mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-26 03:23:48 +03:00
Minor update of modsecurity.py
This commit is contained in:
parent
b31c264a59
commit
c799e794f2
|
@ -19,7 +19,7 @@ from lib.core.enums import DBMS_DIRECTORY_NAME
|
||||||
from lib.core.enums import OS
|
from lib.core.enums import OS
|
||||||
|
|
||||||
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
|
||||||
VERSION = "1.2.12.45"
|
VERSION = "1.2.12.46"
|
||||||
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
|
||||||
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
|
||||||
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)
|
||||||
|
|
|
@ -49,7 +49,7 @@ c8c386d644d57c659d74542f5f57f632 lib/core/patch.py
|
||||||
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
|
0c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
|
||||||
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
|
a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
|
||||||
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
|
fcb74fcc9577523524659ec49e2e964b lib/core/session.py
|
||||||
bcd013acb00d49bb4ed6a39e3e4672d0 lib/core/settings.py
|
7230ffa8fb85a6cd1234850be5bd2a1a lib/core/settings.py
|
||||||
a971ce157d04de96ba6e710d3d38a9a8 lib/core/shell.py
|
a971ce157d04de96ba6e710d3d38a9a8 lib/core/shell.py
|
||||||
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
|
a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
|
||||||
1581be48127a3a7a9fd703359b6e7567 lib/core/target.py
|
1581be48127a3a7a9fd703359b6e7567 lib/core/target.py
|
||||||
|
@ -433,7 +433,7 @@ ade1299c435db7b9e35cf1166ed9d859 waf/generic.py
|
||||||
5a5c9452b9779bf39c208ebe26c98fdb waf/jiasule.py
|
5a5c9452b9779bf39c208ebe26c98fdb waf/jiasule.py
|
||||||
898f53c12133da3e946301f4aa97d538 waf/knownsec.py
|
898f53c12133da3e946301f4aa97d538 waf/knownsec.py
|
||||||
15a50edd48961ea168648a370f42e123 waf/kona.py
|
15a50edd48961ea168648a370f42e123 waf/kona.py
|
||||||
b17a154fe7959619eaafffa60e14199f waf/modsecurity.py
|
69cadf95303d60ac0a228cf60dfdba73 waf/modsecurity.py
|
||||||
d09a50713daf3c0a2594ed4f50c57adb waf/naxsi.py
|
d09a50713daf3c0a2594ed4f50c57adb waf/naxsi.py
|
||||||
bf573d01d56e585f4ad57132bc594934 waf/netcontinuum.py
|
bf573d01d56e585f4ad57132bc594934 waf/netcontinuum.py
|
||||||
cb2f1516867684042f580e02138463de waf/netscaler.py
|
cb2f1516867684042f580e02138463de waf/netscaler.py
|
||||||
|
|
|
@ -18,7 +18,7 @@ def detect(get_page):
|
||||||
for vector in WAF_ATTACK_VECTORS:
|
for vector in WAF_ATTACK_VECTORS:
|
||||||
page, headers, code = get_page(get=vector)
|
page, headers, code = get_page(get=vector)
|
||||||
retval = re.search(r"Mod_Security|NOYB", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
|
retval = re.search(r"Mod_Security|NOYB", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
|
||||||
retval |= any(_ in (page or "") for _ in ("This error was generated by Mod_Security", "One or more things in your request were suspicious", "rules of the mod_security module"))
|
retval |= any(_ in (page or "") for _ in ("This error was generated by Mod_Security", "One or more things in your request were suspicious", "rules of the mod_security module", "The page you are trying to access is restricted due to a security rule"))
|
||||||
if retval:
|
if retval:
|
||||||
break
|
break
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue
Block a user