andresriancho / w3af

w3af: web application attack and audit framework, the open source web vulnerability scanner.
http://w3af.org/
4.48k stars 1.21k forks source link

ScanMustStopByUserRequest: The user stopped the scan. #2711

Closed 1d3df9903ad closed 9 years ago

1d3df9903ad commented 10 years ago

Version Information

  Python version: 2.7.4 (default, Sep 26 2013, 03:20:26) [GCC 4.7.3]
  GTK version: 2.24.17
  PyGTK version: 2.24.0
  w3af version:
    w3af - Web Application Attack and Audit Framework
    Version: 1.6.0.2
    Revision: 559e8678c1 - 13 mag 2014 14:40
    Branch: master
    Local changes: No
    Author: Andres Riancho and the w3af team.

Traceback

Traceback (most recent call last):
  File "/home/user/hackingTools/w3af/w3af/core/ui/gui/tabs/exploit/vuln_list.py", line 276, in _launch_exploit
    expl.exploit(vuln_id_list)
  File "/home/user/hackingTools/w3af/w3af/core/controllers/plugins/attack_plugin.py", line 198, in exploit
    s = self._generate_shell(vuln)
  File "/home/user/hackingTools/w3af/w3af/plugins/attack/dav.py", line 70, in _generate_shell
    if self._verify_vuln(vuln_obj):
  File "/home/user/hackingTools/w3af/w3af/plugins/attack/dav.py", line 102, in _verify_vuln
    self._uri_opener.PUT(url_to_upload, data=file_content)
  File "/home/user/hackingTools/w3af/w3af/core/controllers/plugins/plugin.py", line 219, in meth
    return attr(*args, **kwargs)
  File "/home/user/hackingTools/w3af/w3af/core/data/url/extended_urllib.py", line 398, in __call__
    return self._xurllib._send(req, grep=grep)
  File "/home/user/hackingTools/w3af/w3af/core/data/url/extended_urllib.py", line 436, in _send
    self._before_send_hook()
  File "/home/user/hackingTools/w3af/w3af/core/data/url/extended_urllib.py", line 105, in _before_send_hook
    self._sleep_if_paused_die_if_stopped()
  File "/home/user/hackingTools/w3af/w3af/core/data/url/extended_urllib.py", line 123, in _sleep_if_paused_die_if_stopped
    analyze_state()
  File "/home/user/hackingTools/w3af/w3af/core/data/url/extended_urllib.py", line 119, in analyze_state
    raise ScanMustStopByUserRequest(msg)
ScanMustStopByUserRequest: The user stopped the scan.
andresriancho commented 9 years ago

The problem here seems to be that the user has stopped the scan and then tries to exploit the vulnerabilities found.

Related with #2704