File tree Expand file tree Collapse file tree
Expand file tree Collapse file tree Original file line number Diff line number Diff line change 1919from lib .core .enums import OS
2020
2121# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
22- VERSION = "1.2.6.2 "
22+ VERSION = "1.2.6.3 "
2323TYPE = "dev" if VERSION .count ('.' ) > 2 and VERSION .split ('.' )[- 1 ] != '0' else "stable"
2424TYPE_COLORS = {"dev" : 33 , "stable" : 90 , "pip" : 34 }
2525VERSION_STRING = "sqlmap/%s#%s" % ('.' .join (VERSION .split ('.' )[:- 1 ]) if VERSION .count ('.' ) > 2 and VERSION .split ('.' )[- 1 ] == '0' else VERSION , TYPE )
Original file line number Diff line number Diff line change @@ -47,7 +47,7 @@ c9a56e58984420a5abb7a3f7aadc196d lib/core/optiondict.py
47470c3eef46bdbf87e29a3f95f90240d192 lib/core/replication.py
4848a7db43859b61569b601b97f187dd31c5 lib/core/revision.py
4949fcb74fcc9577523524659ec49e2e964b lib/core/session.py
50- 240e554483cc86de3fc483858dc8cb7b lib/core/settings.py
50+ 8dc42e1cb53bbbac2172f1edd5077597 lib/core/settings.py
51510dfc2ed40adf72e302291f6ecd4406f6 lib/core/shell.py
5252a7edc9250d13af36ac0108f259859c19 lib/core/subprocessng.py
53536306284edcccc185b2df085438572b0d lib/core/target.py
@@ -400,6 +400,7 @@ ef722d062564def381b1f96f5faadee3 waf/baidu.py
4004006a2834daf767491d3331bd31e946d540 waf/binarysec.py
40140141e399dbfe7b904d5aacfb37d85e1fbf waf/blockdos.py
4024022f3bbf43be94d4e9ffe9f80e8483d62f waf/ciscoacexml.py
403+ e70fbe03e1338f3d3a412136b033e3d6 waf/cloudbric.py
40340421b8203fdaaaac3cb7c84fa4dc0627f6 waf/cloudflare.py
404405b16b1c15532103346d5e2f5b8bd1ed36 waf/cloudfront.py
405406ac96f34c254951d301973617064eb1b5 waf/comodo.py
Original file line number Diff line number Diff line change 1+ #!/usr/bin/env python
2+
3+ """
4+ Copyright (c) 2006-2018 sqlmap developers (http://sqlmap.org/)
5+ See the file 'LICENSE' for copying permission
6+ """
7+
8+ import re
9+
10+ from lib .core .enums import HTTP_HEADER
11+ from lib .core .settings import WAF_ATTACK_VECTORS
12+
13+ __product__ = "Cloudbric WAF (Cloudbric)"
14+
15+ def detect (get_page ):
16+ retval = False
17+
18+ for vector in WAF_ATTACK_VECTORS :
19+ page , headers , code = get_page (get = vector )
20+ retval = code >= 400 and all (_ in (page or "" ) for _ in ("Cloudbric" , "Malicious Code Detected" ))
21+
22+ return retval
You can’t perform that action at this time.
0 commit comments