From b9b2fe0e7ce71fc08c2572c62b4dbe4c015b3564 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Sun, 6 Feb 2011 21:52:39 +0000 Subject: [PATCH] little cleanup --- lib/controller/checks.py | 2 -- lib/core/agent.py | 2 +- lib/techniques/error/use.py | 1 - 3 files changed, 1 insertion(+), 4 deletions(-) diff --git a/lib/controller/checks.py b/lib/controller/checks.py index 6c803a5aa..c259c7dbf 100644 --- a/lib/controller/checks.py +++ b/lib/controller/checks.py @@ -200,7 +200,6 @@ def checkSqlInjection(place, parameter, value): # Parse test's comment = agent.getComment(test.request) fstPayload = agent.cleanupPayload(test.request.payload, value) - fstPayload = unescaper.unescape(fstPayload, dbms=dbms) for boundary in conf.boundaries: injectable = False @@ -287,7 +286,6 @@ def checkSqlInjection(place, parameter, value): # In case of boolean-based blind SQL injection if method == PAYLOAD.METHOD.COMPARISON: sndPayload = agent.cleanupPayload(test.response.comparison, value) - sndPayload = unescaper.unescape(sndPayload, dbms=dbms) # Forge response payload by prepending with # boundary's prefix and appending the boundary's diff --git a/lib/core/agent.py b/lib/core/agent.py index efba63bbc..d21cf2023 100644 --- a/lib/core/agent.py +++ b/lib/core/agent.py @@ -241,7 +241,7 @@ class Agent: errMsg += "knowledge of underlying DBMS" raise sqlmapNoneDataException, errMsg - #payload = unescaper.unescape(payload) + payload = unescaper.unescape(payload) return payload diff --git a/lib/techniques/error/use.py b/lib/techniques/error/use.py index c0d44e3ad..a7b0c5911 100644 --- a/lib/techniques/error/use.py +++ b/lib/techniques/error/use.py @@ -48,7 +48,6 @@ def __oneShotErrorUse(expression, field): # Forge the error-based SQL injection request vector = agent.cleanupPayload(kb.injection.data[PAYLOAD.TECHNIQUE.ERROR].vector) - query = unescaper.unescape(vector) query = agent.prefixQuery(query) query = agent.suffixQuery(query) injExpression = expression.replace(field, nulledCastedField, 1)