From f47b493a24d598bd09fc74b39dd0fc14be6633dc Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 28 Nov 2014 14:10:31 +0100 Subject: [PATCH] Minor update --- waf/requestvalidationmode.py | 5 +++-- 1 file changed, 3 insertions(+), 2 deletions(-) diff --git a/waf/requestvalidationmode.py b/waf/requestvalidationmode.py index 4042ca850..d1557255f 100644 --- a/waf/requestvalidationmode.py +++ b/waf/requestvalidationmode.py @@ -5,7 +5,7 @@ Copyright (c) 2006-2014 sqlmap developers (http://sqlmap.org/) See the file 'doc/COPYING' for copying permission """ -from lib.core.common import randomInt +from lib.core.settings import WAF_ATTACK_VECTORS __product__ = "ASP.NET RequestValidationMode (Microsoft)" @@ -14,7 +14,8 @@ def detect(get_page): for vector in WAF_ATTACK_VECTORS: page, headers, code = get_page(get=vector) - retval = re.search(r"ASP\.NET has detected data in the request that is potentially dangerous", page, re.I) is not None + retval = "ASP.NET has detected data in the request that is potentially dangerous" in page + retval |= "Request Validation has detected a potentially dangerous client input value" in page if retval: break