@@ -575,7 +575,7 @@ def genCmpPayload():
575575 conf .string = candidate
576576 injectable = True
577577
578- infoMsg = "%s parameter '%s' appears to be '%s' injectable (with --string=\" %s\" )" % (paramType , parameter , title , repr (conf .string ).lstrip ('u' ).strip ("'" ))
578+ infoMsg = "%sparameter '%s' appears to be '%s' injectable (with --string=\" %s\" )" % ("%s " % paramType if paramType != parameter else "" , parameter , title , repr (conf .string ).lstrip ('u' ).strip ("'" ))
579579 logger .info (infoMsg )
580580
581581 break
@@ -585,7 +585,7 @@ def genCmpPayload():
585585 if all ((falseCode , trueCode )) and falseCode != trueCode :
586586 conf .code = trueCode
587587
588- infoMsg = "%s parameter '%s' appears to be '%s' injectable (with --code=%d)" % (paramType , parameter , title , conf .code )
588+ infoMsg = "%sparameter '%s' appears to be '%s' injectable (with --code=%d)" % ("%s " % paramType if paramType != parameter else "" , parameter , title , conf .code )
589589 logger .info (infoMsg )
590590 else :
591591 trueSet = set (extractTextTagContent (trueRawResponse ))
@@ -610,7 +610,7 @@ def genCmpPayload():
610610
611611 conf .string = candidate
612612
613- infoMsg = "%s parameter '%s' appears to be '%s' injectable (with --string=\" %s\" )" % (paramType , parameter , title , repr (conf .string ).lstrip ('u' ).strip ("'" ))
613+ infoMsg = "%sparameter '%s' appears to be '%s' injectable (with --string=\" %s\" )" % ("%s " % paramType if paramType != parameter else "" , parameter , title , repr (conf .string ).lstrip ('u' ).strip ("'" ))
614614 logger .info (infoMsg )
615615
616616 if not any ((conf .string , conf .notString )):
@@ -624,11 +624,11 @@ def genCmpPayload():
624624
625625 conf .notString = candidate
626626
627- infoMsg = "%s parameter '%s' appears to be '%s' injectable (with --not-string=\" %s\" )" % (paramType , parameter , title , repr (conf .notString ).lstrip ('u' ).strip ("'" ))
627+ infoMsg = "%sparameter '%s' appears to be '%s' injectable (with --not-string=\" %s\" )" % ("%s " % paramType if paramType != parameter else "" , parameter , title , repr (conf .notString ).lstrip ('u' ).strip ("'" ))
628628 logger .info (infoMsg )
629629
630630 if not any ((conf .string , conf .notString , conf .code )):
631- infoMsg = "%s parameter '%s' appears to be '%s' injectable " % (paramType , parameter , title )
631+ infoMsg = "%sparameter '%s' appears to be '%s' injectable " % ("%s " % paramType if paramType != parameter else "" , parameter , title )
632632 singleTimeLogMessage (infoMsg )
633633
634634 # In case of error-based SQL injection
@@ -646,7 +646,7 @@ def genCmpPayload():
646646 result = output == "1"
647647
648648 if result :
649- infoMsg = "%s parameter '%s' is '%s' injectable " % (paramType , parameter , title )
649+ infoMsg = "%sparameter '%s' is '%s' injectable " % ("%s " % paramType if paramType != parameter else "" , parameter , title )
650650 logger .info (infoMsg )
651651
652652 injectable = True
@@ -675,7 +675,7 @@ def genCmpPayload():
675675 trueResult = Request .queryPage (reqPayload , place , timeBasedCompare = True , raise404 = False )
676676
677677 if trueResult :
678- infoMsg = "%s parameter '%s' appears to be '%s' injectable " % (paramType , parameter , title )
678+ infoMsg = "%sparameter '%s' appears to be '%s' injectable " % ("%s " % paramType if paramType != parameter else "" , parameter , title )
679679 logger .info (infoMsg )
680680
681681 injectable = True
@@ -714,7 +714,7 @@ def genCmpPayload():
714714 reqPayload , vector = unionTest (comment , place , parameter , value , prefix , suffix )
715715
716716 if isinstance (reqPayload , six .string_types ):
717- infoMsg = "%s parameter '%s' is '%s' injectable" % (paramType , parameter , title )
717+ infoMsg = "%sparameter '%s' is '%s' injectable" % ("%s " % paramType if paramType != parameter else "" , parameter , title )
718718 logger .info (infoMsg )
719719
720720 injectable = True
@@ -1053,8 +1053,7 @@ def heuristicCheckSqlInjection(place, parameter):
10531053 parseFilePaths (page )
10541054 result = wasLastResponseDBMSError ()
10551055
1056- infoMsg = "heuristic (basic) test shows that %s parameter " % paramType
1057- infoMsg += "'%s' might " % parameter
1056+ infoMsg = "heuristic (basic) test shows that %sparameter '%s' might " % ("%s " % paramType if paramType != parameter else "" , parameter )
10581057
10591058 def _ (page ):
10601059 return any (_ in (page or "" ) for _ in FORMAT_EXCEPTION_STRINGS )
@@ -1116,14 +1115,12 @@ def _(page):
11161115 paramType = conf .method if conf .method not in (None , HTTPMETHOD .GET , HTTPMETHOD .POST ) else place
11171116
11181117 if value .lower () in (page or "" ).lower ():
1119- infoMsg = "heuristic (XSS) test shows that %s parameter " % paramType
1120- infoMsg += "'%s' might be vulnerable to cross-site scripting (XSS) attacks" % parameter
1118+ infoMsg = "heuristic (XSS) test shows that %sparameter '%s' might be vulnerable to cross-site scripting (XSS) attacks" % ("%s " % paramType if paramType != parameter else "" , parameter )
11211119 logger .info (infoMsg )
11221120
11231121 for match in re .finditer (FI_ERROR_REGEX , page or "" ):
11241122 if randStr1 .lower () in match .group (0 ).lower ():
1125- infoMsg = "heuristic (FI) test shows that %s parameter " % paramType
1126- infoMsg += "'%s' might be vulnerable to file inclusion (FI) attacks" % parameter
1123+ infoMsg = "heuristic (FI) test shows that %sparameter '%s' might be vulnerable to file inclusion (FI) attacks" % ("%s " % paramType if paramType != parameter else "" , parameter )
11271124 logger .info (infoMsg )
11281125 break
11291126
@@ -1147,7 +1144,7 @@ def checkDynParam(place, parameter, value):
11471144
11481145 paramType = conf .method if conf .method not in (None , HTTPMETHOD .GET , HTTPMETHOD .POST ) else place
11491146
1150- infoMsg = "testing if %s parameter '%s' is dynamic" % (paramType , parameter )
1147+ infoMsg = "testing if %sparameter '%s' is dynamic" % ("%s " % paramType if paramType != parameter else "" , parameter )
11511148 logger .info (infoMsg )
11521149
11531150 try :
0 commit comments