pwn0sec / PwnXSS

PwnXSS: Vulnerability (XSS) scanner exploit
MIT License
713 stars 136 forks source link

issues dealing with tel:// #13

Closed Impostor-syndrome closed 3 years ago

Impostor-syndrome commented 3 years ago

thanks for contributing

sites containing a tel:// tag breaks the process

[20:53:08] [INFO] Checking connection to: tel://00000000
[20:53:08] [CRITICAL] Internal error: No connection adapters were found for 'tel://00000000'
Traceback (most recent call last): File "pwnxss.py", line 73, in start() File "pwnxss.py", line 54, in start crawler.crawl(getopt.u,int(getopt.depth),getopt.proxy,getopt.user_agent,check(getopt),getopt.method,getopt.cookie) File "/home/****/temp/PwnXSS/lib/crawler/crawler.py", line 52, in crawl self.crawl(url,depth-1,base,proxy,level,method,cookie) File "/home/****/temp/PwnXSS/lib/crawler/crawler.py", line 44, in crawl urls=self.getLinks(base,proxy,headers,cookie) File "/home/**/temp/PwnXSS/lib/crawler/crawler.py", line 19, in getLinks text=conn.get(base).text File "/usr/local/lib/python3.8/site-packages/requests/sessions.py", line 537, in get return self.request('GET', url, kwargs) File "/usr/local/lib/python3.8/site-packages/requests/sessions.py", line 524, in request resp = self.send(prep, send_kwargs) File "/usr/local/lib/python3.8/site-packages/requests/sessions.py", line 631, in send adapter = self.get_adapter(url=request.url) File "/usr/local/lib/python3.8/site-packages/requests/sessions.py", line 722, in get_adapter raise InvalidSchema("No connection adapters were found for '%s'" % url) requests.exceptions.InvalidSchema: No connection adapters were found for 'tel://00000000'