Commit bb4677df by Marcin Bury

Fixing errors and false positives.

parent 955387d5
......@@ -48,7 +48,7 @@ class Exploit(exploits.Exploit):
return
if response.status_code == 200 and "password" in response.text:
print_succcess("Exploit success")
print_success("Exploit success")
print_status("Reading {} file".format(resource))
print_info(response.text)
else:
......@@ -61,7 +61,7 @@ class Exploit(exploits.Exploit):
response = http_request(method="GET", url=url)
if response is None:
return False # target is not vulnerable
continue
if response.status_code == 200 and "password" in response.text:
return True
......
......@@ -59,7 +59,7 @@ class Exploit(exploits.Exploit):
if response is None:
return False # target is not vulnerable
if response.status_code == 200 and len(response.text):
if response.status_code == 200 and "[fonts]" in response.text:
return True # target is vulnerable
return False # target not vulnerable
return False # target is not vulnerable
......@@ -3,6 +3,7 @@ from routersploit import (
print_success,
print_status,
print_error,
print_info,
http_request,
random_text,
mute,
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment