63
63
from lib .core .exception import SqlmapSilentQuitException
64
64
from lib .core .exception import SqlmapUserQuitException
65
65
from lib .core .settings import DEFAULT_GET_POST_DELIMITER
66
- from lib .core .settings import DUMMY_XSS_CHECK_APPENDIX
66
+ from lib .core .settings import DUMMY_NON_SQLI_CHECK_APPENDIX
67
67
from lib .core .settings import FORMAT_EXCEPTION_STRINGS
68
68
from lib .core .settings import HEURISTIC_CHECK_ALPHABET
69
69
from lib .core .settings import SUHOSIN_MAX_VALUE_LENGTH
@@ -919,7 +919,8 @@ def _(page):
919
919
920
920
kb .heuristicMode = True
921
921
922
- value = "%s%s%s" % (randomStr (), DUMMY_XSS_CHECK_APPENDIX , randomStr ())
922
+ randStr1 , randStr2 = randomStr (), randomStr ()
923
+ value = "%s%s%s" % (randStr1 , DUMMY_NON_SQLI_CHECK_APPENDIX , randStr2 )
923
924
payload = "%s%s%s" % (prefix , "'%s" % value , suffix )
924
925
payload = agent .payload (place , parameter , newValue = payload )
925
926
page , _ = Request .queryPage (payload , place , content = True , raise404 = False )
@@ -928,7 +929,12 @@ def _(page):
928
929
929
930
if value in (page or "" ):
930
931
infoMsg = "heuristic (XSS) test shows that %s parameter " % paramType
931
- infoMsg += "'%s' might be vulnerable to XSS attacks" % parameter
932
+ infoMsg += "'%s' might be vulnerable to cross-site scripting attacks" % parameter
933
+ logger .info (infoMsg )
934
+
935
+ if re .search (r"(?i)Failed opening[^\n]+%s" % randStr1 , page or "" ):
936
+ infoMsg = "heuristic (FI) test shows that %s parameter " % paramType
937
+ infoMsg += "'%s' might be vulnerable to file inclusion attacks" % parameter
932
938
logger .info (infoMsg )
933
939
934
940
kb .heuristicMode = False
0 commit comments