We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
There was an error while loading. Please reload this page.
1 parent b864c46 commit 3f4e9abCopy full SHA for 3f4e9ab
tools/msftidy.rb
@@ -496,18 +496,10 @@ def check_vuln_codes
496
end
497
498
def check_vars_get
499
- test = @source.scan(/(send_request_(cgi|raw)\s*\(\s*\{?\s*['"]uri['"]\s*=>\s*[^=})]*?\?[^,})]+)/im)
+ test = @source.scan(/send_request_cgi\s*\(\s*\{?\s*['"]uri['"]\s*=>\s*[^=})]*?\?[^,})]+/im)
500
unless test.empty?
501
test.each { |item|
502
- case item[1]
503
- when 'cgi'
504
- info("Please use vars_get in send_request_cgi: #{item[0]}")
505
- when 'raw'
506
- # send_request_raw does not support vars_get
507
- info("Please use vars_get and switch to send_request_cgi: #{item[0]}")
508
- else
509
- raise('Error in regex')
510
- end
+ info("Please use vars_get in send_request_cgi: #{item}")
511
}
512
513
0 commit comments