Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 12fc944

Browse files
committed
Tamper function(s) refactoring (really no need for returning headers as they are passed by reference)
1 parent 54fbb22 commit 12fc944

36 files changed

Lines changed: 70 additions & 72 deletions

lib/core/agent.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ def payloadDirect(self, query):
4848

4949
if kb.tamperFunctions:
5050
for function in kb.tamperFunctions:
51-
query, _ = function(payload=query, headers=None)
51+
query = function(payload=query)
5252

5353
return query
5454

lib/request/connect.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -587,7 +587,7 @@ def queryPage(value=None, place=None, content=False, getRatioValue=False, silent
587587
if payload:
588588
if kb.tamperFunctions:
589589
for function in kb.tamperFunctions:
590-
payload, auxHeaders = function(payload=payload, headers=auxHeaders)
590+
payload = function(payload=payload, headers=auxHeaders)
591591

592592
value = agent.replacePayload(value, payload)
593593

tamper/apostrophemask.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces apostrophe character with its UTF-8 full width counterpart
1818
@@ -27,4 +27,4 @@ def tamper(payload, headers):
2727
* http://lukasz.pilorz.net/testy/full_width_utf/index.phps
2828
"""
2929

30-
return payload.replace('\'', "%EF%BC%87") if payload else payload, headers
30+
return payload.replace('\'', "%EF%BC%87") if payload else payload

tamper/apostrophenullencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces apostrophe character with its illegal double unicode counterpart
1818
@@ -21,4 +21,4 @@ def tamper(payload, headers):
2121
* Output: AND %00%271%00%27=%00%271%00%27
2222
"""
2323

24-
return payload.replace('\'', "%00%27") if payload else payload, headers
24+
return payload.replace('\'', "%00%27") if payload else payload

tamper/appendnullbyte.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Appends encoded NULL byte character at the end of payload
1818
@@ -31,4 +31,4 @@ def tamper(payload, headers):
3131
Reference: http://projects.webappsec.org/w/page/13246949/Null-Byte-Injection
3232
"""
3333

34-
return "%s%%00" % payload if payload else payload, headers
34+
return "%s%%00" % payload if payload else payload

tamper/base64encode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Base64 all characters in a given payload
2020
@@ -23,4 +23,4 @@ def tamper(payload, headers):
2323
* Output: MScgQU5EIFNMRUVQKDUpIw==
2424
"""
2525

26-
return base64.b64encode(payload) if payload else payload, headers
26+
return base64.b64encode(payload) if payload else payload

tamper/between.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #'
1818
@@ -61,4 +61,4 @@ def tamper(payload, headers):
6161

6262
retVal += payload[i]
6363

64-
return retVal, headers
64+
return retVal

tamper/chardoubleencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Double url-encodes all characters in a given payload (not processing
2020
already encoded)
@@ -43,4 +43,4 @@ def tamper(payload, headers):
4343
retVal += '%%25%.2X' % ord(payload[i])
4444
i += 1
4545

46-
return retVal, headers
46+
return retVal

tamper/charencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Url-encodes all characters in a given payload (not processing already
2020
encoded)
@@ -50,4 +50,4 @@ def tamper(payload, headers):
5050
retVal += '%%%.2X' % ord(payload[i])
5151
i += 1
5252

53-
return retVal, headers
53+
return retVal

tamper/charunicodeencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
def dependencies():
1717
singleTimeWarnMessage("tamper script '%s' is only meant to be run against ASP or ASP.NET web applications" % os.path.basename(__file__).split(".")[0])
1818

19-
def tamper(payload, headers):
19+
def tamper(payload, headers=None):
2020
"""
2121
Unicode-url-encodes non-encoded characters in a given payload (not
2222
processing already encoded)
@@ -55,4 +55,4 @@ def tamper(payload, headers):
5555
retVal += '%%u%.4X' % ord(payload[i])
5656
i += 1
5757

58-
return retVal, headers
58+
return retVal

0 commit comments

Comments
 (0)