From af532dc27a40c50ef81429ac48888c5edee35f32 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Krzysztof=20Zaj=C4=85c?= Date: Wed, 16 Oct 2024 11:18:20 +0200 Subject: [PATCH] . --- artemis/http_requests.py | 2 +- artemis/modules/sql_injection_detector.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/artemis/http_requests.py b/artemis/http_requests.py index 34caf86aa..69ff11cb6 100644 --- a/artemis/http_requests.py +++ b/artemis/http_requests.py @@ -81,7 +81,7 @@ def _request( # https://stackoverflow.com/questions/417142/what-is-the-maximum-length-of-a-url-in-different-browsers # so let's check something lower to make sure our modules aren't exceeding the limit e.g. # when batching parameters for SQL injection check. - assert len(url) < 1600 + assert len(url) < 1600, f"URL too long, has {len(url)} characters" def _internal_request() -> HTTPResponse: headers = copy.copy(HEADERS) diff --git a/artemis/modules/sql_injection_detector.py b/artemis/modules/sql_injection_detector.py index af610b1bb..2ef1920e2 100644 --- a/artemis/modules/sql_injection_detector.py +++ b/artemis/modules/sql_injection_detector.py @@ -167,7 +167,7 @@ def scan(self, urls: List[str], task: Task) -> List[Dict[str, Any]]: # The code below may look complicated and repetitive, but it shows how the scanning logic works. for current_url in urls: - for param_batch in more_itertools.batched(URL_PARAMS, 60): + for param_batch in more_itertools.batched(URL_PARAMS, 50): if self.is_url_with_parameters(current_url): for error_payload in sql_injection_error_payloads: url_with_payload = self.change_url_params(