From fcd4e94c0496f7981be211a019441f21b80ec350 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Wed, 6 Jul 2011 23:52:44 +0000 Subject: [PATCH] Higher chances to detect UNION query SQL injection against Microsoft Access --- lib/core/settings.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/core/settings.py b/lib/core/settings.py index 81b392b6f..4758392f9 100644 --- a/lib/core/settings.py +++ b/lib/core/settings.py @@ -23,7 +23,7 @@ VERSION = "1.0-dev" REVISION = getRevisionNumber() VERSION_STRING = "sqlmap/%s (r%s)" % (VERSION, REVISION) DESCRIPTION = "automatic SQL injection and database takeover tool" -SITE = "http://sqlmap.sourceforge.net" +SITE = "http://www.sqlmap.org" ML = "sqlmap-users@lists.sourceforge.net" # minimum distance of ratio from kb.matchRatio to result in True @@ -183,7 +183,7 @@ USER_AGENT_ALIASES = ( "ua", "useragent", "user-agent" ) FROM_TABLE = { DBMS.ORACLE: " FROM DUAL", - DBMS.ACCESS: " FROM MSysObjects", + DBMS.ACCESS: " FROM MSysAccessObjects%00", DBMS.FIREBIRD: " FROM RDB$DATABASE", DBMS.MAXDB: " FROM VERSIONS", DBMS.DB2: " FROM SYSIBM.SYSDUMMY1"