Open vveezy opened 3 days ago
Same hear any solution you got
Thanks to both for reporting this issue. Could you please provide more details about the command you're using to run the tool? This information will help us debug the problem internally.
it worked after the super user install but the results was negative python xssFuzz.py -u http://testphp.vulnweb.com/listproducts.php?cat=FUZZ
_ _ ____ ____ ____ _ _ ___ ___
\/ [__ [__ |___ | | / /
_/\_ ___] ___] | |__| /__ /__
# xssFuzzer by Asperis Security
[+] Checking CSP
[+] CSP Headers seems to be not present
[+] http://testphp.vulnweb.com/listproducts.php?cat=FUZZ scan initiated
[+] Testing Parameters:['cat']
[+] Parameter cat not handling dangerous characters properly!
[+] Filtering out the events now!
[+] Filtering out the payloads now!
[+] Loaded 0 Payloads
[+] Testing The Payloads
[-] No Valid Payloads Found
Traceback (most recent call last): , line 417, in
initialTest(val.url,val.headers)
, line 372, in initialTest
out = check_csp_vulnerabilities(response.headers['Content-Security-Policy'])
^^^^^^^^^^^^^^^^
AttributeError: 'NoneType' object has no attribute 'headers'