56
56
from thirdparty .odict .odict import OrderedDict
57
57
58
58
def _oneShotUnionUse (expression , unpack = True , limited = False ):
59
- retVal = hashDBRetrieve ("%s%s" % (conf .hexConvert or False , expression ), checkConf = True ) # as union data is stored raw unconverted
59
+ retVal = hashDBRetrieve ("%s%s" % (conf .hexConvert or False , expression ), checkConf = True ) # as UNION data is stored raw unconverted
60
60
61
61
threadData = getCurrentThreadData ()
62
62
threadData .resumed = retVal is not None
@@ -65,7 +65,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
65
65
# Prepare expression with delimiters
66
66
injExpression = unescaper .escape (agent .concatQuery (expression , unpack ))
67
67
68
- # Forge the union SQL injection request
68
+ # Forge the UNION SQL injection request
69
69
vector = kb .injection .data [PAYLOAD .TECHNIQUE .UNION ].vector
70
70
kb .unionDuplicates = vector [7 ]
71
71
kb .forcePartialUnion = vector [8 ]
@@ -78,7 +78,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
78
78
79
79
incrementCounter (PAYLOAD .TECHNIQUE .UNION )
80
80
81
- # Parse the returned page to get the exact union -based
81
+ # Parse the returned page to get the exact UNION -based
82
82
# SQL injection output
83
83
def _ (regex ):
84
84
return reduce (lambda x , y : x if x is not None else y , (\
@@ -98,7 +98,7 @@ def _(regex):
98
98
if retVal is not None :
99
99
retVal = getUnicode (retVal , kb .pageEncoding )
100
100
101
- # Special case when DBMS is Microsoft SQL Server and error message is used as a result of union injection
101
+ # Special case when DBMS is Microsoft SQL Server and error message is used as a result of UNION injection
102
102
if Backend .isDbms (DBMS .MSSQL ) and wasLastResponseDBMSError ():
103
103
retVal = htmlunescape (retVal ).replace ("<br>" , "\n " )
104
104
@@ -152,9 +152,9 @@ def _configUnionCols(columns):
152
152
153
153
def unionUse (expression , unpack = True , dump = False ):
154
154
"""
155
- This function tests for an union SQL injection on the target
155
+ This function tests for an UNION SQL injection on the target
156
156
URL then call its subsidiary function to effectively perform an
157
- union SQL injection on the affected URL
157
+ UNION SQL injection on the affected URL
158
158
"""
159
159
160
160
initTechnique (PAYLOAD .TECHNIQUE .UNION )
0 commit comments