mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-29 13:03:50 +03:00
refactoring. nothing special changed
This commit is contained in:
parent
963f54e6d2
commit
8a00ca83af
|
@ -561,7 +561,8 @@ def paramToDict(place, parameters=None):
|
||||||
condition |= parameter in conf.testParameter
|
condition |= parameter in conf.testParameter
|
||||||
|
|
||||||
if condition:
|
if condition:
|
||||||
if elem[1].strip(DUMMY_SQL_INJECTION_CHARS) != elem[1]:
|
testableParameters[parameter] = "=".join(elem[1:])
|
||||||
|
if testableParameters[parameter].strip(DUMMY_SQL_INJECTION_CHARS) != testableParameters[parameter]:
|
||||||
errMsg = "you have provided tainted parameter values "
|
errMsg = "you have provided tainted parameter values "
|
||||||
errMsg += "(%s) with most probably leftover " % element
|
errMsg += "(%s) with most probably leftover " % element
|
||||||
errMsg += "chars from manual sql injection "
|
errMsg += "chars from manual sql injection "
|
||||||
|
@ -569,7 +570,6 @@ def paramToDict(place, parameters=None):
|
||||||
errMsg += "please, always use only valid parameter values "
|
errMsg += "please, always use only valid parameter values "
|
||||||
errMsg += "so sqlmap could be able to do a valid run."
|
errMsg += "so sqlmap could be able to do a valid run."
|
||||||
raise sqlmapSyntaxException, errMsg
|
raise sqlmapSyntaxException, errMsg
|
||||||
testableParameters[parameter] = "=".join(elem[1:])
|
|
||||||
else:
|
else:
|
||||||
root = ET.XML(parameters)
|
root = ET.XML(parameters)
|
||||||
iterator = root.getiterator()
|
iterator = root.getiterator()
|
||||||
|
|
Loading…
Reference in New Issue
Block a user