Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 3abcd69

Browse files
committed
strange combination of "Set-Cookie" and interleaved pattern of True/False like responses can result in bypassing of the ABAB test
1 parent e88687b commit 3abcd69

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

lib/controller/checks.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -556,10 +556,10 @@ def _():
556556
retVal = None
557557
elif checkBooleanExpression("%d>(%d+%d)" % (min(randInt1, randInt2), randInt3, max(randInt1, randInt2))):
558558
retVal = None
559-
elif not checkBooleanExpression("%d=(%d+%d)" % (randInt1 + randInt2, randInt1, randInt2)):
560-
retVal = None
561559
elif checkBooleanExpression("(%d+%d)>%d" % (randInt3, min(randInt1, randInt2), randInt1 + randInt2 + randInt3)):
562560
retVal = None
561+
elif not checkBooleanExpression("%d=(%d+%d)" % (randInt1 + randInt2, randInt1, randInt2)):
562+
retVal = None
563563

564564
if retVal is None:
565565
warnMsg = "false positive or unexploitable injection point detected"

0 commit comments

Comments
 (0)