better language

This commit is contained in:
Miroslav Stampar 2011-08-23 21:42:34 +00:00
parent 699cb89711
commit 606debe55c

View File

@ -220,21 +220,21 @@ has been configured to disclose back-end database management system error
messages. messages.
<item><bf>UNION query SQL injection</bf>, also known as <bf>inband SQL <item><bf>UNION query SQL injection</bf>, also known as <bf>inband SQL
injection</bf>: sqlmap appends to the affected parameter a syntatically injection</bf>: sqlmap appends to the affected parameter a syntatically
valid SQL statement string starting with a <tt>UNION ALL SELECT</tt>. valid SQL statement starting with an <tt>UNION ALL SELECT</tt>.
This techique works when the web application page passes the output of the This techique works when the web application page passes directly the output
<tt>SELECT</tt> statement within a <tt>for</tt> cycle, or similar, so that of the <tt>SELECT</tt> statement within a <tt>for</tt> loop, or similar, so
each line of the query output is printed on the page content. that each line of the query output is printed on the page content.
sqlmap is also able to exploit <bf>partial (single entry) UNION query SQL sqlmap is also able to exploit <bf>partial (single entry) UNION query SQL
injection</bf> vulnerabilities which occur when the output of the injection</bf> vulnerabilities which occur when the output of the
statement is not cycled in a <tt>for</tt> construct whereas only the first statement is not cycled in a <tt>for</tt> construct, whereas only the first
entry of the query output is displayed. entry of the query output is displayed.
<item><bf>Stacked queries SQL injection</bf>, also known as <bf>multiple <item><bf>Stacked queries SQL injection</bf>, also known as <bf>multiple
statements SQL injection</bf>: sqlmap tests if the web application supports statements SQL injection</bf>: sqlmap tests if the web application supports
stacked queries then, in case it does support, it appends to the affected stacked queries and then, in case it does support, it appends to the affected
parameter in the HTTP request, a semi-colon (<tt>;</tt>) followed by the parameter in the HTTP request, a semi-colon (<tt>;</tt>) followed by the
SQL statement to be executed. This technique is useful to run SQL SQL statement to be executed. This technique is useful to run SQL
statements other than <tt>SELECT</tt> like, for instance, <em>data statements other than <tt>SELECT</tt>, like for instance, <em>data
definition</em> or <em>data manipulation</em> statements possibly leading definition</em> or <em>data manipulation</em> statements, possibly leading
to file system read and write access and operating system command to file system read and write access and operating system command
execution depending on the underlying back-end database management system execution depending on the underlying back-end database management system
and the session user privileges. and the session user privileges.