mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-21 17:16:35 +03:00
Trivial update
This commit is contained in:
parent
5f41d94602
commit
57511ac9df
|
@ -18,7 +18,7 @@ from lib.core.enums import OS
|
|||
from thirdparty.six import unichr as _unichr
|
||||
|
||||
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
||||
VERSION = "1.3.10.4"
|
||||
VERSION = "1.3.10.5"
|
||||
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
||||
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
||||
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
||||
|
|
|
@ -12,6 +12,7 @@ class SmartHTTPBasicAuthHandler(_urllib.request.HTTPBasicAuthHandler):
|
|||
Reference: http://selenic.com/hg/rev/6c51a5056020
|
||||
Fix for a: http://bugs.python.org/issue8797
|
||||
"""
|
||||
|
||||
def __init__(self, *args, **kwargs):
|
||||
_urllib.request.HTTPBasicAuthHandler.__init__(self, *args, **kwargs)
|
||||
self.retried_req = set()
|
||||
|
|
|
@ -692,9 +692,9 @@ class Metasploit(object):
|
|||
self._runMsfCliSmbrelay()
|
||||
|
||||
if Backend.getIdentifiedDbms() in (DBMS.MYSQL, DBMS.PGSQL):
|
||||
self.uncPath = "\\\\\\\\%s\\\\%s" % (self.lhostStr, self._randFile)
|
||||
self.uncPath = r"\\\\%s\\%s" % (self.lhostStr, self._randFile)
|
||||
else:
|
||||
self.uncPath = "\\\\%s\\%s" % (self.lhostStr, self._randFile)
|
||||
self.uncPath = r"\\%s\%s" % (self.lhostStr, self._randFile)
|
||||
|
||||
debugMsg = "Metasploit Framework console exited with return "
|
||||
debugMsg += "code %s" % self._controlMsfCmd(self._msfCliProc, self.uncPathRequest)
|
||||
|
|
10
thirdparty/identywaf/data.json
vendored
10
thirdparty/identywaf/data.json
vendored
|
@ -356,6 +356,16 @@
|
|||
"regex": "The (ISA Server|server) denied the specified Uniform Resource Locator \\(URL\\)",
|
||||
"signatures": []
|
||||
},
|
||||
"ithemes": {
|
||||
"company": "iThemes",
|
||||
"name": "iThemes Security",
|
||||
"regex": "",
|
||||
"signatures": [
|
||||
"c70f:RVZXum60OEhCWKpAYKYPkoJyWOpohM4IiUYMr2RWg1uQJLX3uhZOnthtOj+hXrAA16FcPhJOdLoXomtKaK59nui7c4RmkgI2FZjxtDtAeq+c36A4chW1XaTC",
|
||||
"71ee:RVZXum60OEhCWKpAYKYPkoJyWOpohM4IiUYMr2RWg1qQJLX2uhZOnthtOj+hXrAA16FcPhJOdLoXomtKaK59nui7c4RmkgI2FZjxtDtAeq+c36A4chW1XaTC"
|
||||
],
|
||||
"note": "Formerly Better WP Security"
|
||||
},
|
||||
"janusec": {
|
||||
"company": "Janusec",
|
||||
"name": "Janusec Application Gateway",
|
||||
|
|
8
thirdparty/identywaf/identYwaf.py
vendored
8
thirdparty/identywaf/identYwaf.py
vendored
|
@ -27,7 +27,9 @@ import sys
|
|||
import time
|
||||
import zlib
|
||||
|
||||
if sys.version_info >= (3, 0):
|
||||
PY3 = sys.version_info >= (3, 0)
|
||||
|
||||
if PY3:
|
||||
import http.cookiejar
|
||||
import http.client as httplib
|
||||
import urllib.request
|
||||
|
@ -58,7 +60,7 @@ else:
|
|||
HTTPCookieProcessor = urllib2.HTTPCookieProcessor
|
||||
|
||||
NAME = "identYwaf"
|
||||
VERSION = "1.0.114"
|
||||
VERSION = "1.0.122"
|
||||
BANNER = r"""
|
||||
` __ __ `
|
||||
____ ___ ___ ____ ______ `| T T` __ __ ____ _____
|
||||
|
@ -356,7 +358,7 @@ def init():
|
|||
os.chdir(os.path.abspath(os.path.dirname(__file__)))
|
||||
|
||||
# Reference: http://blog.mathieu-leplatre.info/python-utf-8-print-fails-when-redirecting-stdout.html
|
||||
if IS_TTY:
|
||||
if not PY3 and not IS_TTY:
|
||||
sys.stdout = codecs.getwriter(locale.getpreferredencoding())(sys.stdout)
|
||||
|
||||
print(colorize("[o] initializing handlers..."))
|
||||
|
|
Loading…
Reference in New Issue
Block a user