mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-01-24 16:24:25 +03:00
Minor update
This commit is contained in:
parent
a40d7a5bca
commit
302348b0cd
|
@ -527,8 +527,9 @@ def paramToDict(place, parameters=None):
|
||||||
if condition:
|
if condition:
|
||||||
testableParameters[parameter] = "=".join(elem[1:])
|
testableParameters[parameter] = "=".join(elem[1:])
|
||||||
if not conf.multipleTargets:
|
if not conf.multipleTargets:
|
||||||
if testableParameters[parameter].strip(DUMMY_SQL_INJECTION_CHARS) != testableParameters[parameter]\
|
_ = urldecode(testableParameters[parameter], convall=True)
|
||||||
or re.search(r'\A9{3,}', testableParameters[parameter]) or re.search(DUMMY_USER_INJECTION, testableParameters[parameter]):
|
if _.strip(DUMMY_SQL_INJECTION_CHARS) != _\
|
||||||
|
or re.search(r'\A9{3,}', _) or re.search(DUMMY_USER_INJECTION, _):
|
||||||
warnMsg = "it appears that you have provided tainted parameter values "
|
warnMsg = "it appears that you have provided tainted parameter values "
|
||||||
warnMsg += "('%s') with most probably leftover " % element
|
warnMsg += "('%s') with most probably leftover " % element
|
||||||
warnMsg += "chars from manual SQL injection "
|
warnMsg += "chars from manual SQL injection "
|
||||||
|
|
Loading…
Reference in New Issue
Block a user