5656from thirdparty .odict .odict import OrderedDict
5757
5858def _oneShotUnionUse (expression , unpack = True , limited = False ):
59- retVal = hashDBRetrieve ("%s%s" % (conf .hexConvert or False , expression ), checkConf = True ) # as union data is stored raw unconverted
59+ retVal = hashDBRetrieve ("%s%s" % (conf .hexConvert or False , expression ), checkConf = True ) # as UNION data is stored raw unconverted
6060
6161 threadData = getCurrentThreadData ()
6262 threadData .resumed = retVal is not None
@@ -65,7 +65,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
6565 # Prepare expression with delimiters
6666 injExpression = unescaper .escape (agent .concatQuery (expression , unpack ))
6767
68- # Forge the union SQL injection request
68+ # Forge the UNION SQL injection request
6969 vector = kb .injection .data [PAYLOAD .TECHNIQUE .UNION ].vector
7070 kb .unionDuplicates = vector [7 ]
7171 kb .forcePartialUnion = vector [8 ]
@@ -78,7 +78,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
7878
7979 incrementCounter (PAYLOAD .TECHNIQUE .UNION )
8080
81- # Parse the returned page to get the exact union -based
81+ # Parse the returned page to get the exact UNION -based
8282 # SQL injection output
8383 def _ (regex ):
8484 return reduce (lambda x , y : x if x is not None else y , (\
@@ -98,7 +98,7 @@ def _(regex):
9898 if retVal is not None :
9999 retVal = getUnicode (retVal , kb .pageEncoding )
100100
101- # Special case when DBMS is Microsoft SQL Server and error message is used as a result of union injection
101+ # Special case when DBMS is Microsoft SQL Server and error message is used as a result of UNION injection
102102 if Backend .isDbms (DBMS .MSSQL ) and wasLastResponseDBMSError ():
103103 retVal = htmlunescape (retVal ).replace ("<br>" , "\n " )
104104
@@ -152,9 +152,9 @@ def _configUnionCols(columns):
152152
153153def unionUse (expression , unpack = True , dump = False ):
154154 """
155- This function tests for an union SQL injection on the target
155+ This function tests for an UNION SQL injection on the target
156156 URL then call its subsidiary function to effectively perform an
157- union SQL injection on the affected URL
157+ UNION SQL injection on the affected URL
158158 """
159159
160160 initTechnique (PAYLOAD .TECHNIQUE .UNION )
0 commit comments