From 5150172178a96daeba32d70f00ae62d1d4c7f37b Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Thu, 13 Dec 2012 10:03:21 +0100 Subject: [PATCH] Minor update --- lib/core/common.py | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/lib/core/common.py b/lib/core/common.py index 2d453d373..393e89513 100644 --- a/lib/core/common.py +++ b/lib/core/common.py @@ -530,8 +530,7 @@ def paramToDict(place, parameters=None): or re.search(r'\A9{3,}', _) or re.search(DUMMY_USER_INJECTION, _): warnMsg = "it appears that you have provided tainted parameter values " warnMsg += "('%s') with most probably leftover " % element - warnMsg += "chars from manual SQL injection " - warnMsg += "tests (%s) or non-valid numerical value. " % DUMMY_SQL_INJECTION_CHARS + warnMsg += "chars/statements from manual SQL injection test(s). " warnMsg += "Please, always use only valid parameter values " warnMsg += "so sqlmap could be able to properly run " logger.warn(warnMsg)