浏览代码

fixed openredirect

epsylon 4 年之前
父节点
当前提交
a1a1a120c0
共有 1 个文件被更改,包括 4 次插入4 次删除
  1. 4 4
      smuggler.py

+ 4 - 4
smuggler.py

@@ -449,16 +449,16 @@ def exploit_openredirect():
         if "EXPLOIT-5" in exp: # extract exploit-5 (open-redirect)
             if request_type == "TE-CL":
                 if "TE-CL" in exp: # exploit 5 TE-CL
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "CL-TE":
                 if "CL-TE" in exp: # exploit 5 CL-TE
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "TE-TE":
                 if "TE-TE" in exp: # exploit 5 TE-TE
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             elif request_type == "CL-CL":
                 if "CL-CL" in exp: # exploit 5 CL-CL
-                    exploit_xss_armed(method, path, target, location, content_length, exp, addr, SSL)
+                    exploit_openredirect_armed(method, path, target, location, content_length, exp, addr, SSL)
             else: # send all!
                 exploit = exp.split("#")[1]
                 exploit = exploit.replace("$method", method)