mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2025-12-06 20:51:31 +00:00
Proper comment
This commit is contained in:
@@ -93,6 +93,7 @@ def resume(expression, payload):
|
|||||||
This function can be called to resume part or entire output of a
|
This function can be called to resume part or entire output of a
|
||||||
SQL injection query output.
|
SQL injection query output.
|
||||||
"""
|
"""
|
||||||
|
|
||||||
try:
|
try:
|
||||||
if "sqlmapfile" in expression or "sqlmapoutput" in expression:
|
if "sqlmapfile" in expression or "sqlmapoutput" in expression:
|
||||||
return None
|
return None
|
||||||
@@ -132,11 +133,11 @@ def resume(expression, payload):
|
|||||||
|
|
||||||
return resumedValue
|
return resumedValue
|
||||||
|
|
||||||
# If we called this function without providing a payload it means that
|
# If we called this function without providing a payload it means
|
||||||
# we have called it from lib/request/inject __goInband() function
|
# that we have called it from lib/request/inject __goInband() or
|
||||||
# in UNION query (inband) SQL injection so we return to the calling
|
# from __goError() function so we return to the calling function
|
||||||
# function so that the query output will be retrieved taking advantage
|
# so that the query output will be retrieved taking advantage
|
||||||
# of the inband SQL injection vulnerability.
|
# of either error-based or inband SQL injection vulnerability.
|
||||||
if not payload:
|
if not payload:
|
||||||
return None
|
return None
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user