ChrisTheCoolHut / Firmware_Slap

Discovering vulnerabilities in firmware through concolic analysis and function clustering.
GNU General Public License v3.0
468 stars 79 forks source link

Failed to send data to elastic search #32

Closed BrieflyX closed 4 years ago

BrieflyX commented 4 years ago

When I finished discovering bugs via Vuln_Discover_Celery.py and executed Load_And_View_Results.py Vulnerable_Pickle, I got

/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py:111: ElasticsearchDeprecationWarning: [types removal] Specifying types in document index requests is deprecated, use the typeless endpoints instead (/{index}/_doc/{id}, /{index}/_doc, or /{index}/_create/{id}).
  es.index(index=func_index, doc_type='external', body=func)
  4%|#######2                                                                                                                                                                                                  | 1/28 [00:00<00:03,  7.70it/s]
Traceback (most recent call last):
  File "/usr/local/bin/Load_And_View_Results.py", line 4, in <module>
    __import__('pkg_resources').run_script('Firmware-Slap==1.0', 'Load_And_View_Results.py')
  File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 658, in run_script
    self.require(requires)[0].run_script(script_name, ns)
  File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 1438, in run_script
    exec(code, namespace, namespace)
  File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 139, in <module>
    main()
  File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 57, in main
    send_data(es, func)
  File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 111, in send_data
    es.index(index=func_index, doc_type='external', body=func)
  File "/usr/local/lib/python3.6/dist-packages/elasticsearch/client/utils.py", line 92, in _wrapped
    return func(*args, params=params, headers=headers, **kwargs)
  File "/usr/local/lib/python3.6/dist-packages/elasticsearch/client/__init__.py", line 409, in index
    body=body,
  File "/usr/local/lib/python3.6/dist-packages/elasticsearch/transport.py", line 362, in perform_request
    timeout=timeout,
  File "/usr/local/lib/python3.6/dist-packages/elasticsearch/connection/http_urllib3.py", line 252, in perform_request
    self._raise_error(response.status, raw_data)
  File "/usr/local/lib/python3.6/dist-packages/elasticsearch/connection/base.py", line 282, in _raise_error
    status_code, error_message, additional_info
elasticsearch.exceptions.RequestError: RequestError(400, 'mapper_parsing_exception', "failed to parse field [bpvars.ref.offset] of type [long] in document with id 'INBNoXIB0W9jodOYAQ34'. Preview of field's value: '18446744073709551576'")

Does it mean Vulnerable_Pickle file cannot be sent? Or the type bpvars.ref.offset is not supported by ES?