andresriancho / w3af

w3af: web application attack and audit framework, the open source web vulnerability scanner.
http://w3af.org/
4.58k stars 1.22k forks source link

[Auto-Generated] Bug Report - raise self._value #655

Closed 1d3df9903ad closed 11 years ago

1d3df9903ad commented 11 years ago

User description

No user description was provided for this bug report given that it was related to handled exceptions in scan with id 9ce8d26a95

The user provided the following email address for contact: neil@abilitation.com

Version Information

  Python version: 2.7.3 (default, Sep 26 2012, 21:53:58) [GCC 4.7.2]
  GTK version: 2.24.13
  PyGTK version: 2.24.0
  w3af version:
    w3af - Web Application Attack and Audit Framework
    Version: 1.6
    Revision: 3ef1aa4e9e - 25 Sep 2013 13:10
    Author: Andres Riancho and the w3af team.

Traceback

An exception was found while running crawl.web_spider on "http://domain/ | Method: GET". The exception was: "deque mutated during iteration" at pool.py:get():554.The full traceback is:
  File "/home/user/w3af/core/controllers/core_helpers/consumers/crawl_infrastructure.py", line 389, in _discover_worker
    result = plugin.discover_wrapper(fuzzable_request)
  File "/home/user/w3af/core/controllers/plugins/crawl_plugin.py", line 47, in crawl_wrapper
    return self.crawl(fuzzable_request_copy)
  File "/home/user/w3af/plugins/crawl/web_spider.py", line 123, in crawl
    self._extract_links_and_verify(resp, fuzzable_req)
  File "/home/user/w3af/plugins/crawl/web_spider.py", line 202, in _extract_links_and_verify
    self._urls_to_verify_generator(resp, fuzzable_req)
  File "/home/user/w3af/core/controllers/threads/threadpool.py", line 76, in map_multi_args
    return self.map_async(one_to_many(func), iterable, chunksize).get()
  File "/usr/lib/python2.7/multiprocessing/pool.py", line 554, in get
    raise self._value

Enabled Plugins

{'attack': {},
 'audit': {u'sqli': <OptionList: >, u'xss': <OptionList: persistent_xss>},
 'auth': {},
 'bruteforce': {},
 'crawl': {u'web_spider': <OptionList: only_forward|follow_regex|ignore_regex>},
 'evasion': {},
 'grep': {u'ajax': <OptionList: >,
          u'analyze_cookies': <OptionList: >,
          u'blank_body': <OptionList: >,
          u'click_jacking': <OptionList: >,
          u'code_disclosure': <OptionList: >,
          u'credit_cards': <OptionList: >,
          u'directory_indexing': <OptionList: >,
          u'dom_xss': <OptionList: >,
          u'dot_net_event_validation': <OptionList: >,
          u'error_500': <OptionList: >,
          u'error_pages': <OptionList: >,
          u'feeds': <OptionList: >,
          u'file_upload': <OptionList: >,
          u'form_autocomplete': <OptionList: >,
          u'get_emails': <OptionList: only_target_domain>,
          u'hash_analysis': <OptionList: >,
          u'html_comments': <OptionList: >,
          u'http_auth_detect': <OptionList: >,
          u'http_in_body': <OptionList: >,
          u'lang': <OptionList: >,
          u'meta_tags': <OptionList: >,
          u'motw': <OptionList: >,
          u'objects': <OptionList: >,
          u'oracle': <OptionList: >,
          u'password_profiling': <OptionList: >,
          u'path_disclosure': <OptionList: >,
          u'private_ip': <OptionList: >,
          u'ssn': <OptionList: >,
          u'strange_headers': <OptionList: >,
          u'strange_http_codes': <OptionList: >,
          u'strange_parameters': <OptionList: >,
          u'strange_reason': <OptionList: >,
          u'svn_users': <OptionList: >,
          u'symfony': <OptionList: override>,
          u'user_defined_regex': <OptionList: single_regex|regex_file_path>,
          u'wsdl_greper': <OptionList: >},
 'infrastructure': {},
 'mangle': {},
 'output': {u'console': <OptionList: verbose>}}
andresriancho commented 11 years ago

Duplicates #654