Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 31850e4

Browse files
committed
Minor bug fixes
1 parent de9f239 commit 31850e4

11 files changed

Lines changed: 14 additions & 13 deletions

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@
1919
from lib.core.revision import getRevisionNumber
2020

2121
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22-
VERSION = "1.0.5.87"
22+
VERSION = "1.0.5.88"
2323
REVISION = getRevisionNumber()
2424
STABLE = VERSION.count('.') <= 2
2525
VERSION_STRING = "sqlmap/%s#%s" % (VERSION, "stable" if STABLE else "dev")

waf/denyall.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ def detect(get_page):
1818
for vector in WAF_ATTACK_VECTORS:
1919
page, headers, code = get_page(get=vector)
2020
retval = re.search(r"\Asessioncookie=", headers.get(HTTP_HEADER.SET_COOKIE, ""), re.I) is not None
21-
retval |= code == 200 and re.search(r"\ACondition Intercepted", page, re.I) is not None
21+
retval |= code == 200 and re.search(r"\ACondition Intercepted", page or "", re.I) is not None
2222
if retval:
2323
break
2424

waf/expressionengine.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ def detect(get_page):
1414

1515
for vector in WAF_ATTACK_VECTORS:
1616
page, _, _ = get_page(get=vector)
17-
retval = "Invalid GET Data" in page
17+
retval = "Invalid GET Data" in (page or "")
1818
if retval:
1919
break
2020

waf/jiasule.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ def detect(get_page):
2020
retval = re.search(r"jiasule-WAF", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
2121
retval |= re.search(r"__jsluid=", headers.get(HTTP_HEADER.SET_COOKIE, ""), re.I) is not None
2222
retval |= re.search(r"jsl_tracking", headers.get(HTTP_HEADER.SET_COOKIE, ""), re.I) is not None
23-
retval |= re.search(r"static\.jiasule\.com/static/js/http_error\.js", page, re.I) is not None
23+
retval |= re.search(r"static\.jiasule\.com/static/js/http_error\.js", page or "", re.I) is not None
2424
retval |= code == 403 and "notice-jiasule" in (page or "")
2525
if retval:
2626
break

waf/knownsec.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def detect(get_page):
1616

1717
for vector in WAF_ATTACK_VECTORS:
1818
page, _, _ = get_page(get=vector)
19-
retval = re.search(r"url\('/ks-waf-error\.png'\)", page, re.I) is not None
19+
retval = re.search(r"url\('/ks-waf-error\.png'\)", page or "", re.I) is not None
2020
if retval:
2121
break
2222

waf/kona.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ def detect(get_page):
1717

1818
for vector in WAF_ATTACK_VECTORS:
1919
page, headers, code = get_page(get=vector)
20-
retval = code in (400, 403, 501) and re.search(r"Reference #[0-9A-Fa-f.]+", page, re.I) is not None
20+
retval = code in (400, 403, 501) and re.search(r"Reference #[0-9A-Fa-f.]+", page or "", re.I) is not None
2121
retval |= re.search(r"AkamaiGHost", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
2222
if retval:
2323
break

waf/modsecurity.py

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -17,9 +17,10 @@ def detect(get_page):
1717

1818
for vector in WAF_ATTACK_VECTORS:
1919
page, headers, code = get_page(get=vector)
20-
retval = code == 501 and re.search(r"Reference #[0-9A-Fa-f.]+", page, re.I) is None
20+
retval = code == 501 and re.search(r"Reference #[0-9A-Fa-f.]+", page or "", re.I) is None
2121
retval |= re.search(r"Mod_Security|NOYB", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None
22-
retval |= code == 406 and "This error was generated by Mod_Security" in page
22+
retval |= code == 406 # specific for mod_security (and forks)
23+
retval |= "This error was generated by Mod_Security" in (page or "")
2324
if retval:
2425
break
2526

waf/paloalto.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def detect(get_page):
1616

1717
for vector in WAF_ATTACK_VECTORS:
1818
page, _, _ = get_page(get=vector)
19-
retval = re.search(r"Access[^<]+has been blocked in accordance with company policy", page, re.I) is not None
19+
retval = re.search(r"Access[^<]+has been blocked in accordance with company policy", page or "", re.I) is not None
2020
if retval:
2121
break
2222

waf/radware.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ def detect(get_page):
1616

1717
for vector in WAF_ATTACK_VECTORS:
1818
page, headers, _ = get_page(get=vector)
19-
retval = re.search(r"Unauthorized Activity Has Been Detected.+Case Number:", page, re.I | re.S) is not None
19+
retval = re.search(r"Unauthorized Activity Has Been Detected.+Case Number:", page or "", re.I | re.S) is not None
2020
retval |= headers.get("X-SL-CompState") is not None
2121
if retval:
2222
break

waf/requestvalidationmode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,8 +14,8 @@ def detect(get_page):
1414

1515
for vector in WAF_ATTACK_VECTORS:
1616
page, _, _ = get_page(get=vector)
17-
retval = "ASP.NET has detected data in the request that is potentially dangerous" in page
18-
retval |= "Request Validation has detected a potentially dangerous client input value" in page
17+
retval = "ASP.NET has detected data in the request that is potentially dangerous" in (page or "")
18+
retval |= "Request Validation has detected a potentially dangerous client input value" in (page or "")
1919
if retval:
2020
break
2121

0 commit comments

Comments
 (0)