mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-22 09:36:35 +03:00
update
This commit is contained in:
parent
0c9fa5c550
commit
ec6fa384eb
|
@ -67,6 +67,7 @@ from lib.core.settings import INFERENCE_UNKNOWN_CHAR
|
|||
from lib.core.settings import UNICODE_ENCODING
|
||||
from lib.core.settings import DBMS_DICT
|
||||
from lib.core.settings import DESCRIPTION
|
||||
from lib.core.settings import DUMMY_SQL_INJECTION_CHARS
|
||||
from lib.core.settings import IS_WIN
|
||||
from lib.core.settings import PLATFORM
|
||||
from lib.core.settings import PYVERSION
|
||||
|
@ -498,6 +499,13 @@ def paramToDict(place, parameters=None):
|
|||
condition |= parameter in conf.testParameter
|
||||
|
||||
if condition:
|
||||
if elem[1].strip(DUMMY_SQL_INJECTION_CHARS) != elem[1]:
|
||||
errMsg = "you have provided parameters with most "
|
||||
errMsg += "probably leftovers from manual sql injection "
|
||||
errMsg += "tests (%s). " % DUMMY_SQL_INJECTION_CHARS
|
||||
errMsg += "please, remove them so sqlmap could be able "
|
||||
errMsg += "to do a valid run."
|
||||
raise sqlmapSyntaxException, errMsg
|
||||
testableParameters[parameter] = elem[1]
|
||||
else:
|
||||
root = ET.XML(parameters)
|
||||
|
|
|
@ -351,3 +351,6 @@ REFLECTIVE_MISS_THRESHOLD = 20
|
|||
|
||||
# Regular expression used for extracting HTML title
|
||||
HTML_TITLE_REGEX = "<title>(?P<result>[^<]+)</title>"
|
||||
|
||||
# Chars used to quickly distinguish if the user provided tainted parameter values
|
||||
DUMMY_SQL_INJECTION_CHARS = ";()'"
|
||||
|
|
Loading…
Reference in New Issue
Block a user