From d0ebe428da70edb34673426ad069614f420d6c38 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Tue, 19 Oct 2010 14:12:34 +0000 Subject: [PATCH] i've left error flag --- lib/request/inject.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/request/inject.py b/lib/request/inject.py index f9ae05658..29d0cba86 100644 --- a/lib/request/inject.py +++ b/lib/request/inject.py @@ -364,7 +364,7 @@ def __goError(expression, resumeValue=True): return output -def getValue(expression, blind=True, inband=True, error=True, fromUser=False, expected=None, batch=False, unpack=True, sort=True, resumeValue=True, charsetType=None, firstChar=None, lastChar=None, dump=False, suppressOutput=False): +def getValue(expression, blind=True, inband=True, error=False, fromUser=False, expected=None, batch=False, unpack=True, sort=True, resumeValue=True, charsetType=None, firstChar=None, lastChar=None, dump=False, suppressOutput=False): """ Called each time sqlmap inject a SQL query on the SQL injection affected parameter. It can call a function to retrieve the output