mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-02-17 03:50:42 +03:00
there is a pretty strong chance that the columns from the beginning are the INTEGER ones, while we search for STRING ones (not related to that MSSQL union/error problem we discussed earlier today)
This commit is contained in:
parent
771020abd6
commit
f958b21613
|
@ -101,7 +101,7 @@ def __unionPosition(comment, place, parameter, value, prefix, suffix, count, whe
|
||||||
# For each column of the table (# of NULL) perform a request using
|
# For each column of the table (# of NULL) perform a request using
|
||||||
# the UNION ALL SELECT statement to test it the target url is
|
# the UNION ALL SELECT statement to test it the target url is
|
||||||
# affected by an exploitable inband SQL injection vulnerability
|
# affected by an exploitable inband SQL injection vulnerability
|
||||||
for position in range(0, count):
|
for position in range(count-1, 0, -1):
|
||||||
# Prepare expression with delimiters
|
# Prepare expression with delimiters
|
||||||
randQuery = randomStr()
|
randQuery = randomStr()
|
||||||
phrase = "%s%s%s" % (kb.misc.start, randQuery, kb.misc.stop)
|
phrase = "%s%s%s" % (kb.misc.start, randQuery, kb.misc.stop)
|
||||||
|
|
Loading…
Reference in New Issue
Block a user