On 14 December 2011 15:51, Chris Oakley wrote:
> Hi All
>
> I'm having problems with an injection that I think is real.
>
> It's a standard POST request with one of the parameters of the data sent
> being vulnerable. This all happens in an unauthenticated area of the
> application, so there's no
Hi.
This moment there isn't support for Host header. I won't promise anything
but maybe it will be implemented these days.
Kind regards
On Mon, Dec 12, 2011 at 11:26 PM, A C wrote:
> Hi sqlmap users,
>
> I've successfully used sqlmap to do wonderful things though parameters of
> web applicatio
Hi All
I'm having problems with an injection that I think is real.
It's a standard POST request with one of the parameters of the data sent
being vulnerable. This all happens in an unauthenticated area of the
application, so there's no need to set the cookie value etc.
The injection point was f
Hi Dmitriy.
Thank you for your report. It should be fixed (hopefully) with the latest
commit.
Kind regards
On Wed, Dec 14, 2011 at 3:11 PM, Dmitriy Kononov wrote:
> sqlmap/1.0-dev (r4583) - automatic SQL injection and database takeover
> tool
> http://www.sqlmap.org
>
> [!] legal discla
sqlmap/1.0-dev (r4583) - automatic SQL injection and database takeover
tool
http://www.sqlmap.org
[!] legal disclaimer: usage of sqlmap for attacking targets without prior
mutual consent is illegal. It is the end user's responsibility to obey all
applicable local, state and federal laws. A