sqlmap/tamper/doubleencode.py

26 lines
717 B
Python
Raw Normal View History

2010-10-14 18:05:05 +04:00
#!/usr/bin/env python
"""
$Id$
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
2010-10-15 03:18:29 +04:00
See the file 'doc/COPYING' for copying permission
"""
2010-10-13 18:29:53 +04:00
from lib.core.convert import urlencode
2010-10-13 18:37:11 +04:00
from lib.core.exception import sqlmapUnsupportedFeatureException
2010-10-13 18:29:53 +04:00
def tamper(place, value):
"""
Replaces value with urlencode(value)
Example: 'SELECT%20FIELD%20FROM%20TABLE' becomes 'SELECT%25%20FIELD%25%20FROM%25%20TABLE'
"""
2010-10-13 18:29:53 +04:00
if value:
2010-10-13 18:37:11 +04:00
if place != "URI":
value = urlencode(value, convall=True)
2010-10-13 18:37:11 +04:00
else:
raise sqlmapUnsupportedFeatureException, "can't use tamper script '%s' with 'URI' type injections" % __name__
2010-10-13 18:29:53 +04:00
return value