mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 17:46:37 +03:00
Minor style update for an Issue #377
This commit is contained in:
parent
479f791112
commit
8c84a16cb7
|
@ -454,10 +454,6 @@ def checkSqlInjection(place, parameter, value):
|
|||
warnMsg += "explicitly set it using option '--dbms'"
|
||||
singleTimeWarnMessage(warnMsg)
|
||||
else:
|
||||
warnMsg = "heuristic test showed that the back-end DBMS "
|
||||
warnMsg += "could be '%s' " % kb.heuristicDbms
|
||||
singleTimeWarnMessage(warnMsg)
|
||||
|
||||
Backend.forceDbms(kb.heuristicDbms)
|
||||
|
||||
if unionExtended:
|
||||
|
@ -614,6 +610,11 @@ def heuristicCheckDbms(injection):
|
|||
Backend.flushForcedDbms()
|
||||
kb.injection = popValue()
|
||||
|
||||
if retVal:
|
||||
infoMsg = "heuristic test showed that the back-end DBMS "
|
||||
infoMsg += "could be '%s' " % retVal
|
||||
logger.info(infoMsg)
|
||||
|
||||
return retVal
|
||||
|
||||
def checkFalsePositives(injection):
|
||||
|
|
|
@ -462,7 +462,7 @@ VALID_TIME_CHARS_RUN_THRESHOLD = 100
|
|||
CHECK_ZERO_COLUMNS_THRESHOLD = 10
|
||||
|
||||
# Boldify all logger messages containing these "patterns"
|
||||
BOLD_PATTERNS = ("' injectable", "might be injectable", "' is vulnerable", "is not injectable", "test failed", "test passed", "live test final result")
|
||||
BOLD_PATTERNS = ("' injectable", "might be injectable", "' is vulnerable", "is not injectable", "test failed", "test passed", "live test final result", "heuristic test showed")
|
||||
|
||||
# Generic www root directory names
|
||||
GENERIC_DOC_ROOT_DIRECTORY_NAMES = ("htdocs", "wwwroot", "www")
|
||||
|
|
Loading…
Reference in New Issue
Block a user