--- powerfuzzer/powerfuzzer.py 2008-06-27 18:13:32.000000000 -0400 +++ powerfuzzer.hacked/powerfuzzer.py 2008-09-04 11:59:35.000000000 -0400 @@ -376,6 +376,8 @@ def attackInjection(self,page,dict): payload="\xbf'\"(" + # To avoid decoding when concatenated with the payload + page = isinstance(page, unicode) and page.encode() or page if dict=={}: err="" url=page+"?"+payload @@ -1417,11 +1419,17 @@ def write_to_box(self,msg): #print msg+"\n" #wx.Yield() + + # We don't want to attempt to render the payload, so use the + # canonical string representation of the message instead. + msg = isinstance(msg, unicode) and repr(msg)[2:-1] or repr(msg)[1:-1] + self.rtc.Freeze() self.rtc.BeginSuppressUndo() self.rtc.BeginTextColour((0, 0, 255)) self.rtc.WriteText(msg) + self.rtc.EndTextColour() self.rtc.Newline() @@ -1433,6 +1441,11 @@ def write_to_box_vuln(self,msg): #print msg+"\n" #wx.Yield() + + # We don't want to attempt to render the payload, so use the + # canonical string representation of the message instead. + msg = isinstance(msg, unicode) and repr(msg)[2:-1] or repr(msg)[1:-1] + self.rtc.Freeze() self.rtc.BeginSuppressUndo() @@ -1454,7 +1467,7 @@ self.rtc.BeginTextColour((0, 255, 0)) for x in dic.keys(): - self.rtc.WriteText("'"+x+"' => '"+dic[x]+"' ") + self.rtc.WriteText("%s => %s " % (repr(x), repr(dic[x]))) self.rtc.Newline() self.rtc.EndTextColour()