From 012581e641d564330314cd285d120917aa0cfd96 Mon Sep 17 00:00:00 2001 From: Swissky Date: Sun, 28 May 2017 20:58:07 +0200 Subject: [PATCH] Bugfix - "POST and POST" now detected as 2 vulns --- indicators.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/indicators.py b/indicators.py index 57e7cf7..a4015ae 100644 --- a/indicators.py +++ b/indicators.py @@ -2,7 +2,7 @@ # -*- coding: utf-8 -*- # /!\ Detection Format (.*)function($vuln)(.*) matched by payload[0]+regex_indicators -regex_indicators = '\((.*?)(\$_GET\[.*\]|\$_FILES\[.*\]|\$_POST\[.*\]|\$_REQUEST\[.*\]|\$_COOKIES\[.*\]|\$_SESSION\[.*\]|\$(?!this|e-)[a-zA-Z0-9_]*)(.*?)\)' +regex_indicators = '\((.*?)(\$_GET\[.*?\]|\$_FILES\[.*?\]|\$_POST\[.*?\]|\$_REQUEST\[.*?\]|\$_COOKIES\[.*?\]|\$_SESSION\[.*?\]|\$(?!this|e-)[a-zA-Z0-9_]*)(.*?)\)' # Function_Name:String, Vulnerability_Name:String, Protection_Function:Array payloads = [