sqlmapproject / sqlmap

Automatic SQL injection and database takeover tool
http://sqlmap.org
Other
32.52k stars 5.72k forks source link

Unhandled exception (#c646f913) #2131

Closed sqlmapreporter closed 8 years ago

sqlmapreporter commented 8 years ago
sqlmap version: 1.0-dev-nongit-201608240a89
Python version: 2.7.11
Operating system: posix
Command line: /usr/bin/sqlmap -r /****/1.txt --level 5 --risk 3 -D ***** --tables
Technique: TIME
Back-end DBMS: HSQLDB (fingerprinted)
Traceback (most recent call last):
  File "sqlmap", line 110, in main
    start()
  File "share/sqlmap/lib/controller/controller.py", line 522, in start
    injection = checkSqlInjection(place, parameter, value)
  File "share/sqlmap/lib/controller/checks.py", line 685, in checkSqlInjection
    injection = checkFalsePositives(injection)
  File "share/sqlmap/lib/controller/checks.py", line 762, in checkFalsePositives
    if not checkBooleanExpression("%d=%d" % (randInt1, randInt1)):
  File "share/sqlmap/lib/request/inject.py", line 490, in checkBooleanExpression
    return getValue(expression, expected=EXPECTED.BOOL, charsetType=CHARSET_TYPE.BINARY, suppressOutput=True, expectingNone=expectingNone)
  File "share/sqlmap/lib/request/inject.py", line 441, in getValue
    value = _goBooleanProxy(booleanExpression)
  File "share/sqlmap/lib/request/inject.py", line 313, in _goBooleanProxy
    output = hashDBRetrieve(expression, checkConf=True)
  File "share/sqlmap/lib/core/common.py", line 3854, in hashDBRetrieve
    retVal = conf.hashDB.retrieve(_, unserialize) if kb.resumeValues and not (checkConf and any((conf.flushSession, conf.freshQueries))) else None
  File "share/sqlmap/lib/utils/hashdb.py", line 79, in retrieve
    for row in self.cursor.execute("SELECT value FROM storage WHERE id=?", (hash_,)):
OperationalError: no such table: storage
ogrodev commented 8 years ago

Version outdated... Download the new one or clone the repo.