mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
Another update for Issue #80
This commit is contained in:
parent
9a4f8d5f45
commit
295a7a8e5e
|
@ -34,6 +34,7 @@ from lib.core.settings import MIN_RATIO
|
|||
from lib.core.settings import MAX_RATIO
|
||||
from lib.core.settings import MIN_STATISTICAL_RANGE
|
||||
from lib.core.settings import MIN_UNION_RESPONSES
|
||||
from lib.core.settings import NULL
|
||||
from lib.core.settings import ORDER_BY_STEP
|
||||
from lib.core.unescaper import unescaper
|
||||
from lib.request.comparison import comparison
|
||||
|
@ -255,7 +256,7 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix
|
|||
warnMsg = "if UNION based SQL injection is not detected, "
|
||||
warnMsg += "please consider "
|
||||
|
||||
if not conf.uChar and count > 1:
|
||||
if not conf.uChar and count > 1 and kb.uChar == NULL:
|
||||
message = "injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] "
|
||||
test = readInput(message, default="Y")
|
||||
if test[0] not in ("y", "Y"):
|
||||
|
|
Loading…
Reference in New Issue
Block a user