diff --git a/src/core/injections/controller/checks.py b/src/core/injections/controller/checks.py index c3fae15f5e..82d22df7b1 100755 --- a/src/core/injections/controller/checks.py +++ b/src/core/injections/controller/checks.py @@ -73,7 +73,7 @@ def check_waf(url, http_request_method): settings.print_data_to_stdout(settings.print_info_msg(info_msg)) if settings.VERBOSITY_LEVEL >= 1: settings.print_data_to_stdout(settings.print_payload(payload)) - payload = "".join(random.choices(string.ascii_uppercase, k=4)) + "=" + payload + payload = "".join(random.sample(string.ascii_uppercase, k=4)) + "=" + payload if not "?" in url: payload = "?" + payload else: @@ -1997,7 +1997,7 @@ def inappropriate_format(multi_parameters): def check_similarities(all_params): if settings.IS_JSON: try: - _ = "".join(random.choices(string.ascii_uppercase, k=6)) + _ = "".join(random.sample(string.ascii_uppercase, k=6)) all_params = ','.join(all_params) json_data = json.loads(all_params, object_pairs_hook=OrderedDict) all_params = flatten(json_data) diff --git a/src/utils/settings.py b/src/utils/settings.py index 37a6ed3124..d02b314ecd 100755 --- a/src/utils/settings.py +++ b/src/utils/settings.py @@ -262,7 +262,7 @@ def sys_argv_errors(): DESCRIPTION = "The command injection exploiter" AUTHOR = "Anastasios Stasinopoulos" VERSION_NUM = "4.0" -REVISION = "82" +REVISION = "83" STABLE_RELEASE = False VERSION = "v" if STABLE_RELEASE: