SIGN IN SIGN UP
sqlmapproject / sqlmap UNCLAIMED

Automatic SQL injection and database takeover tool

36977 0 0 Python
2019-05-08 12:47:52 +02:00
#!/usr/bin/env python
"""
2023-01-02 23:24:59 +01:00
Copyright (c) 2006-2023 sqlmap developers (https://sqlmap.org/)
2017-10-11 14:50:46 +02:00
See the file 'LICENSE' for copying permission
"""
import re
2019-11-30 04:42:38 +01:00
from lib.core.common import Backend
from lib.core.convert import getBytes
from lib.core.data import conf
2019-11-30 04:42:38 +01:00
from lib.core.enums import DBMS
from lib.core.exception import SqlmapUndefinedMethod
2019-05-29 16:42:04 +02:00
class Syntax(object):
"""
This class defines generic syntax functionalities for plugins.
"""
def __init__(self):
pass
@staticmethod
def _escape(expression, quote=True, escaper=None):
retVal = expression
if quote:
2017-04-14 13:08:51 +02:00
for item in re.findall(r"'[^']*'+", expression):
original = item[1:-1]
2019-12-12 14:10:02 +01:00
if original:
if Backend.isDbms(DBMS.SQLITE) and "X%s" % item in expression:
continue
if re.search(r"\[(SLEEPTIME|RAND)", original) is None: # e.g. '[SLEEPTIME]' marker
replacement = escaper(original) if not conf.noEscape else original
if replacement != original:
retVal = retVal.replace(item, replacement)
elif len(original) != len(getBytes(original)) and "n'%s'" % original not in retVal and Backend.getDbms() in (DBMS.MYSQL, DBMS.PGSQL, DBMS.ORACLE, DBMS.MSSQL):
retVal = retVal.replace("'%s'" % original, "n'%s'" % original)
else:
retVal = escaper(expression)
return retVal
@staticmethod
2013-01-18 15:10:34 +00:00
def escape(expression, quote=True):
2011-04-30 13:20:05 +00:00
errMsg = "'escape' method must be defined "
2013-01-18 15:40:37 +01:00
errMsg += "inside the specific DBMS plugin"
raise SqlmapUndefinedMethod(errMsg)