mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-07 05:01:30 +00:00
Another update for an Issue #352 and couple of fixes
This commit is contained in:
@@ -16,10 +16,6 @@ def tamper(payload, **kwargs):
|
||||
"""
|
||||
Appends encoded NULL byte character at the end of payload
|
||||
|
||||
Example:
|
||||
* Input: AND 1=1
|
||||
* Output: AND 1=1%00
|
||||
|
||||
Requirement:
|
||||
* Microsoft Access
|
||||
|
||||
@@ -29,6 +25,9 @@ def tamper(payload, **kwargs):
|
||||
also possible
|
||||
|
||||
Reference: http://projects.webappsec.org/w/page/13246949/Null-Byte-Injection
|
||||
|
||||
>>> tamper('1 AND 1=1')
|
||||
'1 AND 1=1%00'
|
||||
"""
|
||||
|
||||
return "%s%%00" % payload if payload else payload
|
||||
|
||||
Reference in New Issue
Block a user