Cosmetic changes
This commit is contained in:
parent
ef6c512ea9
commit
208411d6fc
|
@ -30,9 +30,8 @@ CHECK_LINUX = "echo %s && lscpu" % ID_STRING
|
|||
EXISTS = "ls %s"
|
||||
|
||||
WEB_PORTS = [80, 443, 8080]
|
||||
# Timeouts if the payload is wrong
|
||||
DOWNLOAD_TIMEOUT = 30
|
||||
# This is set so that we don't have to wait for monkeys' output (in seconds)
|
||||
# In seconds. This is set so that we don't have to wait for monkeys' output.
|
||||
RESPONSE_TIMEOUT = 1
|
||||
|
||||
|
||||
|
@ -62,8 +61,6 @@ class Struts2Exploiter(HostExploiter):
|
|||
current_host = "http://%s:%d" % (self.host.ip_addr, port)
|
||||
# Get full URL
|
||||
url = self.get_redirected(current_host)
|
||||
# Get os architecture so that we don't have to update monkey
|
||||
|
||||
LOG.info("Trying to exploit with struts2")
|
||||
# Check if host is vulnerable and get host os architecture
|
||||
if 'linux' in self.host.os['type']:
|
||||
|
@ -87,7 +84,7 @@ class Struts2Exploiter(HostExploiter):
|
|||
if url and host_arch:
|
||||
LOG.info("Host is exploitable with struts2 RCE vulnerability")
|
||||
# If monkey already exists and option not to exploit in that case is selected
|
||||
if self.skip_exist and (self.check_remote_file(url, dropper_path)):
|
||||
if self.skip_exist and self.check_remote_file(url, dropper_path):
|
||||
return True
|
||||
|
||||
src_path = get_target_monkey(self.host)
|
||||
|
@ -194,6 +191,7 @@ class Struts2Exploiter(HostExploiter):
|
|||
try:
|
||||
return urllib2.urlopen(request).geturl()
|
||||
except urllib2.URLError:
|
||||
LOG.error("Can't reach struts2 server")
|
||||
return False
|
||||
|
||||
@staticmethod
|
||||
|
|
Loading…
Reference in New Issue