From 7f89cc753d2302ef2dfc31b1fe1bda1e0d04b01f Mon Sep 17 00:00:00 2001 From: Daniel Goldberg Date: Mon, 2 Apr 2018 18:05:52 +0300 Subject: [PATCH 1/2] Add missing pip dependency --- infection_monkey/requirements.txt | 1 + 1 file changed, 1 insertion(+) diff --git a/infection_monkey/requirements.txt b/infection_monkey/requirements.txt index 2c96e311c..bd7689886 100644 --- a/infection_monkey/requirements.txt +++ b/infection_monkey/requirements.txt @@ -14,3 +14,4 @@ ecdsa netifaces mock nose +ipaddress \ No newline at end of file From 2365f4db42ebff3d435daaf878db0e7b2889634e Mon Sep 17 00:00:00 2001 From: Daniel Goldberg Date: Mon, 2 Apr 2018 18:28:44 +0300 Subject: [PATCH 2/2] Fix edge case when returning invalid input in EG exploiter --- infection_monkey/exploit/elasticgroovy.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/infection_monkey/exploit/elasticgroovy.py b/infection_monkey/exploit/elasticgroovy.py index cdd3e0dcb..182b8d792 100644 --- a/infection_monkey/exploit/elasticgroovy.py +++ b/infection_monkey/exploit/elasticgroovy.py @@ -204,7 +204,7 @@ class ElasticGroovyExploiter(HostExploiter): """ result = self.attack_query(payload) if not result: # not vulnerable - return False + return "" return result[0] def attack_query(self, payload):