mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
minor fixes
This commit is contained in:
parent
8fe72d87a8
commit
25cde9e2c7
|
@ -674,7 +674,7 @@ def paramToDict(place, parameters=None):
|
|||
if condition:
|
||||
testableParameters[parameter] = "=".join(elem[1:])
|
||||
if testableParameters[parameter].strip(DUMMY_SQL_INJECTION_CHARS) != testableParameters[parameter]\
|
||||
or re.search(r'(\A-[1-9])|(\A9{3,})', testableParameters[parameter]):
|
||||
or re.search(r'\A9{3,}', testableParameters[parameter]):
|
||||
errMsg = "you have provided tainted parameter values "
|
||||
errMsg += "(%s) with most probably leftover " % element
|
||||
errMsg += "chars from manual sql injection "
|
||||
|
@ -1630,11 +1630,15 @@ def showStaticWords(firstPage, secondPage):
|
|||
|
||||
firstPage = getFilteredPageContent(firstPage)
|
||||
secondPage = getFilteredPageContent(secondPage)
|
||||
|
||||
infoMsg = "static words: "
|
||||
|
||||
if firstPage and secondPage:
|
||||
match = SequenceMatcher(None, firstPage, secondPage).find_longest_match(0, len(firstPage), 0, len(secondPage))
|
||||
commonText = firstPage[match[0]:match[0]+match[2]]
|
||||
commonWords = getPageWordSet(commonText)
|
||||
|
||||
infoMsg = "static words: "
|
||||
else:
|
||||
commonWords = None
|
||||
|
||||
if commonWords:
|
||||
commonWords = list(commonWords)
|
||||
|
@ -1645,6 +1649,9 @@ def showStaticWords(firstPage, secondPage):
|
|||
infoMsg += "'%s', " % word
|
||||
|
||||
infoMsg = infoMsg.rstrip(", ")
|
||||
else:
|
||||
infoMsg += "None"
|
||||
|
||||
logger.info(infoMsg)
|
||||
|
||||
def decloakToNamedTemporaryFile(filepath, name=None):
|
||||
|
|
Loading…
Reference in New Issue
Block a user