diff --git a/lib/core/settings.py b/lib/core/settings.py index bb96ceb10..3b0803f53 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -19,7 +19,7 @@ from lib.core.enums import OS from lib.core.revision import getRevisionNumber # sqlmap version (...) -VERSION = "1.0.5.74" +VERSION = "1.0.5.75" REVISION = getRevisionNumber() STABLE = VERSION.count('.') <= 2 VERSION_STRING = "sqlmap/%s#%s" % (VERSION, "stable" if STABLE else "dev") diff --git a/waf/dotdefender.py b/waf/dotdefender.py index 2bc0959ea..b263188bc 100644 --- a/waf/dotdefender.py +++ b/waf/dotdefender.py @@ -13,9 +13,10 @@ def detect(get_page): retval = False for vector in WAF_ATTACK_VECTORS: - _, headers, _ = get_page(get=vector) - retVal = headers.get("X-dotDefender-denied", "") == "1" - if retVal: + page, headers, _ = get_page(get=vector) + retval = headers.get("X-dotDefender-denied", "") == "1" + retval |= "dotDefender Blocked Your Request" in (page or "") + if retval: break return retval diff --git a/waf/edgecast.py b/waf/edgecast.py index f30f1e996..09db6780e 100644 --- a/waf/edgecast.py +++ b/waf/edgecast.py @@ -13,12 +13,12 @@ from lib.core.settings import WAF_ATTACK_VECTORS __product__ = "EdgeCast WAF (Verizon)" def detect(get_page): - retVal = False + retval = False for vector in WAF_ATTACK_VECTORS: _, headers, code = get_page(get=vector) - retVal = code == 400 and re.search(r"\AECDF", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None - if retVal: + retval = code == 400 and re.search(r"\AECDF", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None + if retval: break - return retVal + return retval diff --git a/waf/sucuri.py b/waf/sucuri.py index b2d6e51cd..209842cbe 100644 --- a/waf/sucuri.py +++ b/waf/sucuri.py @@ -13,12 +13,12 @@ from lib.core.settings import WAF_ATTACK_VECTORS __product__ = "Sucuri WebSite Firewall" def detect(get_page): - retVal = False + retval = False for vector in WAF_ATTACK_VECTORS: _, headers, code = get_page(get=vector) - retVal = code == 403 and re.search(r"Sucuri/Cloudproxy", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None - if retVal: + retval = code == 403 and re.search(r"Sucuri/Cloudproxy", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None + if retval: break - return retVal + return retval diff --git a/waf/webknight.py b/waf/webknight.py index 048ea278c..423ffcad8 100644 --- a/waf/webknight.py +++ b/waf/webknight.py @@ -17,9 +17,9 @@ def detect(get_page): for vector in WAF_ATTACK_VECTORS: _, headers, code = get_page(get=vector) - retVal = code == 999 + retval = code == 999 retval |= re.search(r"WebKnight", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None - if retVal: + if retval: break return retval