From 2b6b80d7f86651ecc6e647c9016e0a6828a490c5 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Mon, 11 Jul 2011 10:04:19 +0000 Subject: [PATCH] Updated docstring --- tamper/charunicodeencode.py | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/tamper/charunicodeencode.py b/tamper/charunicodeencode.py index c082b78fe..309907859 100644 --- a/tamper/charunicodeencode.py +++ b/tamper/charunicodeencode.py @@ -25,8 +25,14 @@ def tamper(payload): * Input: SELECT FIELD%20FROM TABLE * Output: %u0053%u0045%u004c%u0045%u0043%u0054%u0020%u0046%u0049%u0045%u004c%u0044%u0020%u0046%u0052%u004f%u004d%u0020%u0054%u0041%u0042%u004c%u0045' + Tested against: + * Microsoft SQL Server 2000 + * Microsoft SQL Server 2005 + Notes: - * Does this ever work? + * Useful to bypass weak web application firewalls that do not + unicode url-decode the request before processing it through their + ruleset """ retVal = payload