Skip to content

Commit

Permalink
Use print_good when SQL injection is found
Browse files Browse the repository at this point in the history
  • Loading branch information
sinn3r committed May 8, 2012
1 parent fa9d23d commit 91a8ff2
Showing 1 changed file with 3 additions and 6 deletions.
9 changes: 3 additions & 6 deletions modules/auxiliary/scanner/http/error_sql_injection.rb
Expand Up @@ -12,9 +12,6 @@
require 'rex/proto/http'
require 'msf/core'




class Metasploit3 < Msf::Auxiliary

include Msf::Exploit::Remote::HttpClient
Expand Down Expand Up @@ -245,9 +242,9 @@ def run_host(ip)
end

if found
print_status("[#{wmap_target_host}] SQL Injection found. (#{idesc}) (#{datastore['PATH']})")
print_status("[#{wmap_target_host}] Error string: '#{inje}' Test Value: #{qvars[key]}")
print_status("[#{wmap_target_host}] Vuln query parameter: #{key} DB TYPE: #{dbt}, Error type '#{injt}'")
print_good("[#{wmap_target_host}] SQL Injection found. (#{idesc}) (#{datastore['PATH']})")
print_good("[#{wmap_target_host}] Error string: '#{inje}' Test Value: #{qvars[key]}")
print_good("[#{wmap_target_host}] Vuln query parameter: #{key} DB TYPE: #{dbt}, Error type '#{injt}'")

report_web_vuln(
:host => ip,
Expand Down

0 comments on commit 91a8ff2

Please sign in to comment.