@@ -61,8 +61,8 @@ def vulnTest():
6161 ("-u <url> --flush-session --encoding=ascii --forms --crawl=2 --threads=2 --banner" , ("total of 2 targets" , "might be injectable" , "Type: UNION query" , "banner: '3." )),
6262 ("-u <base> --flush-session --data='{\" id\" : 1}' --banner" , ("might be injectable" , "3 columns" , "Payload: {\" id\" " , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." )),
6363 ("-u <base> --flush-session -H 'Foo: Bar' -H 'Sna: Fu' --data='<root><param name=\" id\" value=\" 1*\" /></root>' --union-char=1 --mobile --answers='smartphone=3' --banner --smart -v 5" , ("might be injectable" , "Payload: <root><param name=\" id\" value=\" 1" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "banner: '3." , "Nexus" , "Sna: Fu" , "Foo: Bar" )),
64- ("-u <base> --flush-session --method=PUT --data='a=1;id=1;b=2' --param-del=';' --skip-static --har=<tmp > --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
65- ("-u <url> --flush-session -H 'id: 1*' --tables -t <tmp >" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
64+ ("-u <base> --flush-session --method=PUT --data='a=1;id=1;b=2' --param-del=';' --skip-static --har=<tmpfile > --dump -T users --start=1 --stop=2" , ("might be injectable" , "Parameter: id (PUT)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , "2 entries" )),
65+ ("-u <url> --flush-session -H 'id: 1*' --tables -t <tmpfile >" , ("might be injectable" , "Parameter: id #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
6666 ("-u <url> --flush-session --banner --invalid-logical --technique=B --predict-output --test-filter='OR boolean' --tamper=space2dash" , ("banner: '3." , " LIKE " )),
6767 ("-u <url> --flush-session --cookie=\" PHPSESSID=d41d8cd98f00b204e9800998ecf8427e; id=1*; id2=2\" --tables --union-cols=3" , ("might be injectable" , "Cookie #1* ((custom) HEADER)" , "Type: boolean-based blind" , "Type: time-based blind" , "Type: UNION query" , " users " )),
6868 ("-u <url> --flush-session --null-connection --technique=B --tamper=between,randomcase --banner --count -T users" , ("NULL connection is supported with HEAD method" , "banner: '3." , "users | 5" )),
@@ -145,10 +145,10 @@ def _thread():
145145
146146 cmd = "%s \" %s\" %s --batch --non-interactive --debug" % (sys .executable , os .path .abspath (os .path .join (os .path .dirname (__file__ ), ".." , ".." , "sqlmap.py" )), options )
147147
148- if "<tmp >" in cmd :
148+ if "<tmpfile >" in cmd :
149149 handle , tmp = tempfile .mkstemp ()
150150 os .close (handle )
151- cmd = cmd .replace ("<tmp >" , tmp )
151+ cmd = cmd .replace ("<tmpfile >" , tmp )
152152
153153 if "<piped>" in cmd :
154154 cmd = re .sub (r"<piped>\s*" , "" , cmd )
0 commit comments