2019-05-08 13:47:52 +03:00
|
|
|
#!/usr/bin/env python
|
2017-04-12 11:54:29 +03:00
|
|
|
|
|
|
|
"""
|
2024-01-04 01:11:52 +03:00
|
|
|
Copyright (c) 2006-2024 sqlmap developers (https://sqlmap.org/)
|
2017-10-11 15:50:46 +03:00
|
|
|
See the file 'LICENSE' for copying permission
|
2017-04-12 11:54:29 +03:00
|
|
|
"""
|
|
|
|
|
|
|
|
import re
|
|
|
|
|
|
|
|
from lib.core.enums import PRIORITY
|
|
|
|
|
2018-02-08 18:49:16 +03:00
|
|
|
__priority__ = PRIORITY.NORMAL
|
2017-04-12 11:54:29 +03:00
|
|
|
|
|
|
|
def dependencies():
|
|
|
|
pass
|
|
|
|
|
|
|
|
def tamper(payload, **kwargs):
|
|
|
|
"""
|
2018-07-31 02:17:11 +03:00
|
|
|
Prepends (inline) comment before parentheses (e.g. ( -> /**/()
|
2017-04-12 11:54:29 +03:00
|
|
|
|
|
|
|
Tested against:
|
|
|
|
* Microsoft SQL Server
|
|
|
|
* MySQL
|
|
|
|
* Oracle
|
|
|
|
* PostgreSQL
|
|
|
|
|
|
|
|
Notes:
|
|
|
|
* Useful to bypass web application firewalls that block usage
|
|
|
|
of function calls
|
|
|
|
|
|
|
|
>>> tamper('SELECT ABS(1)')
|
|
|
|
'SELECT ABS/**/(1)'
|
|
|
|
"""
|
|
|
|
|
|
|
|
retVal = payload
|
|
|
|
|
|
|
|
if payload:
|
2018-06-10 00:38:00 +03:00
|
|
|
retVal = re.sub(r"\b(\w+)\(", r"\g<1>/**/(", retVal)
|
2017-04-12 11:54:29 +03:00
|
|
|
|
|
|
|
return retVal
|