Update for an Issue #672

This commit is contained in:
Miroslav Stampar 2014-04-22 08:48:12 +02:00
parent e0fb21c26a
commit 6fd3c27f70
2 changed files with 49 additions and 0 deletions

View File

@ -238,6 +238,9 @@ Dirk Jagdmann, <doj@cubic.org>
Luke Jahnke, <luke.jahnke@gmail.com>
* for reporting a bug when running against MySQL < 5.0
Andrew Kitis <andrew.kitis@gmail.com>
* for contributing a tamper script lowercase.py
David Klein, <david.klein@ipfocus.com.au>
* for reporting a minor code improvement

46
tamper/lowercase.py Normal file
View File

@ -0,0 +1,46 @@
#!/usr/bin/env python
"""
Copyright (c) 2006-2014 sqlmap developers (http://sqlmap.org/)
See the file 'doc/COPYING' for copying permission
"""
import re
from lib.core.data import kb
from lib.core.enums import PRIORITY
__priority__ = PRIORITY.NORMAL
def dependencies():
pass
def tamper(payload, **kwargs):
"""
Replaces each keyword character with lower case value
Tested against:
* Microsoft SQL Server 2005
* MySQL 4, 5.0 and 5.5
* Oracle 10g
* PostgreSQL 8.3, 8.4, 9.0
Notes:
* Useful to bypass very weak and bespoke web application firewalls
that has poorly written permissive regular expressions
* This tamper script should work against all (?) databases
>>> tamper('INSERT')
'insert'
"""
retVal = payload
if payload:
for match in re.finditer(r"[A-Za-z_]+", retVal):
word = match.group()
if word.upper() in kb.keywords:
retVal = retVal.replace(word, word.lower())
return retVal