When I finished discovering bugs via Vuln_Discover_Celery.py and executed Load_And_View_Results.py Vulnerable_Pickle, I got
/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py:111: ElasticsearchDeprecationWarning: [types removal] Specifying types in document index requests is deprecated, use the typeless endpoints instead (/{index}/_doc/{id}, /{index}/_doc, or /{index}/_create/{id}).
es.index(index=func_index, doc_type='external', body=func)
4%|#######2 | 1/28 [00:00<00:03, 7.70it/s]
Traceback (most recent call last):
File "/usr/local/bin/Load_And_View_Results.py", line 4, in <module>
__import__('pkg_resources').run_script('Firmware-Slap==1.0', 'Load_And_View_Results.py')
File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 658, in run_script
self.require(requires)[0].run_script(script_name, ns)
File "/usr/lib/python3/dist-packages/pkg_resources/__init__.py", line 1438, in run_script
exec(code, namespace, namespace)
File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 139, in <module>
main()
File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 57, in main
send_data(es, func)
File "/usr/local/lib/python3.6/dist-packages/Firmware_Slap-1.0-py3.6.egg/EGG-INFO/scripts/Load_And_View_Results.py", line 111, in send_data
es.index(index=func_index, doc_type='external', body=func)
File "/usr/local/lib/python3.6/dist-packages/elasticsearch/client/utils.py", line 92, in _wrapped
return func(*args, params=params, headers=headers, **kwargs)
File "/usr/local/lib/python3.6/dist-packages/elasticsearch/client/__init__.py", line 409, in index
body=body,
File "/usr/local/lib/python3.6/dist-packages/elasticsearch/transport.py", line 362, in perform_request
timeout=timeout,
File "/usr/local/lib/python3.6/dist-packages/elasticsearch/connection/http_urllib3.py", line 252, in perform_request
self._raise_error(response.status, raw_data)
File "/usr/local/lib/python3.6/dist-packages/elasticsearch/connection/base.py", line 282, in _raise_error
status_code, error_message, additional_info
elasticsearch.exceptions.RequestError: RequestError(400, 'mapper_parsing_exception', "failed to parse field [bpvars.ref.offset] of type [long] in document with id 'INBNoXIB0W9jodOYAQ34'. Preview of field's value: '18446744073709551576'")
Does it mean Vulnerable_Pickle file cannot be sent? Or the type bpvars.ref.offset is not supported by ES?
When I finished discovering bugs via
Vuln_Discover_Celery.py
and executedLoad_And_View_Results.py Vulnerable_Pickle
, I gotDoes it mean
Vulnerable_Pickle
file cannot be sent? Or the typebpvars.ref.offset
is not supported by ES?