[sqlmap-users] ERROR - sqlmap
Brought to you by:
inquisb
From: Tiago N. de M. <tia...@gm...> - 2010-05-15 19:51:12
|
Error when executing this command-line: python sqlmap.py -v5 -u http://[meu-host]/vuln.asp?id=1 --os-cmd=dir Stack: [16:47:08] [INFO] retrieved: [16:47:43] [ERROR] unhandled exception in sqlmap/0.8, please copy the command line and the following text and send by e-mail to sql...@li.... The developer will fix it as soon as possible: sqlmap version: 0.8 Python version: 2.6.2 Operating system: linux2 Traceback (most recent call last): File "sqlmap.py", line 77, in main start() File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/controller/controller.py", line 259, in start action() File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/controller/action.py", line 138, in action conf.dbmsHandler.osCmd() File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/plugins/generic/takeover.py", line 78, in osCmd self.runCmd(conf.osCmd) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/abstraction.py", line 90, in runCmd output = self.evalCmd(cmd) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/abstraction.py", line 72, in evalCmd return self.xpCmdshellEvalCmd(cmd, first, last) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/xp_cmdshell.py", line 138, in xpCmdshellEvalCmd output = inject.getValue("SELECT %s FROM %s" % (self.tblField, self.cmdTblName), resumeValue=False, sort=False, firstChar=first, lastChar=last) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", line 373, in getValue value = __goInferenceProxy(expression, fromUser, expected, batch, resumeValue, unpack, charsetType, firstChar, lastChar) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", line 303, in __goInferenceProxy outputs = __goInferenceFields(expression, expressionFields, expressionFieldsList, payload, expected, resumeValue=resumeValue, charsetType=charsetType, firstChar=firstChar, lastChar=lastChar) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", line 95, in __goInferenceFields output = __goInference(payload, expressionReplaced, charsetType, firstChar, lastChar) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", line 55, in __goInference count, value = bisection(payload, expression, length, charsetType, firstChar, lastChar) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/techniques/blind/inference.py", line 281, in bisection val = getChar(index, asciiTbl) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/techniques/blind/inference.py", line 125, in getChar result = Request.queryPage(forgedPayload) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/connect.py", line 282, in queryPage page, headers = Connect.getPage(get=get, post=post, cookie=cookie, ua=ua, silent=silent) File "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/connect.py", line 179, in getPage page = e.read() File "/usr/lib/python2.6/socket.py", line 327, in read data = self._sock.recv(rbufsize) File "/usr/lib/python2.6/httplib.py", line 537, in read s = self.fp.read(amt) File "/usr/lib/python2.6/socket.py", line 351, in read data = self._sock.recv(left) timeout: timed out |