Skip to content

Commit f86233f

Browse files
committed
Merge branch 'develop'
2 parents 81b279e + 71bee43 commit f86233f

File tree

3 files changed

+6
-4
lines changed

3 files changed

+6
-4
lines changed

Diff for: acstis/Driver.py

+4-2
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,8 @@
2424

2525
from nyawc.Options import Options
2626
from nyawc.Queue import QueueItem
27-
from nyawc.Crawler import Crawler, CrawlerActions
27+
from nyawc.Crawler import Crawler
28+
from nyawc.CrawlerActions import CrawlerActions
2829
from nyawc.http.Request import Request
2930
from acstis.Logging import Logging
3031
from acstis.Exploit import Exploit
@@ -67,7 +68,6 @@ def __init__(self, uri, verify_exploit, use_crawler, quit_if_vulnerable):
6768
self.crawler_options.scope.protocol_must_match = False
6869
self.crawler_options.scope.subdomain_must_match = True
6970
self.crawler_options.scope.domain_must_match = True
70-
self.crawler_options.scope.ignore_similar_requests = True
7171
self.crawler_options.scope.max_depth = 0 if not self.input_use_crawler else None
7272

7373
self.crawler_options.performance.max_threads = 8
@@ -94,6 +94,8 @@ def cb_crawler_after_finish(self, queue):
9494
Logging.info("Found {} vulnerable URI(s)".format(len(self.vulnerable_requests)))
9595

9696
def cb_request_before_start(self, queue, queue_item):
97+
Logging.info("Checking {}".format(queue_item.request.url))
98+
9799
result = Exploit.is_vulnerable(queue_item, self.website_details["angular_version"], self.input_verify_exploit)
98100

99101
if result is not False:

Diff for: requirements.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -2,4 +2,4 @@ beautifulsoup4==4.5.3
22
colorama==0.3.7
33
selenium==3.0.2
44
requests==2.13.0
5-
nyawc==1.3.0
5+
nyawc==1.4.1

Diff for: setup.py

+1-1
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
requirements = file.read().splitlines()
2929

3030
setup(
31-
version ="2.0.5",
31+
version ="2.0.6",
3232
name = "acstis",
3333
description = "Automated client-side template injection (CSTI, sandbox escape/bypass) detection for AngularJS!",
3434
long_description = "",

0 commit comments

Comments
 (0)