-
Notifications
You must be signed in to change notification settings - Fork 568
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Explicit HTTPS scope item results in HTTP equivilant as a the only resulting URL
#805
Comments
@harrisonSoS thanks for the report. This sounds like it might be an interesting bug. There's one way that BBOT works differently from raw nuclei, and that's that the nuclei BBOT module accepts the I'm curious, what URLs do you have in your output? Do both the HTTP and HTTPS versions show up? Does it behave differently if you specify a host as a target instead of a URL? |
Ran the same BBOT instance with the above config with three different targets: http, https and raw endpoint resulting in vuln found, not found and found respectively: http://REDACTED - Nuclei vuln located
https://REDACTED - Nuclei vuln NOT located
REDACTED - Nuclei vuln located
|
Okay, this is good data. I'll see if I can reproduce it. |
URL
Seemingly this relates to prior URL discovery and |
You just pointed me in the right direction. Commenting out:
in That's because my However, whilst the root Do you think it would make sense to either change the default behaviour or have a flag to ignore What's odd to me, that perhaps makes sense to you, is that |
Ohh interesting.
I agree with this. I think making an exception for the root URL would make sense. @liquidsec what do you think?
Yes, |
This has been fixed in #808. A test has also been written to ensure the correct behavior. |
@TheTechromancer I agree that a 404 on the root page should be an exception. That is very much "alive" in every scenario I can think of. |
Out of the box BBOT other than the following modifications to
bbot.yml
:Using command line:
bbot -f web-basic -m nuclei --allow-deadly -t "https://REDACTED" -v -d
Seemingly, during
web-basic
modules, thehttp://REDACTED
endpoint equivalent is found and is set as the preferred endpoint as it is the only endpoint sent to nuclei (based on adding-debug
to the nuclei command run inbbot/modules/deadly/nuclei.py
and viewing the HTTP requests/responses).The nuclei template in question checks for status 200 and a REGEX on the response. However, hitting
http://REDACTED/path/nuclei/template/hits
returns a 302 to go tohttps://REDACTED/path/nuclei/template/hits
but this redirect is not followed, the template completes having not satisfied the criteria, and the known vulnerability is not reported. (Vuln is found running nuclei naked with thehttps://
scope outside of bbot).Forgive my ignorance, but there doesn't appear to be a flag to alter this behaviour to either a) prefer HTTPS, b) run nuclei on http and https or c) follow nuclei redirects.
http_max_redirects
has no effect.Is it possible to get a new config option, default behaviour or workaround for this issue?
Many thanks!
The text was updated successfully, but these errors were encountered: