diff --git a/tests/exploits/cve_2024_12847_test.py b/tests/exploits/cve_2024_12847_test.py index 1f1b998..6858359 100644 --- a/tests/exploits/cve_2024_12847_test.py +++ b/tests/exploits/cve_2024_12847_test.py @@ -12,12 +12,12 @@ def testNetgearDGNCommandInjection_whenVulnerable_reportFinding( ) -> None: """Test case: when target is vulnerable to command injection.""" requests_mock.get( - "http://localhost:80/setup.cgi/", + "http://localhost:80/setup.cgi", status_code=200, ) requests_mock.get( - "http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat+/www/.htpasswd&curpath=/¤tsetting.htm=1", + "http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat%2B%2Fwww%2F.htpasswd&curpath=%2F¤tsetting.htm=1", text="admin:$1$12345678$ABCDEFGHIJKLMNOPQRSTUVWX", status_code=200, ) @@ -40,12 +40,12 @@ def testNetgearDGNCommandInjection_whenNotNetgear_reportNothing( ) -> None: """Test case: when target is not a Netgear device.""" requests_mock.get( - "http://localhost:80/setup.cgi/", + "http://localhost:80/setup.cgi", status_code=200, ) requests_mock.get( - "http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat+/www/.htpasswd&curpath=/¤tsetting.htm=1", + "http://localhost:80/setup.cgi?next_file=netgear.cfg&todo=syscmd&cmd=cat%2B%2Fwww%2F.htpasswd&curpath=%2F¤tsetting.htm=1", status_code=401, )