Skip to content

Commit 12fc944

Browse files
committed
Tamper function(s) refactoring (really no need for returning headers as they are passed by reference)
1 parent 54fbb22 commit 12fc944

36 files changed

Lines changed: 70 additions & 72 deletions

lib/core/agent.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -48,7 +48,7 @@ def payloadDirect(self, query):
4848

4949
if kb.tamperFunctions:
5050
for function in kb.tamperFunctions:
51-
query, _ = function(payload=query, headers=None)
51+
query = function(payload=query)
5252

5353
return query
5454

lib/request/connect.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -587,7 +587,7 @@ def queryPage(value=None, place=None, content=False, getRatioValue=False, silent
587587
if payload:
588588
if kb.tamperFunctions:
589589
for function in kb.tamperFunctions:
590-
payload, auxHeaders = function(payload=payload, headers=auxHeaders)
590+
payload = function(payload=payload, headers=auxHeaders)
591591

592592
value = agent.replacePayload(value, payload)
593593

tamper/apostrophemask.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces apostrophe character with its UTF-8 full width counterpart
1818
@@ -27,4 +27,4 @@ def tamper(payload, headers):
2727
* http://lukasz.pilorz.net/testy/full_width_utf/index.phps
2828
"""
2929

30-
return payload.replace('\'', "%EF%BC%87") if payload else payload, headers
30+
return payload.replace('\'', "%EF%BC%87") if payload else payload

tamper/apostrophenullencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces apostrophe character with its illegal double unicode counterpart
1818
@@ -21,4 +21,4 @@ def tamper(payload, headers):
2121
* Output: AND %00%271%00%27=%00%271%00%27
2222
"""
2323

24-
return payload.replace('\'', "%00%27") if payload else payload, headers
24+
return payload.replace('\'', "%00%27") if payload else payload

tamper/appendnullbyte.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Appends encoded NULL byte character at the end of payload
1818
@@ -31,4 +31,4 @@ def tamper(payload, headers):
3131
Reference: http://projects.webappsec.org/w/page/13246949/Null-Byte-Injection
3232
"""
3333

34-
return "%s%%00" % payload if payload else payload, headers
34+
return "%s%%00" % payload if payload else payload

tamper/base64encode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Base64 all characters in a given payload
2020
@@ -23,4 +23,4 @@ def tamper(payload, headers):
2323
* Output: MScgQU5EIFNMRUVQKDUpIw==
2424
"""
2525

26-
return base64.b64encode(payload) if payload else payload, headers
26+
return base64.b64encode(payload) if payload else payload

tamper/between.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@
1212
def dependencies():
1313
pass
1414

15-
def tamper(payload, headers):
15+
def tamper(payload, headers=None):
1616
"""
1717
Replaces greater than operator ('>') with 'NOT BETWEEN 0 AND #'
1818
@@ -61,4 +61,4 @@ def tamper(payload, headers):
6161

6262
retVal += payload[i]
6363

64-
return retVal, headers
64+
return retVal

tamper/chardoubleencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Double url-encodes all characters in a given payload (not processing
2020
already encoded)
@@ -43,4 +43,4 @@ def tamper(payload, headers):
4343
retVal += '%%25%.2X' % ord(payload[i])
4444
i += 1
4545

46-
return retVal, headers
46+
return retVal

tamper/charencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@
1414
def dependencies():
1515
pass
1616

17-
def tamper(payload, headers):
17+
def tamper(payload, headers=None):
1818
"""
1919
Url-encodes all characters in a given payload (not processing already
2020
encoded)
@@ -50,4 +50,4 @@ def tamper(payload, headers):
5050
retVal += '%%%.2X' % ord(payload[i])
5151
i += 1
5252

53-
return retVal, headers
53+
return retVal

tamper/charunicodeencode.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@
1616
def dependencies():
1717
singleTimeWarnMessage("tamper script '%s' is only meant to be run against ASP or ASP.NET web applications" % os.path.basename(__file__).split(".")[0])
1818

19-
def tamper(payload, headers):
19+
def tamper(payload, headers=None):
2020
"""
2121
Unicode-url-encodes non-encoded characters in a given payload (not
2222
processing already encoded)
@@ -55,4 +55,4 @@ def tamper(payload, headers):
5555
retVal += '%%u%.4X' % ord(payload[i])
5656
i += 1
5757

58-
return retVal, headers
58+
return retVal

0 commit comments

Comments
 (0)