Name |
Last commit
|
Last update |
---|---|---|
.. | ||
modules | ||
templates | ||
utils | ||
wordlists | ||
__init__.py | ||
exceptions.py | ||
exploits.py | ||
interpreter.py | ||
payloads.py | ||
printer.py | ||
shell.py | ||
threads.py | ||
validators.py |
The HTTP HEAD method in general doesn't return the content of the body, unless it is a redirection page, so line `and len(response.text) > 500:` will never be true if second line of check `response = http_request(method="HEAD", url=url)` get a response. As result, devices seem no vulnerable when actually it is. Data: ``` HEAD /rom-0 HTTP/1.1 Host: 192.168.254.254 Connection: keep-alive Accept-Encoding: gzip, deflate Accept: */* User-Agent: python-requests/2.18.4 HTTP/1.1 200 OK Content-Type: application/octet-stream Date: Sat, 01 Jan 2000 00:18:54 GMT Last-Modified: Wed, 01 Jan 1930 00:18:54 GMT Content-Length: 16384 Server: RomPager/4.07 UPnP/1.0 EXT: ``` My suggestion is just to check whether content type doesn't return "text/html" as value, so it correct this issue and keep the previous false positive fixed. `and "html" not in response.headers['Content-Type']:` or `and response.headers['Content-Type'] == "application/octet-stream": That'is it.
Name |
Last commit
|
Last update |
---|---|---|
.. | ||
modules | Loading commit data... | |
templates | Loading commit data... | |
utils | Loading commit data... | |
wordlists | Loading commit data... | |
__init__.py | Loading commit data... | |
exceptions.py | Loading commit data... | |
exploits.py | Loading commit data... | |
interpreter.py | Loading commit data... | |
payloads.py | Loading commit data... | |
printer.py | Loading commit data... | |
shell.py | Loading commit data... | |
threads.py | Loading commit data... | |
validators.py | Loading commit data... |