Ver código fonte

fixed openredirect

epsylon 4 anos atrás
pai
commit
a1a1a120c0
1 arquivos alterados com 4 adições e 4 exclusões
  1. 4 4
      smuggler.py

+ 4 - 4
smuggler.py

@@ -449,16 +449,16 @@ def exploit_openredirect():
         if "EXPLOIT-5" in exp: # extract exploit-5 (open-redirect)
             if request_type == "TE-CL":
                 if "TE-CL" in exp: # exploit 5 TE-CL
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "CL-TE":
                 if "CL-TE" in exp: # exploit 5 CL-TE
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "TE-TE":
                 if "TE-TE" in exp: # exploit 5 TE-TE
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "CL-CL":
                 if "CL-CL" in exp: # exploit 5 CL-CL
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             else: # send all!
                 exploit = exp.split("#")[1]
                 exploit = exploit.replace("$method", method)