strange combination of "Set-Cookie" and interleaved pattern of True/False like responses can result in bypassing of the ABAB test

This commit is contained in:
Miroslav Stampar 2012-03-22 00:06:50 +00:00
parent e88687b1f0
commit 3abcd6910a

View File

@ -556,10 +556,10 @@ def checkFalsePositives(injection):
retVal = None
elif checkBooleanExpression("%d>(%d+%d)" % (min(randInt1, randInt2), randInt3, max(randInt1, randInt2))):
retVal = None
elif not checkBooleanExpression("%d=(%d+%d)" % (randInt1 + randInt2, randInt1, randInt2)):
retVal = None
elif checkBooleanExpression("(%d+%d)>%d" % (randInt3, min(randInt1, randInt2), randInt1 + randInt2 + randInt3)):
retVal = None
elif not checkBooleanExpression("%d=(%d+%d)" % (randInt1 + randInt2, randInt1, randInt2)):
retVal = None
if retVal is None:
warnMsg = "false positive or unexploitable injection point detected"