@@ -135,7 +135,7 @@ def search_and_save_vul(engine: Optional[VulEngine],
135135 )
136136 return
137137 if not queryset .values ('id' ).exists ():
138- logger .error (
138+ logger .warning (
139139 f'current method pool hit rule { strategy .get ("type" )} , but no vul strategy.'
140140 )
141141 return
@@ -240,7 +240,7 @@ def search_vul_from_method_pool(self, method_pool_sign, agent_id, retryable=Fals
240240 tries = self .request .retries + 1
241241 raise RetryableException (f'漏洞检测方法池 { method_pool_sign } 不存在,重试第 { tries } 次' )
242242 else :
243- logger .error (f'漏洞检测超过最大重试次数 { self .max_retries } ,方法池 { method_pool_sign } 不存在' )
243+ logger .warning (f'漏洞检测超过最大重试次数 { self .max_retries } ,方法池 { method_pool_sign } 不存在' )
244244 else :
245245 logger .warning (f'漏洞检测终止,方法池 { method_pool_sign } 不存在' )
246246 return
@@ -270,10 +270,9 @@ def search_vul_from_method_pool(self, method_pool_sign, agent_id, retryable=Fals
270270 delay = 5 + pow (3 , self .request .retries ) * 10
271271 self .retry (exc = e , countdown = delay )
272272 else :
273- logger .error (f'漏洞检测超过最大重试次数,错误原因:{ e } ' )
273+ logger .info (f'漏洞检测超过最大重试次数,错误原因:{ e } ' )
274274 except Exception as e :
275- logger .error (e , exc_info = True )
276- logger .error (f'漏洞检测出错,方法池 { method_pool_sign } . 错误原因:{ e } ' )
275+ logger .error (f'漏洞检测出错,方法池 { method_pool_sign } . 错误原因:{ e } ' , exc_info = e )
277276
278277
279278@shared_task (queue = 'dongtai-replay-vul-scan' )
@@ -559,7 +558,7 @@ def vul_recheck():
559558 try :
560559 params = json .loads (vulnerability ['param_name' ])
561560 except JSONDecodeError as e :
562- logger .error (f'污点数据解析出错,原因:{ e } ' )
561+ logger .warning (f'污点数据解析出错,原因:{ e } ' , exc_info = e )
563562 Replay .replay_failed (replay = replay , timestamp = timestamp )
564563 con = 1
565564 else :
@@ -619,7 +618,7 @@ def vul_recheck():
619618 try :
620619 headers = base64 .b64encode ('\n ' .join (header_raw ))
621620 except Exception as e :
622- logger .error (f'请求头解析失败,漏洞ID: { vulnerability ["id" ]} ' )
621+ logger .warning (f'请求头解析失败,漏洞ID: { vulnerability ["id" ]} ' , exc_info = e )
623622 elif position == 'COOKIE' :
624623 import base64
625624 header_raw = base64 .b64decode (headers ).decode ('utf-8' ).split ('\n ' )
0 commit comments