@@ -215,19 +215,14 @@ <H2><A NAME="ss1.3">1.3</A> <A HREF="#toc1.3">Techniques</A>
215215statements support</ B > : sqlmap tests if the web application supports
216216stacked queries then, in case it does support, it appends to the affected
217217parameter in the HTTP request, a semi-colon (< CODE > ;</ CODE > ) followed by the
218- SQL statement to be executed. This technique is useful if to run SQL
218+ SQL statement to be executed. This technique is useful to run SQL
219219statements other than < CODE > SELECT</ CODE > like, for instance, < EM > data
220220definition</ EM > or < EM > data manipulation</ EM > statements possibly leading
221221to file system read and write access and operating system command
222- execution depending on the underlying back-end database management system.</ LI >
222+ execution depending on the underlying back-end database management system
223+ and the session user privileges.</ LI >
223224</ UL >
224225</ P >
225- < P > It is strongly recommended to run at least once sqlmap with the
226- < CODE > --union-test</ CODE > option to test if the affected parameter is used
227- within a < CODE > for</ CODE > cycle, or similar, and in case use
228- < CODE > --union-use</ CODE > option to exploit this vulnerability because it
229- saves a lot of time and it does not weight down the web server log file
230- with hundreds of HTTP requests.</ P >
231226
232227
233228< H2 > < A NAME ="s2 "> 2.</ A > < A HREF ="#toc2 "> Features</ A > </ H2 >
@@ -2008,6 +2003,13 @@ <H3>Test for UNION query SQL injection</H3>
20082003In case this vulnerability is exploitable it is strongly recommended to
20092004use this technique which saves a lot of time.</ P >
20102005
2006+ < P > It is strongly recommended to run at least once sqlmap with the
2007+ < CODE > --union-test</ CODE > option to test if the affected parameter is used
2008+ within a < CODE > for</ CODE > cycle, or similar, and in case use
2009+ < CODE > --union-use</ CODE > option to exploit this vulnerability because it
2010+ saves a lot of time and it does not weight down the web server log file
2011+ with hundreds of HTTP requests.</ P >
2012+
20112013
20122014< H3 > Use the UNION query SQL injection</ H3 >
20132015
0 commit comments