mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-10-31 07:57:47 +03:00 
			
		
		
		
	Updated docstring
This commit is contained in:
		
							parent
							
								
									c9e6fc7695
								
							
						
					
					
						commit
						2b6b80d7f8
					
				|  | @ -25,8 +25,14 @@ def tamper(payload): | ||||||
|         * Input: SELECT FIELD%20FROM TABLE |         * Input: SELECT FIELD%20FROM TABLE | ||||||
|         * Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045' |         * Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045' | ||||||
| 
 | 
 | ||||||
|  |     Tested against: | ||||||
|  |         * Microsoft SQL Server 2000 | ||||||
|  |         * Microsoft SQL Server 2005 | ||||||
|  | 
 | ||||||
|     Notes: |     Notes: | ||||||
|         * Does this ever work? |         * Useful to bypass weak web application firewalls that do not | ||||||
|  |           unicode url-decode the request before processing it through their | ||||||
|  |           ruleset | ||||||
|     """ |     """ | ||||||
| 
 | 
 | ||||||
|     retVal = payload |     retVal = payload | ||||||
|  |  | ||||||
		Loading…
	
		Reference in New Issue
	
	Block a user