diff --git a/lib/core/testing.py b/lib/core/testing.py
index 952b323ef..413cbd46e 100644
--- a/lib/core/testing.py
+++ b/lib/core/testing.py
@@ -266,7 +266,7 @@ def runCase(switches=None, parse=None):
tback = traceback.format_exc()
retVal = False
elif result is False: # if None, ignore
- logger.error("the test did not run")
+ logger.error("the test did not identify the SQL injection")
retVal = False
console = getUnicode(console, system=True)
diff --git a/plugins/dbms/oracle/enumeration.py b/plugins/dbms/oracle/enumeration.py
index 66c676cb2..dda8f6d11 100644
--- a/plugins/dbms/oracle/enumeration.py
+++ b/plugins/dbms/oracle/enumeration.py
@@ -79,9 +79,6 @@ class Enumeration(GenericEnumeration):
# In Oracle we get the list of roles as string
roles.add(role)
- if isAdminFromPrivileges(roles):
- areAdmins.add(user)
-
if user in kb.data.cachedUsersRoles:
kb.data.cachedUsersRoles[user] = list(roles.union(kb.data.cachedUsersRoles[user]))
else:
@@ -162,4 +159,8 @@ class Enumeration(GenericEnumeration):
errMsg += "for the database users"
raise SqlmapNoneDataException(errMsg)
+ for user, privileges in kb.data.cachedUsersRoles.items():
+ if isAdminFromPrivileges(privileges):
+ areAdmins.add(user)
+
return kb.data.cachedUsersRoles, areAdmins
diff --git a/xml/livetests.xml b/xml/livetests.xml
index bf6bed60f..841d2f174 100644
--- a/xml/livetests.xml
+++ b/xml/livetests.xml
@@ -736,7 +736,7 @@
-
+
@@ -1007,7 +1007,7 @@
-
+
@@ -1025,7 +1025,7 @@
-
+
@@ -2098,7 +2098,7 @@
-
+