[sqlmap-users] unhandled exception in sqlmap/0.8
Brought to you by:
inquisb
From: Augusto U. <x2...@gm...> - 2010-07-19 16:05:56
|
sqlmap -u "http://127.0.0.1/dvwa/vulnerabilities/sqli/?id=2&Submit=Submit#" --cookie="security=low; PHPSESSID=igb52eg20l6of28706ll43h364" -v 1 sqlmap/0.8 - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net [*] starting at: 12:03:59 [12:03:59] [INFO] using '/home/XXXX/.sqlmap/output/127.0.0.1/session' as session file [12:03:59] [INFO] resuming match ratio '0.997' from session file [12:03:59] [INFO] resuming injection point 'GET' from session file [12:03:59] [INFO] resuming injection parameter 'id' from session file [12:03:59] [INFO] resuming injection type 'stringsingle' from session file [12:03:59] [INFO] resuming 0 number of parenthesis from session file [12:03:59] [INFO] resuming string match ''' from session file you did not provide any string to match. Do you want to use the resumed string to be matched in page when the query is valid? [Y/n] [12:03:59] [INFO] testing connection to the target url [12:03:59] [INFO] testing for parenthesis on injectable parameter [12:03:59] [INFO] testing MySQL [12:03:59] [INFO] confirming MySQL [12:03:59] [ERROR] unhandled exception in sqlmap/0.8, please copy the command line and the following text and send by e-mail to sql...@li.... The developer will fix it as soon as possible: sqlmap version: 0.8 Python version: 2.6.5 Operating system: linux2 Traceback (most recent call last): File "/usr/bin/sqlmap", line 77, in main start() File "/usr/share/sqlmap/lib/controller/controller.py", line 259, in start action() File "/usr/share/sqlmap/lib/controller/action.py", line 46, in action conf.dbmsHandler = setHandler() File "/usr/share/sqlmap/lib/controller/handler.py", line 64, in setHandler if dbmsHandler.checkDbms(): File "/usr/share/sqlmap/plugins/dbms/mysql.py", line 280, in checkDbms if inject.getValue("SELECT %s FROM information_schema.TABLES LIMIT 0, 1" % randInt, charsetType=2) == randInt: File "/usr/share/sqlmap/lib/request/inject.py", line 373, in getValue value = __goInferenceProxy(expression, fromUser, expected, batch, resumeValue, unpack, charsetType, firstChar, lastChar) File "/usr/share/sqlmap/lib/request/inject.py", line 123, in __goInferenceProxy output = resume(expression, payload) File "/usr/share/sqlmap/lib/utils/resume.py", line 144, in resume substringQuery = queries[kb.dbms].substring KeyError: None |