diff --git a/.github/workflows/tests.yml b/.github/workflows/tests.yml index f8fa2add2..1c1c6ea42 100644 --- a/.github/workflows/tests.yml +++ b/.github/workflows/tests.yml @@ -13,8 +13,6 @@ jobs: python-version: [ '2.x', '3.x', 'pypy-2.7', 'pypy-3.6', 'pypy-3.7' ] steps: - uses: actions/checkout@v2 - - name: faketty - uses: Yuri6037/Action-FakeTTY@v1.1 - name: Set up Python uses: actions/setup-python@v2 with: diff --git a/lib/core/settings.py b/lib/core/settings.py index 6c7a4cf64..9f04ce98e 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -20,7 +20,7 @@ from thirdparty import six from thirdparty.six import unichr as _unichr # sqlmap version (...) -VERSION = "1.5.9.15" +VERSION = "1.5.9.16" TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable" TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34} VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE) diff --git a/lib/core/testing.py b/lib/core/testing.py index 12706246c..36881a9b8 100644 --- a/lib/core/testing.py +++ b/lib/core/testing.py @@ -50,7 +50,6 @@ def vulnTest(): ("--list-tampers", ("between", "MySQL", "xforwardedfor")), ("-r --flush-session -v 5 --test-skip='heavy' --save=", ("CloudFlare", "web application technology: Express", "possible DBMS: 'SQLite'", "User-agent: foobar", "~Type: time-based blind", "saved command line options to the configuration file")), ("-c ", ("CloudFlare", "possible DBMS: 'SQLite'", "User-agent: foobar", "~Type: time-based blind")), - (" -r -l --flush-session --banner --technique=B", ("banner: '3.", "STDIN")), ("-l --flush-session --keep-alive --skip-waf -vvvvv --technique=U --union-from=users --banner --parse-errors", ("banner: '3.", "ORDER BY term out of range", "~xp_cmdshell", "Connection: keep-alive")), ("-l --offline --banner -v 5", ("banner: '3.", "~[TRAFFIC OUT]")), ("-u --flush-session --data='id=1&_=Eewef6oh' --chunked --randomize=_ --random-agent --banner", ("fetched random HTTP User-Agent header value", "Parameter: id (POST)", "Type: boolean-based blind", "Type: time-based blind", "Type: UNION query", "banner: '3.")), @@ -150,10 +149,6 @@ def vulnTest(): os.close(handle) cmd = cmd.replace("", tmp) - if "" in cmd: - cmd = re.sub(r"\s*", "", cmd) - cmd = "echo %s | %s" % (url, cmd) - output = shellExec(cmd) if not all((check in output if not check.startswith('~') else check[1:] not in output) for check in checks) or "unhandled exception" in output: diff --git a/lib/parse/cmdline.py b/lib/parse/cmdline.py index 5dacb84b5..91d889a09 100644 --- a/lib/parse/cmdline.py +++ b/lib/parse/cmdline.py @@ -1060,7 +1060,7 @@ def cmdLineParser(argv=None): if args.dummy: args.url = args.url or DUMMY_URL - if hasattr(sys.stdin, "fileno") and not os.isatty(sys.stdin.fileno()) and '-' not in sys.argv: + if hasattr(sys.stdin, "fileno") and not os.isatty(sys.stdin.fileno()) and '-' not in sys.argv and "GITHUB_ACTIONS" not in os.environ: args.stdinPipe = iter(sys.stdin.readline, None) else: args.stdinPipe = None