From 1c3f4e9e54c3f9c257a00ec1793a486d83f4de4a Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Sun, 23 Oct 2011 08:44:21 +0000 Subject: [PATCH] minor update --- lib/techniques/union/test.py | 15 +++++++++++---- 1 file changed, 11 insertions(+), 4 deletions(-) diff --git a/lib/techniques/union/test.py b/lib/techniques/union/test.py index 66051bd9d..8ef629873 100644 --- a/lib/techniques/union/test.py +++ b/lib/techniques/union/test.py @@ -270,11 +270,18 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix validPayload, vector = __unionConfirm(comment, place, parameter, value, prefix, suffix, count) - if not all([validPayload, vector]) and not conf.uChar: + if not all([validPayload, vector]) and not all([conf.uChar, conf.dbms]): warnMsg = "if UNION based SQL injection is not detected, " - warnMsg += "please consider providing --union-char switch " - warnMsg += "(e.g. --union-char=1) and/or try to force the " - warnMsg += "back-end DBMS (e.g. --dbms=mysql) " + warnMsg += "please consider " + if not conf.uChar: + warnMsg += "providing --union-char switch " + warnMsg += "(e.g. --union-char=1)" + if not conf.dbms: + if not conf.uChar: + warnMsg += "and/or try to force the " + else: + warnMsg += "forcing the " + warnMsg += "back-end DBMS (e.g. --dbms=mysql) " singleTimeWarnMessage(warnMsg) return validPayload, vector