diff --git a/lib/core/settings.py b/lib/core/settings.py index 2703a06aa..62b9cceb3 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME from lib.core.enums import OS # sqlmap version (...) -VERSION = "1.3.1.43" +VERSION = "1.3.1.44" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/txt/checksum.md5 b/txt/checksum.md5 index 9b4c2dfd3..4a3f65ae8 100644 --- a/txt/checksum.md5 +++ b/txt/checksum.md5 @@ -49,7 +49,7 @@ fe370021c6bc99daf44b2bfc0d1effb3 lib/core/patch.py 9a7d68d5fa01561500423791f15cc676 lib/core/replication.py 3179d34f371e0295dd4604568fb30bcd lib/core/revision.py d6269c55789f78cf707e09a0f5b45443 lib/core/session.py -c6bb49602e081b6ad551053145b95f52 lib/core/settings.py +b5217540e886d7e5f9eb813288401923 lib/core/settings.py a8a7501d1e6b21669b858a62e921d191 lib/core/shell.py 5dc606fdf0afefd4b305169c21ab2612 lib/core/subprocessng.py eec3080ba5baca44c6de4595f1c92a0d lib/core/target.py @@ -455,6 +455,7 @@ ba37e1c37fa0e3688873f74183a9cb9c waf/senginx.py c842d298e61a87b32668c8402a0d87b5 waf/sitelock.py a840fcd2bb042694f9aab2859e7c9b30 waf/sonicwall.py 45683bfe7a428f47745416c727a789bd waf/sophos.py +ed1ecabfa8396e70494b0a3d70a22eb1 waf/squarespace.py 4a11ba8e5f3995b35f5fc189b8c2692e waf/stackpath.py 74bd52941b606d15f1a6cdc7b52f761c waf/sucuri.py 205beb7ed5e70119f8700a9e295b6a4a waf/tencent.py diff --git a/waf/squarespace.py b/waf/squarespace.py new file mode 100644 index 000000000..143b55bd6 --- /dev/null +++ b/waf/squarespace.py @@ -0,0 +1,21 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/) +See the file 'LICENSE' for copying permission +""" + +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "Squarespace Web Application Firewall (Squarespace)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, _, _ = get_page(get=vector) + retval = all(_ in (page or "") for _ in ("BRICK-50", " @ ", "404 Not Found")) + if retval: + break + + return retval