mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-01-24 00:04:23 +03:00
no more need for such a huge timeout because any timeout exceptions will now be considered as a successful time-based attack (previously we wanted to get back to the program, hence there was such a huge timeout)
This commit is contained in:
parent
8fd3e7ba1f
commit
b34fe5c334
|
@ -330,13 +330,6 @@ def checkSqlInjection(place, parameter, value):
|
||||||
# In case of time-based blind or stacked queries
|
# In case of time-based blind or stacked queries
|
||||||
# SQL injections
|
# SQL injections
|
||||||
elif method == PAYLOAD.METHOD.TIME:
|
elif method == PAYLOAD.METHOD.TIME:
|
||||||
# Store old value of socket timeout
|
|
||||||
pushValue(socket.getdefaulttimeout())
|
|
||||||
|
|
||||||
# Set socket timeout to 2 minutes as some
|
|
||||||
# time based checks can take awhile
|
|
||||||
socket.setdefaulttimeout(120)
|
|
||||||
|
|
||||||
# Perform the test's request
|
# Perform the test's request
|
||||||
trueResult = Request.queryPage(reqPayload, place, timeBasedCompare=True)
|
trueResult = Request.queryPage(reqPayload, place, timeBasedCompare=True)
|
||||||
|
|
||||||
|
@ -350,9 +343,6 @@ def checkSqlInjection(place, parameter, value):
|
||||||
|
|
||||||
injectable = True
|
injectable = True
|
||||||
|
|
||||||
# Restore value of socket timeout
|
|
||||||
socket.setdefaulttimeout(popValue())
|
|
||||||
|
|
||||||
# If the injection test was successful feed the injection
|
# If the injection test was successful feed the injection
|
||||||
# object with the test's details
|
# object with the test's details
|
||||||
if injectable is True:
|
if injectable is True:
|
||||||
|
|
Loading…
Reference in New Issue
Block a user