From e16bab7117273f4302a6385d588bcb38a73ef350 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Tue, 8 Feb 2011 17:03:57 +0000 Subject: [PATCH] re-enabled --read-file for MySQL with all techniques --- plugins/generic/filesystem.py | 10 +--------- 1 file changed, 1 insertion(+), 9 deletions(-) diff --git a/plugins/generic/filesystem.py b/plugins/generic/filesystem.py index 0efac21a8..44c2ec320 100644 --- a/plugins/generic/filesystem.py +++ b/plugins/generic/filesystem.py @@ -270,20 +270,12 @@ class Filesystem: logger.debug(debugMsg) fileContent = self.stackedReadFile(rFile) - elif isTechniqueAvailable(PAYLOAD.TECHNIQUE.UNION) and Backend.isDbms(DBMS.MYSQL): + elif Backend.isDbms(DBMS.MYSQL): debugMsg = "going to read the file with UNION query SQL " debugMsg += "injection technique" logger.debug(debugMsg) fileContent = self.unionReadFile(rFile) - elif isTechniqueAvailable(PAYLOAD.TECHNIQUE.ERROR) and Backend.isDbms(DBMS.MYSQL): - # TODO: edit this as soon as the MySQL/trim/error-based bug - # is fixed - errMsg = "file retrieval via error-based SQL injection will " - errMsg += "be implemented soon" - logger.error(errMsg) - - return None else: errMsg = "none of the SQL injection techniques detected can " errMsg += "be used to read files from the underlying file "