mirror of
https://github.com/nmap/nmap.git
synced 2025-12-14 03:39:02 +00:00
Remove script ids. Scripts are identified by file name in output (just the
basename without ".nse", or the full path with debugging level 2 or higher). This includes documentation changes in scripting.xml.
This commit is contained in:
@@ -1,4 +1,3 @@
|
||||
id = "sql-inject"
|
||||
description = [[
|
||||
Spiders an HTTP server looking for URLs containing queries vulnerable to an SQL
|
||||
injection attack.
|
||||
@@ -54,7 +53,7 @@ local function get_page(host, port, httpurl)
|
||||
try(soc:connect(host.ip, port.number))
|
||||
|
||||
httpurl = string.gsub(httpurl, "&", "&")
|
||||
--print(id .. ": " .. httpurl)
|
||||
--print(filename .. ": " .. httpurl)
|
||||
|
||||
-- request page
|
||||
local query = strbuf.new()
|
||||
@@ -232,7 +231,7 @@ action = function(host, port)
|
||||
end
|
||||
|
||||
if #injectable > 0 then
|
||||
stdnse.print_debug(1, "%s: Testing %d suspicious URLs", id, #injectable )
|
||||
stdnse.print_debug(1, "%s: Testing %d suspicious URLs", filename, #injectable )
|
||||
end
|
||||
|
||||
-- test all potentially vulnerable queries
|
||||
|
||||
Reference in New Issue
Block a user