File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 6767from lib .core .settings import UNICODE_ENCODING
6868from lib .core .settings import DBMS_DICT
6969from lib .core .settings import DESCRIPTION
70+ from lib .core .settings import DUMMY_SQL_INJECTION_CHARS
7071from lib .core .settings import IS_WIN
7172from lib .core .settings import PLATFORM
7273from lib .core .settings import PYVERSION
@@ -498,6 +499,13 @@ def paramToDict(place, parameters=None):
498499 condition |= parameter in conf .testParameter
499500
500501 if condition :
502+ if elem [1 ].strip (DUMMY_SQL_INJECTION_CHARS ) != elem [1 ]:
503+ errMsg = "you have provided parameters with most "
504+ errMsg += "probably leftovers from manual sql injection "
505+ errMsg += "tests (%s). " % DUMMY_SQL_INJECTION_CHARS
506+ errMsg += "please, remove them so sqlmap could be able "
507+ errMsg += "to do a valid run."
508+ raise sqlmapSyntaxException , errMsg
501509 testableParameters [parameter ] = elem [1 ]
502510 else :
503511 root = ET .XML (parameters )
Original file line number Diff line number Diff line change 351351
352352# Regular expression used for extracting HTML title
353353HTML_TITLE_REGEX = "<title>(?P<result>[^<]+)</title>"
354+
355+ # Chars used to quickly distinguish if the user provided tainted parameter values
356+ DUMMY_SQL_INJECTION_CHARS = ";()'"
You can’t perform that action at this time.
0 commit comments