From 2115fc1491a9694b4af433e388e384fc31c20789 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 28 Nov 2014 14:03:53 +0100 Subject: [PATCH] New WAF script --- waf/requestvalidationmode.py | 21 +++++++++++++++++++++ 1 file changed, 21 insertions(+) create mode 100644 waf/requestvalidationmode.py diff --git a/waf/requestvalidationmode.py b/waf/requestvalidationmode.py new file mode 100644 index 000000000..4042ca850 --- /dev/null +++ b/waf/requestvalidationmode.py @@ -0,0 +1,21 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2014 sqlmap developers (http://sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +from lib.core.common import randomInt + +__product__ = "ASP.NET RequestValidationMode (Microsoft)" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, code = get_page(get=vector) + retval = re.search(r"ASP\.NET has detected data in the request that is potentially dangerous", page, re.I) is not None + if retval: + break + + return retval