3232from lib .core .common import removeReflectiveValues
3333from lib .core .common import singleTimeWarnMessage
3434from lib .core .common import stdev
35- from lib .core .common import urlEncodeCookieValues
3635from lib .core .common import wasLastRequestDelayed
3736from lib .core .common import unicodeencode
3837from lib .core .common import urlencode
@@ -577,7 +576,13 @@ def queryPage(value=None, place=None, content=False, getRatioValue=False, silent
577576
578577 logger .log (CUSTOM_LOGGING .PAYLOAD , safecharencode (payload ))
579578
580- if place in (PLACE .GET , PLACE .POST , PLACE .URI , PLACE .CUSTOM_POST ):
579+ if place == PLACE .SOAP :
580+ # payloads in SOAP should have chars > and < replaced
581+ # with their HTML encoded counterparts
582+ payload = payload .replace ('>' , ">" ).replace ('<' , "<" )
583+ value = agent .replacePayload (value , payload )
584+
585+ else :
581586 # payloads in GET and/or POST need to be urlencoded
582587 # throughly without safe chars (especially & and =)
583588 # addendum: as we support url encoding in tampering
@@ -586,18 +591,9 @@ def queryPage(value=None, place=None, content=False, getRatioValue=False, silent
586591 payload = urlencode (payload , '%' , False , True ) if place not in (PLACE .POST , PLACE .CUSTOM_POST ) and not skipUrlEncode else payload
587592 value = agent .replacePayload (value , payload )
588593
589- elif place == PLACE .SOAP :
590- # payloads in SOAP should have chars > and < replaced
591- # with their HTML encoded counterparts
592- payload = payload .replace ('>' , ">" ).replace ('<' , "<" )
593- value = agent .replacePayload (value , payload )
594-
595594 if place :
596595 value = agent .removePayloadDelimiters (value )
597596
598- if place == PLACE .COOKIE and conf .cookieUrlencode :
599- value = urlEncodeCookieValues (value )
600-
601597 if conf .checkPayload :
602598 checkPayload (value )
603599
0 commit comments