-
Notifications
You must be signed in to change notification settings - Fork 2
Development and Administration Tools
To configure the email notification read the documentation for email notification (wiki).
For temp configuration or tests i recommend to use command line arguments (wiki).
To debug the CSP you may use the --security
arguments (you should not change the security
configuration for security reason) and configure the email notification. You have a application/json
page on http(s)://<server>:<port>/csp/debug/
with the Content Security Policy Report
WebScripts --security --admin-adresses "[email protected]" --n-adr "[email protected]" --s-server "smtp.email.com"
python -m unittest discover -s test -p Test*.py -v
File | Statements | missing | coverage |
---|---|---|---|
WebScripts.py | 887 | 3 | 99% |
commons.py | 422 | 1 | 99% |
utils.py | 477 | 1 | 99% |
Pages.py | 338 | 0 | 100% |
Errors.py | 27 | 0 | 100% |
TOTAL | 2151 | 5 | 99.76% |
-
To harden the WebScripts installation run this command with privileges:
sudo WebScripts/bin/python3 -m WebScripts.harden -p '<my admin password>' -o '<my webscripts user>' -d 'WebScripts/'
. See examples on installation page and deployment page. -
The hardening audit is performed when WebScripts server starts. The audit report is written in
audit.html
,audit.json
andaudit.txt
and emailed to Administrators. HTML report examples:
Level | Risk |
---|---|
CRITICAL | Operating system compromission (RCE, privileges escalation...) |
HIGH | WebScripts Server compromisssion and bypass of critical hardening rules |
MEDIUM | Denial of service of WebScripts server and administrator access (violation of data confidentiality and integrity) |
LOW | Good practice to avoid an unexplained crash of the service |
INFORMATION | Risky features you need to secure (you should not activate these features if it is not necessary) |
The WebScripts file integrity is checked hourly since version 2.5.0 (location, size, modification/creation date and content), since version 3.0.0 modules, cgi scripts and logs are checked too.
- [+] Scripts are checked
- [+] Static files are checked
- [+] Javascript files are checked
- [+] Data files are checked
- [+] Uploads files are checked
- [+] Logs files are checked
- [+] Configuration files are checked
- [+] Module files are checked
- [+] WebScripts code files are checked
- [+] HTML templates files are checked
Functional tests and WebScripts pentest tool.
To test the interface and configurations, I added a python script, invisible in the web index page, but you can use it to try, test or discover new features. The script is called test_config.py
, you can get it from this URL (on localhost:8000
) http://127.0.0.1:8000/web/scripts/test_config.py.