mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-01-23 15:54:24 +03:00
Another minor update
This commit is contained in:
parent
d08c1b7c04
commit
6795b51c7e
|
@ -741,6 +741,8 @@ def checkFilteredChars(injection):
|
|||
kb.injection = injection
|
||||
randInt = randomInt()
|
||||
|
||||
# all other techniques are already using parentheses in tests
|
||||
if len(injection.data) == 1 and PAYLOAD.TECHNIQUE.BOOLEAN in injection.data:
|
||||
if not checkBooleanExpression("(%d)=%d" % (randInt, randInt)):
|
||||
warnMsg = "it appears that some non-alphanumeric characters (i.e. ()) are "
|
||||
warnMsg += "filtered by the back-end server. There is a strong "
|
||||
|
@ -748,6 +750,8 @@ def checkFilteredChars(injection):
|
|||
warnMsg += "exploit this vulnerability"
|
||||
logger.critical(warnMsg)
|
||||
|
||||
# inference techniques depend on character '>'
|
||||
if not any(_ in injection.data for _ in (PAYLOAD.TECHNIQUE.ERROR, PAYLOAD.TECHNIQUE.UNION, PAYLOAD.TECHNIQUE.QUERY)):
|
||||
if not checkBooleanExpression("%d>%d" % (randInt+1, randInt)):
|
||||
warnMsg = "it appears that the character '>' is "
|
||||
warnMsg += "filtered by the back-end server. You are strongly "
|
||||
|
|
Loading…
Reference in New Issue
Block a user