Onapsis / CVE-2020-6287_RECON-scanner

GNU Affero General Public License v3.0
28 stars 5 forks source link

Python #1

Open AloneAndUnknown opened 2 years ago

AloneAndUnknown commented 2 years ago

DEBUG:https://www.google.com:443 "POST /CTCWebService/CTCWebServiceBean HTTP/1.1" 404 1592 DEBUG:App response code: 404 DEBUG:Unexpected server header: gws Traceback (most recent call last): File "RECON_CVE-2020-6287_vuln_scanner.py", line 99, in res = assess.run_vulnerability_test() File "RECON_CVE-2020-6287_vuln_scanner.py", line 43, in run_vulnerability_test if asset_version >= 730 or asset_version == 0: TypeError: '>=' not supported between instances of 'str' and 'int'

bognolo commented 2 years ago
diff --git a/RECON_CVE-2020-6287_vuln_scanner.py b/RECON_CVE-2020-6287_vuln_scanner.py
index 3cc0b7b..40fb23a 100644
--- a/RECON_CVE-2020-6287_vuln_scanner.py
+++ b/RECON_CVE-2020-6287_vuln_scanner.py
@@ -68,7 +68,7 @@ class RECON_tester():

     def _get_server_version(self, http_response):
         server = ""
-        version = "0"
+        version = 0
         try:
             if 'server' in http_response.headers:
                 server = http_response.headers['server']