diff --git a/dojo/tools/qualys_webapp/parser.py b/dojo/tools/qualys_webapp/parser.py index bc0dcd9590b..fc1a01b84ff 100644 --- a/dojo/tools/qualys_webapp/parser.py +++ b/dojo/tools/qualys_webapp/parser.py @@ -8,13 +8,13 @@ from dojo.models import Endpoint, Finding try: - from django.conf.settings import QUALYS_WAS_WEAKNESS_IS_VULN + from dojo.settings.settings import QUALYS_WAS_WEAKNESS_IS_VULN except ImportError: # Avoid breaking change QUALYS_WAS_WEAKNESS_IS_VULN = False try: - from django.conf.settings import QUALYS_WAS_UNIQUE_ID + from dojo.settings.settings import QUALYS_WAS_UNIQUE_ID except ImportError: # Avoid breaking change QUALYS_WAS_UNIQUE_ID = False @@ -194,9 +194,6 @@ def get_unique_vulnerabilities( url = vuln.findtext("URL") if url is not None: urls.append(str(url)) - access_path = vuln.find("ACCESS_PATH") - if access_path is not None: - urls += [url.text for url in access_path.iter("URL")] payloads = vuln.find("PAYLOADS") req_resps = get_request_response(payloads) if payloads is not None else [[], []] @@ -258,9 +255,6 @@ def get_vulnerabilities( url = vuln.findtext("URL") if url is not None: urls.append(str(url)) - access_path = vuln.find("ACCESS_PATH") - if access_path is not None: - urls += [url.text for url in access_path.iter("URL")] payloads = vuln.find("PAYLOADS") req_resps = get_request_response(payloads) if payloads is not None else [[], []]