mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-26 03:23:48 +03:00
Proper comment
This commit is contained in:
parent
2cc167a42e
commit
b0928e02c6
|
@ -93,6 +93,7 @@ def resume(expression, payload):
|
||||||
This function can be called to resume part or entire output of a
|
This function can be called to resume part or entire output of a
|
||||||
SQL injection query output.
|
SQL injection query output.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
try:
|
try:
|
||||||
if "sqlmapfile" in expression or "sqlmapoutput" in expression:
|
if "sqlmapfile" in expression or "sqlmapoutput" in expression:
|
||||||
return None
|
return None
|
||||||
|
@ -132,11 +133,11 @@ def resume(expression, payload):
|
||||||
|
|
||||||
return resumedValue
|
return resumedValue
|
||||||
|
|
||||||
# If we called this function without providing a payload it means that
|
# If we called this function without providing a payload it means
|
||||||
# we have called it from lib/request/inject __goInband() function
|
# that we have called it from lib/request/inject __goInband() or
|
||||||
# in UNION query (inband) SQL injection so we return to the calling
|
# from __goError() function so we return to the calling function
|
||||||
# function so that the query output will be retrieved taking advantage
|
# so that the query output will be retrieved taking advantage
|
||||||
# of the inband SQL injection vulnerability.
|
# of either error-based or inband SQL injection vulnerability.
|
||||||
if not payload:
|
if not payload:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user