Skip to content

Commit

Permalink
1.82b: NULL pointer in is_javascript() fixed.
Browse files Browse the repository at this point in the history
  • Loading branch information
spinkham committed Jan 10, 2011
1 parent a347341 commit 0717375
Show file tree
Hide file tree
Showing 4 changed files with 11 additions and 3 deletions.
5 changes: 5 additions & 0 deletions ChangeLog
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
Version 1.82b:
--------------

- NULL pointer in is_javascript() fixed.

Version 1.81b:
--------------

Expand Down
2 changes: 1 addition & 1 deletion Makefile
Original file line number Diff line number Diff line change
Expand Up @@ -20,7 +20,7 @@
#

PROGNAME = skipfish
VERSION = 1.81b
VERSION = 1.82b

OBJFILES = http_client.c database.c crawler.c analysis.c report.c
INCFILES = alloc-inl.h string-inl.h debug.h types.h http_client.h \
Expand Down
5 changes: 4 additions & 1 deletion analysis.c
Original file line number Diff line number Diff line change
Expand Up @@ -1176,7 +1176,10 @@ static u8 is_javascript(struct http_response* res) {
end = text + strcspn((char*)text, "\r\n");
} else if (text[1] == '*') {
end = (u8*)strstr((char*)text + 2, "*/");
if (end) end += 2;
if (end) end += 2; else {
res->js_type = 1;
return 0;
}
} else {
res->js_type = 1;
return 0;
Expand Down
2 changes: 1 addition & 1 deletion crawler.c
Original file line number Diff line number Diff line change
Expand Up @@ -1184,7 +1184,7 @@ static u8 inject_check7_callback(struct http_request* req,
misc[7] = 9 1 - (or orig 0 0 - -)
If misc[0] == misc[1], but misc[0] != misc[2], probable (numeric) SQL
injection. Ditto for misc[2] == misc[6], but misc[6] != misc[7].
injection. Ditto for misc[1] == misc[6], but misc[6] != misc[7].
If misc[3] != misc[4] and misc[3] != misc[5], probable text SQL
injection.
Expand Down

0 comments on commit 0717375

Please sign in to comment.