Land #2703, uninit const fix for MSSQL_SQLI
commit
77b036ce5d
|
@ -144,7 +144,7 @@ module Exploit::Remote::MSSQL_SQLI
|
|||
if (datastore['METHOD'] == 'GET')
|
||||
|
||||
unless datastore['GET_PATH'].index("[SQLi]")
|
||||
fail_with(Failure::NoTarget, "The SQL injection parameter was not specified in the GET path")
|
||||
fail_with(::Msf::Module::Failure::NoTarget, "The SQL injection parameter was not specified in the GET path")
|
||||
end
|
||||
|
||||
uri = datastore['GET_PATH'].gsub("[SQLi]", Rex::Text.uri_encode(sqla))
|
||||
|
@ -160,7 +160,7 @@ module Exploit::Remote::MSSQL_SQLI
|
|||
else
|
||||
|
||||
unless datastore['DATA'].index("[SQLi]")
|
||||
fail_with(Failure::NoTarget, "The SQL injection parameter was not specified in the POST data")
|
||||
fail_with(::Msf::Module::Failure::NoTarget, "The SQL injection parameter was not specified in the POST data")
|
||||
end
|
||||
|
||||
post_data = datastore['DATA'].gsub("[SQLi]", Rex::Text.uri_encode(sqla))
|
||||
|
|
Loading…
Reference in New Issue