Difference between revisions of "Category:OWASP Joomla Vulnerability Scanner Project - Roadmap"

From OWASP
Jump to: navigation, search
Line 7: Line 7:
 
To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc.
 
To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc.
  
 +
== OWASP Joomla Vulnerability Scanner RoadMap ==
  
== Overview ==
+
== Current Features ==
  
The purpose of this article is to maintain the desired change requests for the upcoming OWASP Joomla Vulnerability Scanner Project releases. If there is a particular feature that you would like to see implemented, please feel free to add it to the appropriate sections below.
+
The following features are currently available.
 +
* Searching known vulnerabilities of Joomla! & its components
 +
* Reporting to Text & HTML output
 +
* Immediate update capability via scanner or svn
  
== Planned Changes ==
+
== Future Features ==
  
 
The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release:
 
The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release:
 +
:# Write to files of "Request-Response" for found vulnerable things
 +
:# Add MD5 cracker for found md5 hashes
  
:# Write to files of "Request-Response" for found vunerable things
+
== Changes Under Consideration ==
:# Add MD5 cracker
+
:# Implement features suggested by users
+
  
== Deferred Changes ==
+
*Implement features suggested by users
 
+
 
+
== Changes Under Consideration ==
+

Revision as of 13:10, 16 June 2009

Contents

About OWASP Joomla Vulnerability Scanner

Joomla! is probably the most widely-used CMS out there due to its flexibility, user-friendlinesss, extensibility to name a few.So, watching its vulnerabilities and adding such vulnerabilities as KB to Joomla scanner takes ongoing activity.

It will help web developers and web masters to help identify possible security weaknesses on their deployed Joomla! sites. No web security scanner is dedicated only one CMS.

To my experience, security testing on Joomla! web application requires pentester to look back the published vulnerabilities and if free, move on to generic testing. If we do only generic testing, we might miss a lot because it needs the knowledge of Joomla! application - its vulnerabilities in what version, what components are vulnerable in what version, what common security mistakes that web masters make ...etc.

OWASP Joomla Vulnerability Scanner RoadMap

Current Features

The following features are currently available.

  • Searching known vulnerabilities of Joomla! & its components
  • Reporting to Text & HTML output
  • Immediate update capability via scanner or svn

Future Features

The following is a list of changes that are tentatively scheduled for the OWASP Joomla Vulnerability Scanner Project release:

  1. Write to files of "Request-Response" for found vulnerable things
  2. Add MD5 cracker for found md5 hashes

Changes Under Consideration

  • Implement features suggested by users

This category currently contains no pages or media.