From 0ed5ba55597e949a0da8f3ade434e88654529517 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Tue, 16 Feb 2010 13:24:09 +0000 Subject: [PATCH] minor update --- lib/takeover/web.py | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/lib/takeover/web.py b/lib/takeover/web.py index 2a6a6d689..4d0bb4263 100644 --- a/lib/takeover/web.py +++ b/lib/takeover/web.py @@ -86,6 +86,8 @@ class Web: return retVal def __webFileStreamUpload(self, stream, destFileName, directory): + stream.seek(0) #rewind + if self.webApi in ("php", "asp"): multipartParams = { "upload": "1", @@ -95,9 +97,6 @@ class Web: page = Request.getPage(url=self.webUploaderUrl, multipart=multipartParams, raise404=False) - if stream: - stream.seek(0) - if "File uploaded" not in page: warnMsg = "unable to upload the backdoor through " warnMsg += "the uploader agent on '%s'" % directory @@ -118,6 +117,7 @@ class Web: query = agent.postfixQuery(query) payload = agent.payload(newValue=query) page = Request.queryPage(payload) + return page def webInit(self): """ @@ -169,7 +169,6 @@ class Web: backdoorName = "backdoor.%s" % self.webApi backdoorStream = decloakToNamedTemporaryFile(os.path.join(paths.SQLMAP_SHELL_PATH, backdoorName + '_'), backdoorName) backdoorContent = backdoorStream.read() - backdoorStream.seek(0) uploaderName = "uploader.%s" % self.webApi uploaderContent = decloak(os.path.join(paths.SQLMAP_SHELL_PATH, uploaderName + '_'))