mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2026-02-11 07:56:36 +00:00
Some more fixes and adjustments before 0.6.1 release.
This commit is contained in:
@@ -39,7 +39,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
OptString.new('METHOD', [ true, "HTTP Method", 'GET' ]),
|
||||
OptString.new('PATH', [ true, "The path/file to test for SQL injection", 'index.php' ]),
|
||||
OptString.new('QUERY', [ false, "HTTP GET query", 'id=1' ]),
|
||||
OptString.new('DATA', [ false, "The data string to be sent through POST", '' ]),
|
||||
OptString.new('BODY', [ false, "The data string to be sent through POST", '' ]),
|
||||
OptString.new('OPTS', [ false, "The sqlmap options to use", ' ' ]),
|
||||
OptPath.new('SQLMAP_PATH', [ true, "The sqlmap >= 0.6.1 full path ", '/sqlmap/sqlmap.py' ]),
|
||||
OptBool.new('BATCH', [ true, "Never ask for user input, use the default behaviour", 'true' ])
|
||||
@@ -56,7 +56,7 @@ class Metasploit3 < Msf::Auxiliary
|
||||
return
|
||||
end
|
||||
|
||||
data = datastore['DATA']
|
||||
data = datastore['BODY']
|
||||
method = datastore['METHOD'].upcase
|
||||
|
||||
sqlmap_url = (datastore['SSL'] ? "https" : "http")
|
||||
|
||||
Reference in New Issue
Block a user