Re: [sqlmap-users] ERROR - sqlmap
Brought to you by:
inquisb
From: Miroslav S. <mir...@gm...> - 2010-05-15 20:46:06
|
Hi. Thank you for your report. This was "patched" weeks ago. Please use the latest development version from SVN repository to have it fixed (svn checkout https://svn.sqlmap.org/sqlmap/trunk/sqlmap sqlmap-dev). Kind regards. On Sat, May 15, 2010 at 9:50 PM, Tiago Natel de Moura <tia...@gm... > wrote: > Error when executing this command-line: python sqlmap.py -v5 -u > http://[meu-host]/vuln.asp?id=1 --os-cmd=dir > > Stack: > > [16:47:08] [INFO] retrieved: [16:47:43] [ERROR] unhandled exception in > sqlmap/0.8, please copy the command line and the following text and > send by e-mail to sql...@li.... The developer > will fix it as soon as possible: > sqlmap version: 0.8 > Python version: 2.6.2 > Operating system: linux2 > Traceback (most recent call last): > File "sqlmap.py", line 77, in main > start() > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/controller/controller.py", > line 259, in start > action() > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/controller/action.py", > line 138, in action > conf.dbmsHandler.osCmd() > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/plugins/generic/takeover.py", > line 78, in osCmd > self.runCmd(conf.osCmd) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/abstraction.py", > line 90, in runCmd > output = self.evalCmd(cmd) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/abstraction.py", > line 72, in evalCmd > return self.xpCmdshellEvalCmd(cmd, first, last) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/takeover/xp_cmdshell.py", > line 138, in xpCmdshellEvalCmd > output = inject.getValue("SELECT %s FROM %s" % (self.tblField, > self.cmdTblName), resumeValue=False, sort=False, firstChar=first, > lastChar=last) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", > line 373, in getValue > value = __goInferenceProxy(expression, fromUser, expected, batch, > resumeValue, unpack, charsetType, firstChar, lastChar) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", > line 303, in __goInferenceProxy > outputs = __goInferenceFields(expression, expressionFields, > expressionFieldsList, payload, expected, resumeValue=resumeValue, > charsetType=charsetType, firstChar=firstChar, lastChar=lastChar) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", > line 95, in __goInferenceFields > output = __goInference(payload, expressionReplaced, charsetType, > firstChar, lastChar) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/inject.py", > line 55, in __goInference > count, value = bisection(payload, expression, length, charsetType, > firstChar, lastChar) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/techniques/blind/inference.py", > line 281, in bisection > val = getChar(index, asciiTbl) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/techniques/blind/inference.py", > line 125, in getChar > result = Request.queryPage(forgedPayload) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/connect.py", > line 282, in queryPage > page, headers = Connect.getPage(get=get, post=post, cookie=cookie, > ua=ua, silent=silent) > File > "/home/i4k/programacao/hacking/SQL_Injection/sqlmap/lib/request/connect.py", > line 179, in getPage > page = e.read() > File "/usr/lib/python2.6/socket.py", line 327, in read > data = self._sock.recv(rbufsize) > File "/usr/lib/python2.6/httplib.py", line 537, in read > s = self.fp.read(amt) > File "/usr/lib/python2.6/socket.py", line 351, in read > data = self._sock.recv(left) > timeout: timed out > > > ------------------------------------------------------------------------------ > > _______________________________________________ > sqlmap-users mailing list > sql...@li... > https://lists.sourceforge.net/lists/listinfo/sqlmap-users > -- Miroslav Stampar E-mail / Jabber: miroslav.stampar (at) gmail.com Mobile: +385921010204 (HR 0921010204) PGP Key ID: 0xB5397B1B |