From 8d84dcc5dc044c9f5608a000dfb8a1284b2efa23 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Wed, 1 Dec 2010 09:17:17 +0000 Subject: [PATCH] More sense --- lib/controller/checks.py | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/lib/controller/checks.py b/lib/controller/checks.py index 55fc3b941..3ad65157a 100644 --- a/lib/controller/checks.py +++ b/lib/controller/checks.py @@ -113,15 +113,6 @@ def checkSqlInjection(place, parameter, value): logger.debug(debugMsg) continue - # Skip test if it is the same SQL injection type already - # identified by another test - if injection.data and stype in injection.data: - debugMsg = "skipping test '%s' because " % title - debugMsg += "the payload for %s has " % PAYLOAD.SQLINJECTION[stype] - debugMsg += "already been identified" - logger.debug(debugMsg) - continue - # Skip DBMS-specific test if it does not match either the # previously identified or the user's provided DBMS if "details" in test and "dbms" in test.details: @@ -145,6 +136,15 @@ def checkSqlInjection(place, parameter, value): continue + # Skip test if it is the same SQL injection type already + # identified by another test + if injection.data and stype in injection.data: + debugMsg = "skipping test '%s' because " % title + debugMsg += "the payload for %s has " % PAYLOAD.SQLINJECTION[stype] + debugMsg += "already been identified" + logger.debug(debugMsg) + continue + infoMsg = "testing '%s'" % title logger.info(infoMsg)