diff --git a/lib/core/settings.py b/lib/core/settings.py index 48325d6c7..365b7e204 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -20,7 +20,7 @@ from thirdparty import six from thirdparty.six import unichr as _unichr # sqlmap version (...) -VERSION = "1.7.4.6" +VERSION = "1.7.4.7" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/lib/utils/brute.py b/lib/utils/brute.py index 905e5d241..d927ed6a5 100644 --- a/lib/utils/brute.py +++ b/lib/utils/brute.py @@ -7,7 +7,6 @@ See the file 'LICENSE' for copying permission from __future__ import division -import logging import time from lib.core.common import Backend @@ -387,9 +386,6 @@ def fileExists(pathFile): kb.locks.io.release() try: - pushValue(logger.getEffectiveLevel()) - logger.setLevel(logging.CRITICAL) - runThreads(conf.threads, fileExistsThread, threadChoice=True) except KeyboardInterrupt: warnMsg = "user aborted during file existence " @@ -397,7 +393,6 @@ def fileExists(pathFile): logger.warning(warnMsg) finally: kb.bruteMode = False - logger.setLevel(popValue()) clearConsoleLine(True) dataToStdout("\n") diff --git a/plugins/generic/filesystem.py b/plugins/generic/filesystem.py index 4c046f645..5d383ed72 100644 --- a/plugins/generic/filesystem.py +++ b/plugins/generic/filesystem.py @@ -222,13 +222,13 @@ class Filesystem(object): if conf.direct or isStackingAvailable(): if isStackingAvailable(): - debugMsg = "going to read the file with stacked query SQL " + debugMsg = "going to try to read the file with stacked query SQL " debugMsg += "injection technique" logger.debug(debugMsg) fileContent = self.stackedReadFile(remoteFile) elif Backend.isDbms(DBMS.MYSQL): - debugMsg = "going to read the file with a non-stacked query " + debugMsg = "going to try to read the file with non-stacked query " debugMsg += "SQL injection technique" logger.debug(debugMsg)