Skip to content

Commit 42a8234

Browse files
committed
Update for an Issue sqlmapproject#12
1 parent 79fca8e commit 42a8234

36 files changed

+36
-36
lines changed

lib/core/option.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -835,7 +835,7 @@ def __setTamperingFunctions():
835835
priority = PRIORITY.NORMAL if not hasattr(module, '__priority__') else module.__priority__
836836

837837
for name, function in inspect.getmembers(module, inspect.isfunction):
838-
if name == "tamper" and function.func_code.co_argcount == 2:
838+
if name == "tamper":
839839
found = True
840840
kb.tamperFunctions.append(function)
841841
function.func_name = module.__name__

tamper/apostrophemask.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers=None):
15+
def tamper(payload, **kwargs):
1616
"""
1717
Replaces apostrophe character with its UTF-8 full width counterpart
1818

tamper/apostrophenullencode.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers=None):
15+
def tamper(payload, **kwargs):
1616
"""
1717
Replaces apostrophe character with its illegal double unicode counterpart
1818

tamper/appendnullbyte.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers=None):
15+
def tamper(payload, **kwargs):
1616
"""
1717
Appends encoded NULL byte character at the end of payload
1818

tamper/base64encode.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers=None):
17+
def tamper(payload, **kwargs):
1818
"""
1919
Base64 all characters in a given payload
2020

tamper/between.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers=None):
17+
def tamper(payload, **kwargs):
1818
"""
1919
Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #'
2020

tamper/bluecoat.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@
1717
def dependencies():
1818
pass
1919

20-
def tamper(payload, headers=None):
20+
def tamper(payload, **kwargs):
2121
"""
2222
Replaces space character after SQL statement with a valid random blank character.
2323
Afterwards replace character = with LIKE operator

tamper/chardoubleencode.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers=None):
17+
def tamper(payload, **kwargs):
1818
"""
1919
Double url-encodes all characters in a given payload (not processing
2020
already encoded)

tamper/charencode.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers=None):
17+
def tamper(payload, **kwargs):
1818
"""
1919
Url-encodes all characters in a given payload (not processing already
2020
encoded)

tamper/charunicodeencode.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
def dependencies():
1717
singleTimeWarnMessage("tamper script '%s' is only meant to be run against ASP or ASP.NET web applications" % os.path.basename(__file__).split(".")[0])
1818

19-
def tamper(payload, headers=None):
19+
def tamper(payload, **kwargs):
2020
"""
2121
Unicode-url-encodes non-encoded characters in a given payload (not
2222
processing already encoded)

0 commit comments

Comments
 (0)