Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Commit e419177

Browse files
committed
minor update
1 parent deec97d commit e419177

1 file changed

Lines changed: 2 additions & 2 deletions

File tree

lib/techniques/union/test.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -256,8 +256,8 @@ def __unionTestByCharBruteforce(comment, place, parameter, value, prefix, suffix
256256
warnMsg = "if UNION based SQL injection is not detected, "
257257
warnMsg += "please consider "
258258

259-
if not conf.uChar:
260-
message = "injection not exploitable with NULL values. Do you want to try with a random integer value for '--union-char'? [Y/n] "
259+
if not conf.uChar and count > 1:
260+
message = "injection not exploitable with NULL values. Do you want to try with a random integer value for option '--union-char'? [Y/n] "
261261
test = readInput(message, default="Y")
262262
if test[0] not in ("y", "Y"):
263263
warnMsg += "usage of option '--union-char' "

0 commit comments

Comments
 (0)