Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
R
routersploit
Overview
Overview
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
czos-dpend
routersploit
Commits
4bacabd3
Commit
4bacabd3
authored
Jul 17, 2016
by
fwkz
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Adding linter to Travis build. Expecting to fail.
parent
350f1212
Hide whitespace changes
Inline
Side-by-side
Showing
3 changed files
with
37 additions
and
4 deletions
+37
-4
.travis.yml
.travis.yml
+5
-3
4011g_5012nv_path_traversal.py
...oit/modules/exploits/2wire/4011g_5012nv_path_traversal.py
+1
-1
run_linter.sh
run_linter.sh
+31
-0
No files found.
.travis.yml
View file @
4bacabd3
...
...
@@ -4,6 +4,8 @@ python:
install
:
-
"
pip
install
-r
requirements.txt"
-
"
pip
install
pexpect"
-
"
pip
install
pexpect
pep8
pyflakes
"
script
:
"
python
-m
unittest
discover"
\ No newline at end of file
script
:
-
"
python
-m
unittest
discover"
-
"
./run_linter.sh"
\ No newline at end of file
routersploit/modules/exploits/2wire/4011g_5012nv_path_traversal.py
View file @
4bacabd3
...
...
@@ -20,7 +20,7 @@ class Exploit(exploits.Exploit):
'description'
:
'Module exploits path traversal vulnerability in 2Wire 4011G and 5012NV devices. '
'If the target is vulnerable it is possible to read file from the filesystem.'
,
'authors'
:
[
'adiaz'
,
# vulnerability discovery
'adiaz'
,
# vulnerability discovery
'Marcin Bury <marcin.bury[at]reverse-shell.com>'
,
# routersploit module
],
'references'
:
[
...
...
run_linter.sh
0 → 100755
View file @
4bacabd3
#!/usr/bin/env bash
IFS
=
' '
GREEN
=
'\033[0;32m'
YELLOW
=
'\033[0;33m'
RED
=
'\033[0;31m'
NC
=
'\033[0m'
# No Color
MODULES_PATH
=
./routersploit/modules
FAILURE
=
0
PEP
=
$(
pep8
--ignore
E501
$MODULES_PATH
)
PYFLAKES
=
$(
pyflakes
$MODULES_PATH
)
if
[
"
$PEP
"
]
;
then
echo
-e
"
${
RED
}
- PEP8 violations:
${
NC
}
"
echo
-e
$PEP
echo
""
FAILURE
=
1
else
echo
-e
"
${
GREEN
}
+ PEP8
${
NC
}
"
fi
if
[
"
$PYFLAKES
"
]
;
then
echo
-e
"
\n
${
RED
}
- pyflakes violations:
${
NC
}
"
echo
-e
$PYFLAKES
echo
"
\n
"
FAILURE
=
1
else
echo
-e
"
${
GREEN
}
+ pyflakes
${
NC
}
"
fi
exit
$FAILURE
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment