@@ -101,7 +101,7 @@ def __orderByTest(cols):
101101 pages = {}
102102
103103 for count in xrange (lowerCount , upperCount + 1 ):
104- query = agent .forgeInbandQuery ('' , - 1 , count , comment , prefix , suffix , kb .uChar , where )
104+ query = agent .forgeUnionQuery ('' , - 1 , count , comment , prefix , suffix , kb .uChar , where )
105105 payload = agent .payload (place = place , parameter = parameter , newValue = query , where = where )
106106 page , headers = Request .queryPage (payload , place = place , content = True , raise404 = False )
107107 if not isNullValue (kb .uChar ):
@@ -166,16 +166,16 @@ def __unionPosition(comment, place, parameter, prefix, suffix, count, where=PAYL
166166
167167 # For each column of the table (# of NULL) perform a request using
168168 # the UNION ALL SELECT statement to test it the target url is
169- # affected by an exploitable inband SQL injection vulnerability
169+ # affected by an exploitable union SQL injection vulnerability
170170 for position in positions :
171171 # Prepare expression with delimiters
172172 randQuery = randomStr (UNION_MIN_RESPONSE_CHARS )
173173 phrase = "%s%s%s" .lower () % (kb .chars .start , randQuery , kb .chars .stop )
174174 randQueryProcessed = agent .concatQuery ("\' %s\' " % randQuery )
175175 randQueryUnescaped = unescaper .unescape (randQueryProcessed )
176176
177- # Forge the inband SQL injection request
178- query = agent .forgeInbandQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where )
177+ # Forge the union SQL injection request
178+ query = agent .forgeUnionQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where )
179179 payload = agent .payload (place = place , parameter = parameter , newValue = query , where = where )
180180
181181 # Perform the request
@@ -196,8 +196,8 @@ def __unionPosition(comment, place, parameter, prefix, suffix, count, where=PAYL
196196 randQueryProcessed2 = agent .concatQuery ("\' %s\' " % randQuery2 )
197197 randQueryUnescaped2 = unescaper .unescape (randQueryProcessed2 )
198198
199- # Confirm that it is a full inband SQL injection
200- query = agent .forgeInbandQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where , multipleUnions = randQueryUnescaped2 )
199+ # Confirm that it is a full union SQL injection
200+ query = agent .forgeUnionQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where , multipleUnions = randQueryUnescaped2 )
201201 payload = agent .payload (place = place , parameter = parameter , newValue = query , where = where )
202202
203203 # Perform the request
@@ -210,7 +210,7 @@ def __unionPosition(comment, place, parameter, prefix, suffix, count, where=PAYL
210210 fromTable = " FROM (%s) AS %s" % (" UNION " .join ("SELECT %d%s%s" % (_ , FROM_DUMMY_TABLE .get (Backend .getIdentifiedDbms (), "" ), " AS %s" % randomStr () if _ == 0 else "" ) for _ in xrange (LIMITED_ROWS_TEST_NUMBER )), randomStr ())
211211
212212 # Check for limited row output
213- query = agent .forgeInbandQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where , fromTable = fromTable )
213+ query = agent .forgeUnionQuery (randQueryUnescaped , position , count , comment , prefix , suffix , kb .uChar , where , fromTable = fromTable )
214214 payload = agent .payload (place = place , parameter = parameter , newValue = query , where = where )
215215
216216 # Perform the request
@@ -239,11 +239,11 @@ def __unionConfirm(comment, place, parameter, prefix, suffix, count):
239239 validPayload = None
240240 vector = None
241241
242- # Confirm the inband SQL injection and get the exact column
242+ # Confirm the union SQL injection and get the exact column
243243 # position which can be used to extract data
244244 validPayload , vector = __unionPosition (comment , place , parameter , prefix , suffix , count )
245245
246- # Assure that the above function found the exploitable full inband
246+ # Assure that the above function found the exploitable full union
247247 # SQL injection position
248248 if not validPayload :
249249 validPayload , vector = __unionPosition (comment , place , parameter , prefix , suffix , count , where = PAYLOAD .WHERE .NEGATIVE )
@@ -252,7 +252,7 @@ def __unionConfirm(comment, place, parameter, prefix, suffix, count):
252252
253253def __unionTestByCharBruteforce (comment , place , parameter , value , prefix , suffix ):
254254 """
255- This method tests if the target url is affected by an inband
255+ This method tests if the target url is affected by an union
256256 SQL injection vulnerability. The test is done up to 50 columns
257257 on the target database table
258258 """
@@ -297,7 +297,7 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix
297297
298298def unionTest (comment , place , parameter , value , prefix , suffix ):
299299 """
300- This method tests if the target url is affected by an inband
300+ This method tests if the target url is affected by an union
301301 SQL injection vulnerability. The test is done up to 3*50 times
302302 """
303303
0 commit comments