From e41917787168f005e9d23827202e7ecc7f033440 Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Tue, 8 May 2012 17:28:19 +0000 Subject: [PATCH] minor update --- lib/techniques/union/test.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/techniques/union/test.py b/lib/techniques/union/test.py index 49dab4303..00e771a85 100644 --- a/lib/techniques/union/test.py +++ b/lib/techniques/union/test.py @@ -256,8 +256,8 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix warnMsg = "if UNION based SQL injection is not detected, " warnMsg += "please consider " - if not conf.uChar: - message = "injection not exploitable with NULL values. Do you want to try with a random integer value for '--union-char'? [Y/n] " + if not conf.uChar and count > 1: + message = "injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] " test = readInput(message, default="Y") if test[0] not in ("y", "Y"): warnMsg += "usage of option '--union-char' "