@@ -76,10 +76,10 @@ def webBackdoorRunCmd(self, cmd):
7676 return output
7777
7878 def webFileUpload (self , fileToUpload , destFileName , directory ):
79- file = open (fileToUpload , "r" )
80- self .__webFileStreamUpload (file , destFileName , directory )
81- file .close ()
82-
79+ inputFile = open (fileToUpload , "r" )
80+ self .__webFileStreamUpload (inputFile , destFileName , directory )
81+ inputFile .close ()
82+
8383 def __webFileStreamUpload (self , stream , destFileName , directory ):
8484 if self .webApi == "php" :
8585 multipartParams = {
@@ -89,7 +89,7 @@ def __webFileStreamUpload(self, stream, destFileName, directory):
8989 }
9090 page = Request .getPage (url = self .webUploaderUrl , multipart = multipartParams )
9191
92- if "Backdoor uploaded" not in page :
92+ if "File uploaded" not in page :
9393 warnMsg = "unable to upload the backdoor through "
9494 warnMsg += "the uploader agent on '%s'" % directory
9595 logger .warn (warnMsg )
@@ -179,7 +179,7 @@ def webInit(self):
179179 self .webUploaderUrl = self .webUploaderUrl .replace ("./" , "/" ).replace ("\\ " , "/" )
180180 uplPage , _ = Request .getPage (url = self .webUploaderUrl , direct = True )
181181
182- if "sqlmap backdoor uploader" not in uplPage :
182+ if "sqlmap file uploader" not in uplPage :
183183 warnMsg = "unable to upload the uploader "
184184 warnMsg += "agent on '%s'" % directory
185185 logger .warn (warnMsg )
@@ -200,6 +200,5 @@ def webInit(self):
200200 logger .info (infoMsg )
201201
202202 break
203-
203+
204204 backdoorStream .name = backdoorStream .old_name
205-
0 commit comments