From 7927e97007715f9e1a9c3841b3cf2b6915568b66 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Tue, 19 Oct 2010 18:34:57 +0000 Subject: [PATCH] update --- lib/request/inject.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/request/inject.py b/lib/request/inject.py index f89b2cd89..67f32c689 100644 --- a/lib/request/inject.py +++ b/lib/request/inject.py @@ -371,7 +371,7 @@ def __goError(expression, resumeValue=True): return output -def getValue(expression, blind=True, inband=True, error=False, fromUser=False, expected=None, batch=False, unpack=True, sort=True, resumeValue=True, charsetType=None, firstChar=None, lastChar=None, dump=False, suppressOutput=False): +def getValue(expression, blind=True, inband=True, error=True, fromUser=False, expected=None, batch=False, unpack=True, sort=True, resumeValue=True, charsetType=None, firstChar=None, lastChar=None, dump=False, suppressOutput=False): """ Called each time sqlmap inject a SQL query on the SQL injection affected parameter. It can call a function to retrieve the output @@ -392,7 +392,7 @@ def getValue(expression, blind=True, inband=True, error=False, fromUser=False, e expression = expression.replace("DISTINCT ", "") - if error or conf.errorTest: + if error and conf.errorTest: value = __goError(expression) if not value: