Closed Phoenix1112 closed 4 years ago
root@debian-recon:~/cve-2019-19781# python cve-2019-19781_scanner.py 67.109.188.129 443
Traceback (most recent call last): File "cve-2019-19781_scanner.py", line 79, in <module> else: check_server(args.target, args.targetport) File "cve-2019-19781_scanner.py", line 24, in check_server req = requests.get("https://%s:%s/vpn/../vpns/cfg/smb.conf" % (target,targetport), verify=False, timeout=2) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 75, in get return request('get', url, params=params, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/api.py", line 60, in request return session.request(method=method, url=url, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 533, in request resp = self.send(prep, **send_kwargs) File "/usr/lib/python2.7/dist-packages/requests/sessions.py", line 646, in send r = adapter.send(request, **kwargs) File "/usr/lib/python2.7/dist-packages/requests/adapters.py", line 529, in send raise ReadTimeout(e, request=request) requests.exceptions.ReadTimeout: HTTPSConnectionPool(host='67.109.188.129', port=443): Read timed out. (read timeout=2)
Thanks, I put a blanket exception in there so you shouldn't see those anymore. Git pull for the latest and thanks for the submission.
root@debian-recon:~/cve-2019-19781# python cve-2019-19781_scanner.py 67.109.188.129 443