From 0d66f101da1fb238f23da84305441a087e5bc21a Mon Sep 17 00:00:00 2001 From: Miroslav Stampar Date: Fri, 12 Nov 2010 22:29:33 +0000 Subject: [PATCH] fix for a bug reported by Bugtrace (--string "pengcheng_cui" and "Warning: mysql_fetch_array(): supplied argument is not a valid MySQL result resource" on False pages) --- lib/controller/checks.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/lib/controller/checks.py b/lib/controller/checks.py index c2f028573..04183db1d 100644 --- a/lib/controller/checks.py +++ b/lib/controller/checks.py @@ -81,7 +81,7 @@ def checkSqlInjection(place, parameter, value, parenthesis): payload = agent.payload(place, parameter, value, positive.format % eval(positive.params)) trueResult = Request.queryPage(payload, place) - if trueResult is True: + if trueResult: infoMsg = "confirming %s (%s) injection " % (case.desc, logic) infoMsg += "on %s parameter '%s'" % (place, parameter) logger.info(infoMsg) @@ -93,7 +93,7 @@ def checkSqlInjection(place, parameter, value, parenthesis): falseResult = Request.queryPage(payload, place) - if falseResult is False: + if not falseResult: infoMsg = "%s parameter '%s' is %s (%s) injectable " % (place, parameter, case.desc, logic) infoMsg += "with %d parenthesis" % parenthesis logger.info(infoMsg)