Skip to content

Commit fe2042e

Browse files
committed
Fixes #5152
1 parent 54e953d commit fe2042e

File tree

2 files changed

+5
-2
lines changed

2 files changed

+5
-2
lines changed

lib/core/settings.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@
2020
from thirdparty.six import unichr as _unichr
2121

2222
# sqlmap version (<major>.<minor>.<month>.<monthly commit>)
23-
VERSION = "1.6.7.2"
23+
VERSION = "1.6.8.0"
2424
TYPE = "dev" if VERSION.count('.') > 2 and VERSION.split('.')[-1] != '0' else "stable"
2525
TYPE_COLORS = {"dev": 33, "stable": 90, "pip": 34}
2626
VERSION_STRING = "sqlmap/%s#%s" % ('.'.join(VERSION.split('.')[:-1]) if VERSION.count('.') > 2 and VERSION.split('.')[-1] == '0' else VERSION, TYPE)

lib/request/connect.py

Lines changed: 4 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1544,7 +1544,10 @@ def _(value):
15441544
if payload is None:
15451545
value = value.replace(kb.customInjectionMark, "")
15461546
else:
1547-
value = re.sub(r"\w*%s" % re.escape(kb.customInjectionMark), payload, value)
1547+
try:
1548+
value = re.sub(r"\w*%s" % re.escape(kb.customInjectionMark), payload, value)
1549+
except re.error:
1550+
value = re.sub(r"\w*%s" % re.escape(kb.customInjectionMark), re.escape(payload), value)
15481551
return value
15491552
page, headers, code = Connect.getPage(url=_(kb.secondReq[0]), post=_(kb.secondReq[2]), method=kb.secondReq[1], cookie=kb.secondReq[3], silent=silent, auxHeaders=dict(auxHeaders, **dict(kb.secondReq[4])), response=response, raise404=False, ignoreTimeout=timeBasedCompare, refreshing=True)
15501553

0 commit comments

Comments
 (0)