Skip to content

Commit 410df45

Browse files
committed
Minor consistency patch
1 parent d7cdb6c commit 410df45

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

lib/techniques/union/use.py

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -56,7 +56,7 @@
5656
from thirdparty.odict.odict import OrderedDict
5757

5858
def _oneShotUnionUse(expression, unpack=True, limited=False):
59-
retVal = hashDBRetrieve("%s%s" % (conf.hexConvert or False, expression), checkConf=True) # as union data is stored raw unconverted
59+
retVal = hashDBRetrieve("%s%s" % (conf.hexConvert or False, expression), checkConf=True) # as UNION data is stored raw unconverted
6060

6161
threadData = getCurrentThreadData()
6262
threadData.resumed = retVal is not None
@@ -65,7 +65,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
6565
# Prepare expression with delimiters
6666
injExpression = unescaper.escape(agent.concatQuery(expression, unpack))
6767

68-
# Forge the union SQL injection request
68+
# Forge the UNION SQL injection request
6969
vector = kb.injection.data[PAYLOAD.TECHNIQUE.UNION].vector
7070
kb.unionDuplicates = vector[7]
7171
kb.forcePartialUnion = vector[8]
@@ -78,7 +78,7 @@ def _oneShotUnionUse(expression, unpack=True, limited=False):
7878

7979
incrementCounter(PAYLOAD.TECHNIQUE.UNION)
8080

81-
# Parse the returned page to get the exact union-based
81+
# Parse the returned page to get the exact UNION-based
8282
# SQL injection output
8383
def _(regex):
8484
return reduce(lambda x, y: x if x is not None else y, (\
@@ -98,7 +98,7 @@ def _(regex):
9898
if retVal is not None:
9999
retVal = getUnicode(retVal, kb.pageEncoding)
100100

101-
# Special case when DBMS is Microsoft SQL Server and error message is used as a result of union injection
101+
# Special case when DBMS is Microsoft SQL Server and error message is used as a result of UNION injection
102102
if Backend.isDbms(DBMS.MSSQL) and wasLastResponseDBMSError():
103103
retVal = htmlunescape(retVal).replace("<br>", "\n")
104104

@@ -152,9 +152,9 @@ def _configUnionCols(columns):
152152

153153
def unionUse(expression, unpack=True, dump=False):
154154
"""
155-
This function tests for an union SQL injection on the target
155+
This function tests for an UNION SQL injection on the target
156156
URL then call its subsidiary function to effectively perform an
157-
union SQL injection on the affected URL
157+
UNION SQL injection on the affected URL
158158
"""
159159

160160
initTechnique(PAYLOAD.TECHNIQUE.UNION)

0 commit comments

Comments
 (0)