6363from lib .core .exception import SqlmapSilentQuitException
6464from lib .core .exception import SqlmapUserQuitException
6565from lib .core .settings import DEFAULT_GET_POST_DELIMITER
66- from lib .core .settings import DUMMY_XSS_CHECK_APPENDIX
66+ from lib .core .settings import DUMMY_NON_SQLI_CHECK_APPENDIX
6767from lib .core .settings import FORMAT_EXCEPTION_STRINGS
6868from lib .core .settings import HEURISTIC_CHECK_ALPHABET
6969from lib .core .settings import SUHOSIN_MAX_VALUE_LENGTH
@@ -919,7 +919,8 @@ def _(page):
919919
920920 kb .heuristicMode = True
921921
922- value = "%s%s%s" % (randomStr (), DUMMY_XSS_CHECK_APPENDIX , randomStr ())
922+ randStr1 , randStr2 = randomStr (), randomStr ()
923+ value = "%s%s%s" % (randStr1 , DUMMY_NON_SQLI_CHECK_APPENDIX , randStr2 )
923924 payload = "%s%s%s" % (prefix , "'%s" % value , suffix )
924925 payload = agent .payload (place , parameter , newValue = payload )
925926 page , _ = Request .queryPage (payload , place , content = True , raise404 = False )
@@ -928,7 +929,12 @@ def _(page):
928929
929930 if value in (page or "" ):
930931 infoMsg = "heuristic (XSS) test shows that %s parameter " % paramType
931- infoMsg += "'%s' might be vulnerable to XSS attacks" % parameter
932+ infoMsg += "'%s' might be vulnerable to cross-site scripting attacks" % parameter
933+ logger .info (infoMsg )
934+
935+ if re .search (r"(?i)Failed opening[^\n]+%s" % randStr1 , page or "" ):
936+ infoMsg = "heuristic (FI) test shows that %s parameter " % paramType
937+ infoMsg += "'%s' might be vulnerable to file inclusion attacks" % parameter
932938 logger .info (infoMsg )
933939
934940 kb .heuristicMode = False
0 commit comments