diff --git a/lib/core/session.py b/lib/core/session.py index 363d28f38..1c6c00b22 100644 --- a/lib/core/session.py +++ b/lib/core/session.py @@ -7,7 +7,6 @@ See the file 'doc/COPYING' for copying permission import re -from lib.core.common import aliasToDbmsEnum from lib.core.common import Backend from lib.core.common import Format from lib.core.common import hashDBWrite diff --git a/lib/core/settings.py b/lib/core/settings.py index 0c180f3e8..0424bbe39 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -19,7 +19,7 @@ from lib.core.enums import OS from lib.core.revision import getRevisionNumber # sqlmap version (...) -VERSION = "1.0.6.59" +VERSION = "1.0.6.60" REVISION = getRevisionNumber() STABLE = VERSION.count('.') <= 2 VERSION_STRING = "sqlmap/%s#%s" % (VERSION, "stable" if STABLE else "dev") diff --git a/lib/request/basic.py b/lib/request/basic.py index 10726748d..321ea1940 100644 --- a/lib/request/basic.py +++ b/lib/request/basic.py @@ -358,10 +358,10 @@ def processResponse(page, responseHeaders): for match in re.finditer(r"(?si)", page): if re.search(r"(?i)captcha", match.group(0)): kb.captchaDetected = True - errMsg = "potential CAPTCHA protection mechanism detected" - singleTimeLogMessage(errMsg, logging.ERROR) + warnMsg = "potential CAPTCHA protection mechanism detected" + singleTimeWarnMessage(warnMsg) break if re.search(BLOCKED_IP_REGEX, page): - errMsg = "it appears that you have been blocked by the target server" - singleTimeLogMessage(errMsg, logging.ERROR) + warnMsg = "it appears that you have been blocked by the target server" + singleTimeWarnMessage(warnMsg) diff --git a/waf/cloudfront.py b/waf/cloudfront.py index 7cfa455a9..902713be9 100644 --- a/waf/cloudfront.py +++ b/waf/cloudfront.py @@ -7,7 +7,6 @@ See the file 'doc/COPYING' for copying permission import re -from lib.core.enums import HTTP_HEADER from lib.core.settings import WAF_ATTACK_VECTORS __product__ = "CloudFront (Amazon)"