commixproject / commix

Automated All-in-One OS Command Injection Exploitation Tool.
https://commixproject.com
Other
4.62k stars 818 forks source link

Bug Report: Unhandled exception "IndexError: list index out of range" (#b47181c1) #952

Closed commixreporter closed 1 month ago

commixreporter commented 3 months ago
Commix version: 4.0-dev#91
Python version: 3.11.2
Operating system: posix
Command line: commix.py -r ************* --random-agent --tamper=base64encode,space2ifs
Traceback (most recent call last):
  File \"commix.py", line 36, in <module>
    main()
  File \"commix.py", line 31, in main
    import src.core.main
  File \"main.py", line 904, in <module>
    main(filename, url, http_request_method)
  File \"main.py", line 560, in main
    controller.do_check(url, http_request_method, filename)
  File \"controller.py", line 736, in do_check
    perform_checks(url, http_request_method, filename)
  File \"controller.py", line 701, in perform_checks
    data_checks(url, http_request_method, filename, timesec)
  File \"controller.py", line 607, in data_checks
    if get_request(url, http_request_method, filename, timesec) is None:
       ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File \"controller.py", line 569, in get_request
    do_injection(found_url, settings.HTTPMETHOD.GET, header_name, url, http_request_method, filename, timesec)
  File \"controller.py", line 528, in do_injection
    injection_proccess(url, check_parameter, http_request_method, filename, timesec)
  File \"controller.py", line 332, in injection_proccess
    url = command_injection_heuristic_basic(url, http_request_method, check_parameter, the_type, header_name, inject_http_headers)
          ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File \"controller.py", line 121, in command_injection_heuristic_basic
    checks.perform_payload_modification(payload="")
  File \"checks.py", line 1868, in perform_payload_modification
    payload = base64encode.tamper(payload)
              ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  File \"base64encode.py", line 32, in tamper
    if settings.WHITESPACES[0] == "+":
       ~~~~~~~~~~~~~~~~~~~~^^^
IndexError: list index out of range
github-actions[bot] commented 1 week ago

This issue has been automatically locked due to inactivity.
Please file a new issue if you are encountering a similar or related problem.

This action has been performed automatically by a bot.