sqlmap/tamper/doubleencode.py

26 lines
688 B
Python
Raw Normal View History

2010-10-14 18:05:05 +04:00
#!/usr/bin/env python
"""
$Id$
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
See the file doc/COPYING for copying permission.
"""
2010-10-13 18:29:53 +04:00
import re
from lib.core.convert import urlencode
2010-10-13 18:37:11 +04:00
from lib.core.exception import sqlmapUnsupportedFeatureException
2010-10-13 18:29:53 +04:00
"""
2010-10-14 10:20:32 +04:00
Tampering value -> urlencode(value) (e.g., SELECT%20FIELD%20FROM%20TABLE -> SELECT%25%20FIELD%25%20FROM%25%20TABLE)
2010-10-13 18:29:53 +04:00
"""
def tamper(place, value):
if value:
2010-10-13 18:37:11 +04:00
if place != "URI":
value = urlencode(value)
else:
2010-10-14 00:59:06 +04:00
raise sqlmapUnsupportedFeatureException, "can't use tampering module '%s' with 'URI' type injections" % __name__
2010-10-13 18:29:53 +04:00
return value