What does the code actually deliver in the HTTP request, and what path does the request travel?
Is the exploit that the request is made outside of the TOR proxy (thus revealing the true origin IP) or that it gathers information about the host and sends that via TOR to some machine?