andresriancho / w3af

w3af: web application attack and audit framework, the open source web vulnerability scanner.
http://w3af.org/
4.57k stars 1.22k forks source link

[Auto-Generated] Bug Report - raise self._value #268

Closed 1d3df9903ad closed 11 years ago

1d3df9903ad commented 11 years ago

User description

No user description was provided for this bug report given that it was related to handled exceptions in scan with id 4ed049291a

Version Information

  Python version: 2.7.3 (default, Aug  1 2012, 05:14:39) [GCC 4.6.3]
  GTK version: 2.24.10
  PyGTK version: 2.24.0
  w3af version:
    w3af - Web Application Attack and Audit Framework
    Version: 1.5
    Revision: 123e131d1a - 21 Apr 2013 23:42
    Author: Andres Riancho and the w3af team.

Traceback

An exception was found while running crawl.web_spider on "http://domain/gift/R296/Earrings | Method: GET". The exception was: "unsupported operand type(s) for +: 'NoneType' and 'str'" at pool.py:get():528.The full traceback is:
  File "/root/src/w3af/core/controllers/core_helpers/consumers/crawl_infrastructure.py", line 389, in _discover_worker
    result = plugin.discover_wrapper(fuzzable_request)
  File "/root/src/w3af/core/controllers/plugins/crawl_plugin.py", line 47, in crawl_wrapper
    return self.crawl(fuzzable_request_copy)
  File "/root/src/w3af/plugins/crawl/web_spider.py", line 124, in crawl
    self._extract_links_and_verify(resp, fuzzable_req)
  File "/root/src/w3af/plugins/crawl/web_spider.py", line 204, in _extract_links_and_verify
    resp, fuzzable_req)
  File "/root/src/w3af/core/controllers/threads/threadpool.py", line 76, in map_multi_args
    return self.map_async(one_to_many(func), iterable, chunksize).get()
  File "/usr/lib/python2.7/multiprocessing/pool.py", line 528, in get
    raise self._value

Enabled Plugins

{'attack': {},
 'audit': {'dav': {},
           'eval': {},
           'frontpage': {},
           'generic': {},
           'preg_replace': {},
           'sqli': {},
           'ssi': {},
           'xpath': {},
           'xss': {},
           'xst': {}},
 'auth': {},
 'bruteforce': {},
 'crawl': {'archive_dot_org': {},
           'bing_spider': {},
           'content_negotiation': {},
           'digit_sum': {},
           'dir_file_bruter': {},
           'dot_listing': {},
           'find_backdoors': {},
           'find_captchas': {},
           'find_dvcs': {},
           'ghdb': {},
           'google_spider': {},
           'import_results': {},
           'oracle_discovery': {},
           'phishtank': {},
           'phpinfo': {},
           'pykto': {},
           'ria_enumerator': {},
           'robots_txt': {},
           'sitemap_xml': {},
           'spider_man': {},
           'url_fuzzer': {},
           'urllist_txt': {},
           'user_dir': {},
           'web_diff': {},
           'web_spider': {},
           'wordnet': {},
           'wordpress_enumerate_users': {},
           'wordpress_fingerprint': {},
           'wordpress_fullpathdisclosure': {},
           'wsdl_finder': {}},
 'evasion': {},
 'grep': {'ajax': {},
          'error_500': {},
          'feeds': {},
          'lang': {},
          'motw': {},
          'objects': {},
          'oracle': {},
          'ssn': {},
          'wsdl_greper': {}},
 'infrastructure': {'allowed_methods': {},
                    'finger_bing': {},
                    'finger_google': {},
                    'finger_pks': {},
                    'frontpage_version': {},
                    'server_header': {}},
 'mangle': {},
 'output': {'console': {}}}
andresriancho commented 11 years ago

Seems to be the same issue as #265