commixproject / commix

Automated All-in-One OS Command Injection Exploitation Tool.
https://commixproject.com
Other
4.54k stars 811 forks source link

Bug Report: Unhandled exception "UnicodeDecodeError: 'utf8' codec can't decode byte 0xa8 in position 137: invalid start byte" #737

Closed commixreporter closed 2 years ago

commixreporter commented 2 years ago
Commix version: 3.4-dev#39
Python version: 2.7.18
Operating system: posix
Command line: commix.py --url=************************************************* --file-write=/tmp/exploit45010 --file-dest=/tmp/
Traceback (most recent call last):
  File "commix.py", line 35, in <module>
    main()
  File "commix.py", line 30, in main
    import src.core.main
  File "main.py", line 941, in <module>
    main(filename, url)
  File "main.py", line 609, in main
    controller.do_check(url, http_request_method, filename)
  File "controller.py", line 750, in do_check
    perform_checks(url, http_request_method, filename)
  File "controller.py", line 673, in perform_checks
    basic_level_checks()
  File "controller.py", line 641, in basic_level_checks
    get_request(url, http_request_method, filename, timesec)
  File "controller.py", line 552, in get_request
    injection_proccess(url, check_parameter, http_request_method, filename, timesec)
  File "controller.py", line 347, in injection_proccess
    classic_command_injection_technique(url, timesec, filename, http_request_method)
  File "controller.py", line 144, in classic_command_injection_technique
    if cb_handler.exploitation(url, timesec, filename, http_request_method, injection_type, technique) != False:
  File "cb_handler.py", line 460, in exploitation
    if cb_injection_handler(url, timesec, filename, http_request_method, injection_type, technique) == False:
  File "cb_handler.py", line 347, in cb_injection_handler
    cb_file_access.do_check(separator, TAG, prefix, suffix, whitespace, http_request_method, url, vuln_parameter, alter_shell, filename, timesec)
  File "cb_file_access.py", line 228, in do_check
    file_write(separator, TAG, prefix, suffix, whitespace, http_request_method, url, vuln_parameter, alter_shell, filename, timesec)
  File "cb_file_access.py", line 140, in file_write
    response = cb_injector.injection(separator, TAG, cmd, prefix, suffix, whitespace, http_request_method, url, vuln_parameter, alter_shell, filename)
  File "cb_injector.py", line 244, in injection
    response = check_injection(separator, TAG, cmd, prefix, suffix, whitespace, http_request_method, url, vuln_parameter, alter_shell, filename)
  File "cb_injector.py", line 160, in check_injection
    payload = cb_payloads.cmd_execution(separator, TAG, cmd)
  File "cb_payloads.py", line 141, in cmd_execution
    "$(echo " + TAG + ")" + TAG + ""
  File "utf_8.py", line 16, in decode
    return codecs.utf_8_decode(input, errors, True)
UnicodeDecodeError: 'utf8' codec can't decode byte 0xa8 in position 137: invalid start byte
stasinopoulos commented 2 years ago

Similar with https://github.com/commixproject/commix/issues/707

github-actions[bot] commented 2 years ago

This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related issues.