Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit 65a0a8d

Browse files
committed
Delegate urlencoding to agent.py only
1 parent 17e8abe commit 65a0a8d

5 files changed

Lines changed: 0 additions & 12 deletions

File tree

lib/takeover/udf.py

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,6 @@
1212
from lib.core.agent import agent
1313
from lib.core.common import dataToStdout
1414
from lib.core.common import readInput
15-
from lib.core.convert import urlencode
1615
from lib.core.data import conf
1716
from lib.core.data import kb
1817
from lib.core.data import logger
@@ -80,7 +79,6 @@ def udfExecCmd(self, cmd, silent=False, udfName=None):
8079
udfName = "sys_exec"
8180

8281
cmd = unescaper.unescape(cmd)
83-
cmd = urlencode(cmd, convall=True)
8482

8583
inject.goStacked("SELECT %s(%s)" % (udfName, cmd), silent)
8684

@@ -90,7 +88,6 @@ def udfEvalCmd(self, cmd, first=None, last=None, udfName=None):
9088
udfName = "sys_eval"
9189

9290
cmd = unescaper.unescape(cmd)
93-
cmd = urlencode(cmd, convall=True)
9491

9592
inject.goStacked("INSERT INTO %s(%s) VALUES (%s(%s))" % (self.cmdTblName, self.tblField, udfName, cmd))
9693
output = inject.getValue("SELECT %s FROM %s" % (self.tblField, self.cmdTblName), resumeValue=False, firstChar=first, lastChar=last)

lib/takeover/xp_cmdshell.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@
99

1010
from lib.core.common import randomStr
1111
from lib.core.common import readInput
12-
from lib.core.convert import urlencode
1312
from lib.core.data import conf
1413
from lib.core.data import kb
1514
from lib.core.data import logger
@@ -98,7 +97,6 @@ def __xpCmdshellCheck(self):
9897

9998
def xpCmdshellForgeCmd(self, cmd):
10099
forgedCmd = "EXEC %s '%s'" % (self.xpCmdshellStr, cmd)
101-
forgedCmd = urlencode(forgedCmd, convall=True)
102100

103101
return forgedCmd
104102

plugins/dbms/mssqlserver/filesystem.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,6 @@
1414
from lib.core.common import getRange
1515
from lib.core.common import posixToNtSlashes
1616
from lib.core.common import randomStr
17-
from lib.core.convert import urlencode
1817
from lib.core.data import conf
1918
from lib.core.data import kb
2019
from lib.core.data import logger
@@ -89,7 +88,6 @@ def stackedReadFile(self, rFile):
8988
""" % (self.tblField, txtTbl, self.tblField, txtTbl, hexTbl, self.tblField, hexTbl, self.tblField)
9089

9190
binToHexQuery = binToHexQuery.replace(" ", "").replace("\n", " ")
92-
binToHexQuery = urlencode(binToHexQuery, convall=True)
9391
inject.goStacked(binToHexQuery)
9492

9593
if kb.unionPosition is not None:

plugins/dbms/mssqlserver/takeover.py

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,6 @@
99

1010
import binascii
1111

12-
from lib.core.convert import urlencode
1312
from lib.core.data import kb
1413
from lib.core.data import logger
1514
from lib.core.exception import sqlmapUnsupportedFeatureException
@@ -143,7 +142,6 @@ def spHeapOverflow(self):
143142
""" % (addrs[0], addrs[1], addrs[2], addrs[3], addrs[4], addrs[5], addrs[6], addrs[7], shellcodeChar)
144143

145144
self.spExploit = self.spExploit.replace(" ", "").replace("\n", " ")
146-
self.spExploit = urlencode(self.spExploit, convall=True)
147145

148146
logger.info("triggering the buffer overflow vulnerability, wait..")
149147
inject.goStacked(self.spExploit, silent=True)

plugins/generic/enumeration.py

Lines changed: 0 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,6 @@
2424
from lib.core.common import readInput
2525
from lib.core.common import safeStringFormat
2626
from lib.core.common import strToHex
27-
from lib.core.convert import urlencode
2827
from lib.core.convert import utf8decode
2928
from lib.core.data import conf
3029
from lib.core.data import kb
@@ -1731,8 +1730,6 @@ def sqlQuery(self, query):
17311730

17321731
return output
17331732
else:
1734-
query = urlencode(query, convall=True)
1735-
17361733
if kb.stackedTest is None:
17371734
stackedTest()
17381735

0 commit comments

Comments
 (0)