diff --git a/lib/core/settings.py b/lib/core/settings.py index 2e27f3d83..8e8f1a094 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -18,7 +18,7 @@ from lib.core.enums import OS from thirdparty.six import unichr as _unichr # sqlmap version (...) -VERSION = "1.3.11.66" +VERSION = "1.3.11.67" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/lib/core/testing.py b/lib/core/testing.py index 68d2a8736..60d637f2c 100644 --- a/lib/core/testing.py +++ b/lib/core/testing.py @@ -64,7 +64,7 @@ def vulnTest(): """ TESTS = ( - ("-u --flush-session", ("CloudFlare",)), + ("-r --flush-session", ("CloudFlare",)), ("-u --flush-session --forms --crawl=2 --banner", ("total of 2 targets", "might be injectable", "Type: UNION query", "banner: '3")), ("-u --flush-session --data='{\"id\": 1}' --banner", ("might be injectable", "Payload: {\"id\"", "Type: boolean-based blind", "Type: time-based blind", "Type: UNION query", "banner: '3")), ("-u --flush-session --data='' --mobile --banner --smart", ("might be injectable", "Payload: ", url).replace("", direct)) + cmd = "%s %s %s --batch" % (sys.executable, os.path.abspath(os.path.join(os.path.dirname(__file__), "..", "..", "sqlmap.py")), options.replace("", url).replace("", direct).replace("", request)) output = shellExec(cmd) if not all(check in output for check in checks):