sqlmap/plugins/dbms/access/fingerprint.py

194 lines
5.7 KiB
Python
Raw Normal View History

2019-05-08 13:47:52 +03:00
#!/usr/bin/env python
"""
2023-01-03 01:24:59 +03:00
Copyright (c) 2006-2023 sqlmap developers (https://sqlmap.org/)
2017-10-11 15:50:46 +03:00
See the file 'LICENSE' for copying permission
"""
import re
from lib.core.common import Backend
from lib.core.common import Format
2010-12-21 01:45:01 +03:00
from lib.core.common import getCurrentThreadData
2010-11-02 13:50:57 +03:00
from lib.core.common import randomStr
2013-01-29 23:53:11 +04:00
from lib.core.common import wasLastResponseDBMSError
from lib.core.data import conf
from lib.core.data import kb
from lib.core.data import logger
from lib.core.enums import DBMS
from lib.core.session import setDbms
from lib.core.settings import ACCESS_ALIASES
from lib.core.settings import METADB_SUFFIX
2010-12-09 14:23:44 +03:00
from lib.request import inject
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
class Fingerprint(GenericFingerprint):
def __init__(self):
GenericFingerprint.__init__(self, DBMS.ACCESS)
def _sandBoxCheck(self):
# Reference: http://milw0rm.com/papers/198
retVal = None
table = None
if Backend.isVersionWithin(("97", "2000")):
table = "MSysAccessObjects"
elif Backend.isVersionWithin(("2002-2003", "2007")):
table = "MSysAccessStorage"
if table is not None:
result = inject.checkBooleanExpression("EXISTS(SELECT CURDIR() FROM %s)" % table)
retVal = "not sandboxed" if result else "sandboxed"
2010-11-02 13:50:57 +03:00
return retVal
def _sysTablesCheck(self):
infoMsg = "executing system table(s) existence fingerprint"
logger.info(infoMsg)
2010-11-02 13:50:57 +03:00
# Microsoft Access table reference updated on 01/2010
sysTables = {
"97": ("MSysModules2", "MSysAccessObjects"),
"2000": ("!MSysModules2", "MSysAccessObjects"),
"2002-2003": ("MSysAccessStorage", "!MSysNavPaneObjectIDs"),
"2007": ("MSysAccessStorage", "MSysNavPaneObjectIDs"),
}
# MSysAccessXML is not a reliable system table because it doesn't always exist
# ("Access through Access", p6, should be "normally doesn't exist" instead of "is normally empty")
for version, tables in sysTables.items():
exist = True
for table in tables:
negate = False
if table[0] == '!':
negate = True
table = table[1:]
2013-02-04 18:26:44 +04:00
result = inject.checkBooleanExpression("EXISTS(SELECT * FROM %s WHERE [RANDNUM]=[RANDNUM])" % table)
2010-03-30 16:48:51 +04:00
if result is None:
result = False
if negate:
result = not result
exist &= result
if not exist:
break
if exist:
return version
return None
def _getDatabaseDir(self):
2010-11-02 13:50:57 +03:00
retVal = None
infoMsg = "searching for database directory"
logger.info(infoMsg)
randStr = randomStr()
2013-02-04 18:26:44 +04:00
inject.checkBooleanExpression("EXISTS(SELECT * FROM %s.%s WHERE [RANDNUM]=[RANDNUM])" % (randStr, randStr))
2010-11-02 13:50:57 +03:00
2013-01-29 23:53:11 +04:00
if wasLastResponseDBMSError():
2010-12-21 01:45:01 +03:00
threadData = getCurrentThreadData()
2017-10-31 13:38:09 +03:00
match = re.search(r"Could not find file\s+'([^']+?)'", threadData.lastErrorPage[1])
2010-11-02 13:50:57 +03:00
if match:
retVal = match.group(1).rstrip("%s.mdb" % randStr)
if retVal.endswith('\\'):
retVal = retVal[:-1]
return retVal
def getFingerprint(self):
2011-04-30 17:20:05 +04:00
value = ""
wsOsFp = Format.getOs("web server", kb.headersFp)
if wsOsFp:
value += "%s\n" % wsOsFp
if kb.data.banner:
dbmsOsFp = Format.getOs("back-end DBMS", kb.bannerFp)
if dbmsOsFp:
value += "%s\n" % dbmsOsFp
2011-04-30 17:20:05 +04:00
value += "back-end DBMS: "
if not conf.extensiveFp:
value += DBMS.ACCESS
return value
actVer = Format.getDbms() + " (%s)" % (self._sandBoxCheck())
2011-04-30 17:20:05 +04:00
blank = " " * 15
value += "active fingerprint: %s" % actVer
if kb.bannerFp:
2018-08-25 23:57:49 +03:00
banVer = kb.bannerFp.get("dbmsVersion")
2019-05-22 10:43:10 +03:00
if banVer:
if re.search(r"-log$", kb.data.banner or ""):
banVer += ", logging enabled"
2019-05-22 10:43:10 +03:00
banVer = Format.getDbms([banVer])
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
htmlErrorFp = Format.getErrorParsedDBMSes()
if htmlErrorFp:
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
value += "\ndatabase directory: '%s'" % self._getDatabaseDir()
2010-11-02 13:50:57 +03:00
return value
def checkDbms(self):
2017-03-06 14:53:04 +03:00
if not conf.extensiveFp and Backend.isDbmsWithin(ACCESS_ALIASES):
2010-11-02 14:59:24 +03:00
setDbms(DBMS.ACCESS)
return True
2011-04-30 19:29:59 +04:00
infoMsg = "testing %s" % DBMS.ACCESS
logger.info(infoMsg)
result = inject.checkBooleanExpression("VAL(CVAR(1))=1")
if result:
2011-04-30 19:29:59 +04:00
infoMsg = "confirming %s" % DBMS.ACCESS
logger.info(infoMsg)
result = inject.checkBooleanExpression("IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0")
if not result:
warnMsg = "the back-end DBMS is not %s" % DBMS.ACCESS
logger.warning(warnMsg)
return False
setDbms(DBMS.ACCESS)
2010-11-02 13:13:36 +03:00
if not conf.extensiveFp:
return True
2010-11-02 13:13:36 +03:00
infoMsg = "actively fingerprinting %s" % DBMS.ACCESS
logger.info(infoMsg)
version = self._sysTablesCheck()
if version is not None:
Backend.setVersion(version)
2010-11-02 13:13:36 +03:00
return True
else:
warnMsg = "the back-end DBMS is not %s" % DBMS.ACCESS
logger.warning(warnMsg)
return False
2010-11-05 02:08:59 +03:00
def forceDbmsEnum(self):
2011-06-01 00:57:29 +04:00
conf.db = ("%s%s" % (DBMS.ACCESS, METADB_SUFFIX)).replace(' ', '_')