| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| modules | ||
| templates | ||
| utils | ||
| wordlists | ||
| __init__.py | ||
| exceptions.py | ||
| exploits.py | ||
| interpreter.py | ||
| payloads.py | ||
| printer.py | ||
| shell.py | ||
| threads.py | ||
| validators.py |
The HTTP HEAD method in general doesn't return the content of the body, unless it is a redirection page, so line `and len(response.text) > 500:` will never be true if second line of check `response = http_request(method="HEAD", url=url)` get a response. As result, devices seem no vulnerable when actually it is. Data: ``` HEAD /rom-0 HTTP/1.1 Host: 192.168.254.254 Connection: keep-alive Accept-Encoding: gzip, deflate Accept: */* User-Agent: python-requests/2.18.4 HTTP/1.1 200 OK Content-Type: application/octet-stream Date: Sat, 01 Jan 2000 00:18:54 GMT Last-Modified: Wed, 01 Jan 1930 00:18:54 GMT Content-Length: 16384 Server: RomPager/4.07 UPnP/1.0 EXT: ``` My suggestion is just to check whether content type doesn't return "text/html" as value, so it correct this issue and keep the previous false positive fixed. `and "html" not in response.headers['Content-Type']:` or `and response.headers['Content-Type'] == "application/octet-stream": That'is it.
| Name |
Last commit
|
Last update |
|---|---|---|
| .. | ||
| modules | Loading commit data... | |
| templates | Loading commit data... | |
| utils | Loading commit data... | |
| wordlists | Loading commit data... | |
| __init__.py | Loading commit data... | |
| exceptions.py | Loading commit data... | |
| exploits.py | Loading commit data... | |
| interpreter.py | Loading commit data... | |
| payloads.py | Loading commit data... | |
| printer.py | Loading commit data... | |
| shell.py | Loading commit data... | |
| threads.py | Loading commit data... | |
| validators.py | Loading commit data... |