Releases: commixproject/commix
Releases · commixproject/commix
4.1-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Fixed: Handling of parameter names containing non-ASCII characters.
- Fixed: Handling of non-ASCII characters in URLs to ensure proper request encoding.
- Revised: Refactored with improved page decompression and safer HTTP response handling.
- Revised: Refactored OS looping to respect user-specified targets or automatically iterate over supported OSes if none are specified or detected.
- Revised: Refactored User-Agent strings to be loaded from external files rather than being hardcoded.
- Revised: Improved handling of URL redirections and associated HTTP responses.
- Revised: Improved prompts when merging or applying server-set cookies.
- Added: New switch
--http1.0to force all outgoing requests to useHTTP/1.0protocol. - Revised: Enhanced validation of user-specified parameters by detecting and reporting those that are not part of any recognized testable source.
- Revised: Enhanced injection logic with better handling of custom injection marker (i.e. asterisk
*) and improved tracking of tested parameters. - Revised: Improved detection of custom injection marker (i.e. asterisk
*) across HTTP input vectors (e.g., URL params, POST data, cookies, headers). - Revised: Improved heuristics for processing custom HTTP headers to correctly handle injection markers (i.e. asterisk
*). - Revised: Enhanced target encoding detection with improved charset extraction and prioritization from HTTP headers and HTML meta tags.
- Added: Ability to verify target URL content stability by comparing responses across delayed requests.
- Revised: Improved session handler for enhanced stability and data integrity.
- Revised: Improved semiblind ("file-based") technique with filename customization prompt (random or user-defined).
- Fixed: Improved handling of non-ASCII characters in URL path and query components.
- Fixed: Improved handling of HTTP errors missing response codes during authentication.
- Fixed: Improved handling of
URLErrorwithout HTTP response. - Fixed: Minor bug fix for missing
.txtfiles during setup/install. - Revised: Minor code refactoring to enhance the authentication process with detailed HTTP traffic inspection.
- Fixed: Improved handling of terminal input to prevent encoding errors.
- Fixed: Minor bug-fix in parsing improperly padded
Base64in Authorization headers. - Revised: Minor code refactoring to enhance file I/O reliability.
- Revised: Minor code refactoring to ensure compliance with PEP 440 versioning standards.
- Revised: Improved key transformation for nested structures using bracket notation and dot syntax.
- Fixed: Minor bug-fix in parsing improperly escaped characters in JSON objects.
- Fixed: Minor bug-fix in parsing empty or invalid JSON object.
- Added: New tamper script "randomcase.py" that replaces each character in a user-supplied OS command with a random case.
- Revised: Minor code refactoring regarding multiple tamper scripts.
- Revised: Minor code refactoring regarding payloads for time-related techniques (i.e. "time-based", "tempfile-based").
- Revised: Improvement regarding tamper script "backticks.py" for supporting time-related techniques (i.e. "time-based", "tempfile-based").
Note: For more check the detailed changeset.
v4.0-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Revised: Minor bug-fix regarding tamper script "backticks.py"
- Revised: Improvements regarding shell options
reverse_tcp,bind_tcp. - Revised: Major code refactoring regarding session handler.
- Revised: Minor improvement regarding options
--prefix,--suffix. - Revised: Improvement regarding writing text to the stdout (console) stream.
- Fixed: Minor bug-fix regarding combining custom injection marker (i.e. asterisk
*) with-poption. - Revised: Improvement regarding specifying multiple injection points by appending custom injection marker (i.e. asterisk
*). - Fixed: Minor bug-fix regarding crawler (i.e. option
--crawl). - Updated: Six (third party) module has been updated (Python 3.12 support).
- Revised: Minor improvement regarding determining (passively) the target's underlying operating system.
- Revised: Minor improvement for enabling end-users to choose whether to skip or continue testing the remaining parameters, if one is found vulnerable.
- Revised: Minor improvements regarding semiblind (i.e. "file-based") technique.
- Fixed: Minor bug-fix regarding option
--output-dir. - Revised: Improvement regarding option
--skipfor excluding certain parameter(s) from testing. - Revised: Improvement regarding specifying which parameter(s) to test (i.e.
-poption). - Revised: Improvement regarding processing / ignoring custom injection marker (i.e. asterisk
*). - Revised: Improvement regarding forcing usage of provided HTTP method (e.g.
PUT). - Revised: Improvement regarding parsing raw HTTP request from a file (i.e.
-roption). - Revised: Improvement regarding parsing JSON nested objects.
- Revised: Improvement regarding (basic) heuristic detection of WAF/IPS protection.
- Revised: Improvement regarding option
--ignore-codefor ignoring multiple (problematic) HTTP error codes. - Added: New option
--abort-codefor aborting on (problematic) HTTP error code(s) (e.g. 401) - Added: New option
--time-limitfor running with a time limit in seconds (e.g. 3600).
Note: For more check the detailed changeset.
v3.9-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Revised: Minor improvement regarding logging user-supplied command(s) (i.e.
--os-cmdoption) to a file. - Revised: Improvement regarding parsing HTTP requests through Tor HTTP proxy (i.e.
--torswitch). - Added: New (hidden) option
--ignore-stdinregarding ignoring STDIN input. (via @n00b-bot) - Revised: Minor improvement regarding successfully completing the scanning process (i.e. in case that parameters with anti-CSRF tokens are omitted). (via @xerxoria)
- Revised: Minor improvement regarding Windows-based payloads for semiblind (i.e. "file-based") technique (i.e. command execution output).
- Revised: Minor improvement in semiblind (i.e. "file-based") technique, regarding defining the URL where the execution output of an injected payload is shown.
- Added: New switch
--ignore-proxyto ignore the system default HTTP proxy. - Revised: Minor improvement regarding parsing HTTP requests through HTTP proxy (i.e.
--proxyoption). - Added: New switch
--smartfor conducting through tests only in case of positive heuristic(s). - Added: Translation for README.md in Turkish. (via @Kazgangap)
- Revised: Minor improvement regarding parsing SOAP/XML POST data.
Note: For more check the detailed changeset.
v3.8-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Revised: Minor improvement regarding parsing raw HTTP request from a file (i.e.
-roption). - Revised: Minor improvement regarding dynamic code evaluation technique (i.e. command execution output).
- Added: Translation for README.md in Farsi(Persian) (via @verfosec)
- Fixed: Minor bug-fix regarding
--skip-emptyflag, for skipping the testing of the parameter(s) with empty value(s). - Revised: Minor improvement regarding tamper script "uninitializedvariable.py", for adding randomly generated uninitialized bash variables between the characters of each command of the generated payloads.
- Revised: Minor improvement regarding skipping further tests involving target that an injection point has already been detected.
- Revised: Minor code refactoring regarding multiple tamper scripts (i.e. "backslashes.py", "dollaratsigns.py", "doublequotes.py", "singlequotes.py", "uninitializedvariable.py").
- Added: New tamper script "rev.py" that reverses (characterwise) the user-supplied operating system commands.
- Fixed: Minor bug-fix regarding checking for similarity in provided parameter(s) name(s) and value(s).
- Fixed: Minor bug-fix regarding forcing usage of SSL/HTTPS requests toward the target (i.e.
--force-sslflag). - Fixed: Minor bug-fix regarding setting custom output directory path (i.e.
--output-diroption). - Added: Support for
BearerHTTP authentication type. - Revised: Minor improvement regarding tamper script "xforwardedfor.py" (that appends a fake HTTP header
X-Forwarded-For). - Fixed: Minor bug-fix regarding not ignoring specified injection technique(s) when
--ignore-sessionor--flush-sessionoptions are set. - Replaced: The
--dependenciesoption has been replaced with--ignore-dependencies, regarding ignoring all required third-party library dependencies. - Added: New option
--alertto run host OS command(s) when injection point is found.
Note: For more check the detailed changeset.
v3.7-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Added: Translation for README.md in Indonesian (via @galihap76)
- Revised: Improvements regarding parsing HTTP requests through HTTP proxy (i.e.
--proxyoption). - Revised: Improvements regarding identifying injection marker (i.e. asterisk
*) in provided parameter values (e.g. GET, POST or HTTP headers). - Added: New option
--crawl-excluderegarding setting regular expression for excluding pages from crawling (e.g.logout). - Revised: Improvement regarding
--crawloption, for skipping further tests involving target that an injection point has already been detected. - Added: Support regarding combining
--crawloption with scanning multiple targets given from piped-input (i.e.stdin). - Revised: Minor improvement regarding adding PCRE
/emodifier (i.e. dynamic code evaluation technique). - Revised: Minor bug-fix regarding logging all HTTP traffic into a textual file (i.e.
-toption).
Note: For more check the detailed changeset.
v3.6-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Revised: Improvements regarding dynamic code evaluation heuristic check.
- Revised: Minor improvement regarding session handler.
- Revised: Minor improvement regarding
--wizardoption. - Added: New tamper script "printf2echo.py" that replaces the printf-based ASCII to Decimal
printf "%d" "'$char'"withecho -n $char | od -An -tuC | xargs. - Revised: Minor improvement regarding parsing HTTP requests through HTTP proxy (i.e.
--proxyoption). - Revised: Minor improvement regarding handling HTTP Error 401 (Unauthorized).
Note: For more check the detailed changeset.
v3.5-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Revised: Improvements regarding Windows-based payloads for every supported technique.
- Revised: Improvement regarding alternative shell (i.e.
--alter-shell) for generating Python 3x payloads. - Removed: The deprecated modules "ICMP exfiltration" and "DNS exfiltration" have been removed.
- Revised: Improvement regarding identifying injection marker (i.e. asterisk) in provided options.
- Revised: Improvement regarding shellshock module.
- Added: Support regarding parsing target(s) from piped-input (i.e.
stdin). - Added: New option
--answersto set user answers to asked questions during commix run. - Added: Support regarding combining
--crawloption with scanning multiple targets given in a textual file (i.e. via option-m). - Added: Support for normalizing crawling results.
- Revised: Improvement regarding crawler.
- Revised: Minor bug-fix regarding
--file-uploadoption. - Revised: Minor improvement regarding identifying
Hexand/orBase64encoded parameter(s) value(s). - Added: New option
--no-loggingfor disabling logging to a file. - Revised: Minor improvement regarding redirect handler.
- Updated: Minor update regarding scanning multiple targets given in a textual file (i.e. via option
-m). - Added: Support for heuristic detection regarding command injections.
- Revised: Ιmprovement regarding
--leveloption, which not only adds more injection points (i.e. Cookies, HTTP headers) but also performs more tests for each injection point. - Revised: Improvement regarding injecting into custom HTTP Header(s).
Note: For more check the detailed changeset.
v3.4-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Fixed: Bug-fix regarding forcing usage of provided HTTP method (e.g.
PUT). - Fixed: Bug-fix regarding parsing raw HTTP headers from a file (i.e.
-roption). - Fixed: Minor bug-fix regarding parsing JSON objects.
- Added: New option
--drop-set-cookiefor ignoringSet-CookieHTTP header from response. - Added: Support for checking for not declared cookie(s).
- Added: New (hidden) option
--smoke-testthat runs the basic smoke testing. - Revised: Improvement regarding mechanism which nagging if used "dev" version is > 30 days old.
- Revised: Improvements regarding dynamic code evaluation heuristic check.
- Replaced: The
--encodingoption has been replaced with--codec.
Note: For more check the detailed changeset.
v3.3-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Fixed: Minor bug-fix regarding scanning multiple targets given in a textual file (i.e. via option
-m). - Removed: The "Regsvr32.exe application whitelisting bypass" attack vector has been removed.
- Updated: Minor update regarding web delivery script (i.e. Python meterpreter reverse TCP shell).
- Replaced: The
--backticksswitch has been replaced with "backticks.py" tamper script. - Added: New tamper script "backticks.py" that uses backticks instead of
$(), for commands substitution. - Added: New option (
--skip-heuristic) for skipping dynamic code evaluation heuristic check. - Added: Support for parsing custom wordlists regarding HTTP authentication (i.e.
Basic,Digest) dictionary-based cracker. - Revised: Improvements regarding dynamic code evaluation heuristic check.
- Fixed: Minor bug-fix regarding parsing SOAP/XML data via
--dataoption. - Revised: Minor improvement regarding parsing GraphQL JSON objects.
- Added: The .bat files command separator (i.e.
%1a) has been added. - Added: New option
--methodto force usage of provided HTTP method (e.g.PUT).
Note: For more check the detailed changeset.
v3.2-stable
- Fixed: Multiple bug-fixes regarding several reported unhandled exceptions.
- Added: New tamper script "slash2env.py" that replaces slashes (
/) with environment variable value${PATH%%u*}. - Revised: Minor improvement regarding session handler for supporting Python 3.4+.
- Revised: Minor improvement regarding
--web-rootoption. - Added: New tamper script "uninitializedvariable.py" that adds uninitialized bash variables between the characters of each command of the generated payloads.
- Revised: Improvement regarding decompressing
deflate,x-gzipandgzipHTTP responses. - Fixed: Bug-fix regarding several charset-related unhandled exceptions.
- Revised: Improvements regarding dynamic code evaluation heuristic check.
- Fixed: Bug-fix regarding HTTP authentication (i.e.
Basic,Digest) dictionary-based cracker. - Fixed: Bug-fix regarding logging all HTTP traffic into a textual file.
- Revised: Improvement regarding crawler.
- Fixed: Multiple bug-fixes regarding supporting Python 3.9.
- Revised: Improvement regarding mechanism which nagging if used version is > 30 days old.
- Fixed: Multiple bug-fixes regarding the shellshock module.
- Revised: Improvement regarding Python 3.4+ for using the
html.unescape()function for converting HTML entities to plain-text representations. - Updated: Minor update regarding smartphones to imitate, through HTTP User-Agent header.
- Fixed: Bug-fix regarding setting suitable HTTP header User-Agent, when combining
--random-agentor--mobileswitch with-roption. - Fixed: Bug-fix regarding
Hexencoding/decoding. - Added: New option (
--timeout) for setting a number of seconds to wait before timeout connection (default 30). - Revised: Increased default timeout to 30 seconds.
- Fixed: Bug-fix regarding Basic HTTP authentication.
- Fixed: Bug-fix regarding connection problems (via @fuero).
Note: For more check the detailed changeset.