From 15a77ef3e956d98633ee94602257b4e38f533cf6 Mon Sep 17 00:00:00 2001 From: Jennifer Torres <38907815+j4ckmln@users.noreply.github.com> Date: Thu, 25 Oct 2018 12:05:24 +0100 Subject: [PATCH] Update luanginxwafbypass.py --- tamper/luanginxwafbypass.py | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/tamper/luanginxwafbypass.py b/tamper/luanginxwafbypass.py index 10bfef466..3f2982391 100644 --- a/tamper/luanginxwafbypass.py +++ b/tamper/luanginxwafbypass.py @@ -12,7 +12,8 @@ Open Data Security (@ODSops) [https://ods.es] PoC: https://www.youtube.com/watch?v=JUvro7cqidY Vulnerability information: https://opendatasecurity.io/cloudflare-vulnerability-allows-waf-be-disabled/ -Example: sqlmap -r file.txt --tamper=luanginxwafbypass.py --dbs --skip-urlencode +Example: sqlmap -r file.txt --tamper=luanginxwafbypass.py --dbs --skip-urlencode -p vulnparameter +Required options: --skip-urlencode, -p ''' import sys @@ -32,8 +33,6 @@ def tamper(payload, **kwargs): try: headers = kwargs.get("headers", {}) randomParameter = randomParameterGenerator() - - ''' Get parameter name to test ''' parameter = conf["testParameter"][0] if not parameter: