sqlmap/tamper/doubleencode.py

26 lines
689 B
Python
Raw Normal View History

2010-10-14 18:05:05 +04:00
#!/usr/bin/env python
"""
$Id$
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
2010-10-15 03:18:29 +04:00
See the file 'doc/COPYING' for copying permission
"""
2010-10-13 18:29:53 +04:00
import re
from lib.core.convert import urlencode
2010-10-13 18:37:11 +04:00
from lib.core.exception import sqlmapUnsupportedFeatureException
2010-10-13 18:29:53 +04:00
"""
2010-10-14 10:20:32 +04:00
Tampering value -> urlencode(value) (e.g., SELECT%20FIELD%20FROM%20TABLE -> SELECT%25%20FIELD%25%20FROM%25%20TABLE)
2010-10-13 18:29:53 +04:00
"""
def tamper(place, value):
if value:
2010-10-13 18:37:11 +04:00
if place != "URI":
value = urlencode(value)
else:
2010-10-14 00:59:06 +04:00
raise sqlmapUnsupportedFeatureException, "can't use tampering module '%s' with 'URI' type injections" % __name__
2010-10-13 18:29:53 +04:00
return value