Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 126a147

Browse files
committed
Bug fix for --union-test
1 parent 072835e commit 126a147

2 files changed

Lines changed: 9 additions & 4 deletions

File tree

lib/core/agent.py

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -155,12 +155,13 @@ def prefixQuery(self, string):
155155
# payload, do not put a space after the prefix
156156
if kb.technique == 4:
157157
query = kb.injection.prefix
158-
elif (kb.technique and kb.technique in kb.injection.data) or \
159-
(kb.injection.clause == [2, 3] or kb.injection.clause == [ 2 ]):
158+
elif kb.technique and kb.technique in kb.injection.data:
160159
where = kb.injection.data[kb.technique].where
161160

162-
if where == 3 or (kb.injection.clause == [2, 3] or \
163-
kb.injection.clause == [ 2 ]):
161+
if where == 3:
162+
query = kb.injection.prefix
163+
elif kb.injection.clause == [2, 3] or kb.injection.clause == [ 2 ]:
164+
if kb.technique != 3:
164165
query = kb.injection.prefix
165166

166167
if query is None:

lib/techniques/inband/union/test.py

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -129,6 +129,9 @@ def unionTest():
129129
if kb.unionTest is not None:
130130
return kb.unionTest
131131

132+
oldTechnique = kb.technique
133+
kb.technique = 3
134+
132135
if conf.uChar == "NULL":
133136
technique = "NULL bruteforcing"
134137
else:
@@ -157,5 +160,6 @@ def unionTest():
157160
infoMsg += "inband sql injection vulnerability "
158161
infoMsg += "on parameter '%s'" % kb.injection.parameter
159162
logger.info(infoMsg)
163+
kb.technique = oldTechnique
160164

161165
return kb.unionTest

0 commit comments

Comments
 (0)