Nmap Development mailing list archives
re: [PATCH] http.lua and malformed HTTP responses
From: jah <jah () zadkiel plus com>
Date: Mon, 16 Jun 2008 15:53:48 +0100
This patch, not that one!
--- http.lua.orig 2008-06-16 15:48:55.875000000 +0100 +++ http.lua 2008-06-16 15:47:56.609375000 +0100 @@ -109,11 +109,12 @@ -- build nicer table for header local last_header, match - for number, line in pairs( header ) do + for number, line in ipairs( header ) do if number == 1 then local code _, _, code = string.find( line, "HTTP/%d\.%d (%d+)") result.status = tonumber(code) + if not result.status then table.insert(body,line) end else match, _, key, value = string.find( line, "(.+): (.*)" ) if match and key and value then @@ -126,8 +127,10 @@ last_header = key else match, _, value = string.find( line, " +(.*)" ) - if match and value then + if match and value and last_header then result.header[last_header] = result.header[last_header] .. ',' .. value + elseif match and value then + table.insert(body,line) end end end
_______________________________________________ Sent through the nmap-dev mailing list http://cgi.insecure.org/mailman/listinfo/nmap-dev Archived at http://SecLists.Org
Current thread:
- [PATCH] http.lua and malformed HTTP responses jah (Jun 16)
- Re: [PATCH] http.lua and malformed HTTP responses Fyodor (Jun 28)
- <Possible follow-ups>
- re: [PATCH] http.lua and malformed HTTP responses jah (Jun 16)