sqlmap/waf/asm.py

27 lines
956 B
Python
Raw Normal View History

2017-12-13 17:10:15 +03:00
#!/usr/bin/env python
"""
2019-01-05 23:38:52 +03:00
Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/)
2017-12-13 17:10:15 +03:00
See the file 'LICENSE' for copying permission
"""
import re
2017-12-13 17:10:15 +03:00
from lib.core.settings import WAF_ATTACK_VECTORS
__product__ = "Application Security Manager (F5 Networks)"
def detect(get_page):
retval = False
for vector in WAF_ATTACK_VECTORS:
page, headers, code = get_page(get=vector)
2017-12-13 17:10:15 +03:00
retval = "The requested URL was rejected. Please consult with your administrator." in (page or "")
2018-08-30 17:19:31 +03:00
retval |= all(_ in (page or "") for _ in ("This page can't be displayed. Contact support for additional information", "The incident ID is:"))
2019-01-07 17:35:54 +03:00
retval |= re.search(r"(?i)Support.ID", page or "") is not None and re.search(r"\b\d{19}\b", page or "") is not None
2019-01-07 18:06:33 +03:00
retval |= all(_ in (page or "") for _ in ("security.f5aas.com", "Please enable JavaScript to view the page content"))
2017-12-13 17:10:15 +03:00
if retval:
break
return retval