03:49:55.000Z (almost 4 years ago)
- Default Branch: master
- Last Pushed: 2021-07-22T17:21:25.000Z (over 3 years ago)
- Last Synced: 2024-08-05T17:37:07.578Z (4 months ago)
- Topics: bugbounty, burp-extensions, burp-plugin, burpsuite, burpsuite-extender, java, path-traversal, traversal, web
- Language: Java
- Homepage:
- Size: 47.9 KB
- Stars: 28
- Watchers: 2
- Forks: 4
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
- awesome-hacking-lists - BitTheByte/BitTraversal - Burpsuite Plugin to detect Directory Traversal vulnerabilities (Java)
README
# BitTraversal - in development
# Installation
* Requirements
* BurpSuite >= 1.7
* JVM Runtime >= 1.8* Installation from GitHub
1) Download the latest release from github https://github.com/BitTheByte/BitTraversal/releases
2) Using burpsuite navigate to `Extender > Add`
3) Select the downloaded `.jar` file# Core Idea
A Mutator will run against every request seen from burpsuite e.g(proxy, repeater, scanner) generating a number of potential urls each appended with a payload to be passed to Executor and Detector classes to detect if one of the detection techniques was successfulThis plugin uses two main techniques to identify directory traversal vulnerabilities
* Detection Methods
1) Static Detection
2) Dynamic Detection
i) Using predefined payloads specified at [payloads.list](https://github.com/BitTheByte/BitTraversal/blob/master/list/payloads.list) which will be fetched at runtime from GitHub and matched against [regex.list](https://github.com/BitTheByte/BitTraversal/blob/master/list/regex.list)
ii) Still in development. the aim to detect same response requests like `/static/css/main.css/` and `/static/../static/css/main.css` with minimal false postives and also apply similar techniques like the ones found in `CVE-2020-5902`, `CVE-2020-15506`
# Papers
https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf