[sqlmap-users] found another Bug
Brought to you by:
inquisb
From: <nig...@em...> - 2010-12-21 00:08:25
|
sqlmap -u "http://xxxxxxx.xxx/update_thumb.php?e=263&s=6" -a C:\pentest\sqlmap.0.9\txt\user-agents.txt --level 5 --risk 3 -f -b sqlmap/0.9-dev - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net [*] starting at: 00:23:50 [00:23:50] [INFO] fetched random HTTP User-Agent header from file 'C:\pentest\sqlmap.0.9\txt\user-agents.txt': Mozilla/5.0 (Windows NT 5.1; U; en) Opera 8.50 [00:23:50] [INFO] using 'C:\pentest\sqlmap.0.9\output\xxxxxx\session' as session file [00:23:50] [INFO] testing connection to the target url [00:23:51] [INFO] testing if the url is stable, wait a few seconds [00:23:53] [INFO] url is stable many tests [00:34:15] [INFO] GET parameter 's' is 'MySQL > 5.0.11 AND time-based blind' injectable GET parameter 's' is vulnerable. Do you want to keep testing the others? [y/N] y more tests [00:52:02] [INFO] testing 'Firebird AND error-based - WHERE clause' [00:52:02] [CRITICAL] unhandled exception in sqlmap/0.9-dev, retry your run with the latest development version from the Subversio n repository. If the exception persists, please send by e-mail to sql...@li... the command line, the followi ng text and any information needed to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you. sqlmap version: 0.9-dev Python version: 2.6.5 Operating system: nt Traceback (most recent call last): File "C:\pentestsqlmap.0.9\sqlmap.py", line 79, in main start() File "C:\pentest\sqlmap.0.9\lib\controller\controller.py", line 352, in start injection = checkSqlInjection(place, parameter, value) File "C:\pentest\sqlmap.0.9\lib\controller\checks.py", line 165, in checkSqlInjection fstPayload = unescapeDbms(fstPayload, injection, dbms) File "C:\pentest\sqlmap.0.9\lib\controller\checks.py", line 65, in unescapeDbms payload = unescape(payload, dbms) File "C:\pentest\sqlmap.0.9\lib\controller\checks.py", line 53, in unescape return unescaper[dbms](string) File "C:\pentest\sqlmap.0.9\plugins\dbms\firebird\syntax.py", line 21, in unescape if isDBMSVersionAtLeast('2.1'): File "C:\pentest\sqlmap.0.9\lib\core\common.py", line 1752, in isDBMSVersionAtLeast value = float(value.replace(">", "")) + 0.01 ValueError: invalid literal for float(): 5.0.11 [*] shutting down at: 00:52:02 |