lollms-webui/tests/pentests/path_traversal/open_code_folder_vulenerability.py

19 lines
527 B
Python
Raw Normal View History

2024-02-14 23:35:04 +00:00
import requests
# Set the URL of the endpoint
2024-05-02 22:58:18 +00:00
url = "http://localhost:9600/open_discussion_folder"
2024-02-14 23:35:04 +00:00
# Valid folder path
valid_folder_path = {"folder_path": "c:"}
# Non-valid executable file path
non_valid_file_path = {"folder_path": "c:/file.exe"}
# Send the valid folder path request
valid_response = requests.post(url, json=valid_folder_path)
print(valid_response.json())
# Send the non-valid executable file path request
non_valid_response = requests.post(url, json=non_valid_file_path)
print(non_valid_response.json())