2010-03-24 00:26:45 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
$Id$
|
|
|
|
|
2010-10-14 18:41:14 +04:00
|
|
|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
|
2010-10-15 03:18:29 +04:00
|
|
|
See the file 'doc/COPYING' for copying permission
|
2010-03-24 00:26:45 +03:00
|
|
|
"""
|
|
|
|
|
|
|
|
import re
|
|
|
|
|
|
|
|
from lib.core.agent import agent
|
|
|
|
from lib.core.common import formatDBMSfp
|
|
|
|
from lib.core.common import formatFingerprint
|
2010-12-21 01:45:01 +03:00
|
|
|
from lib.core.common import getCurrentThreadData
|
2011-01-02 19:51:21 +03:00
|
|
|
from lib.core.common import getErrorParsedDBMSesFormatted
|
2011-01-13 20:36:54 +03:00
|
|
|
from lib.core.common import getIdentifiedDBMS
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.common import randomInt
|
2010-11-02 13:50:57 +03:00
|
|
|
from lib.core.common import randomStr
|
2010-11-16 13:42:42 +03:00
|
|
|
from lib.core.common import wasLastRequestDBMSError
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2010-11-08 12:20:02 +03:00
|
|
|
from lib.core.enums import DBMS
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.session import setDbms
|
|
|
|
from lib.core.settings import ACCESS_ALIASES
|
2010-12-12 01:13:19 +03:00
|
|
|
from lib.core.settings import METADB_SUFFIX
|
2010-12-24 15:13:48 +03:00
|
|
|
from lib.core.threads import getCurrentThreadData
|
2010-12-09 14:23:44 +03:00
|
|
|
from lib.request import inject
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.request.connect import Connect as Request
|
|
|
|
|
|
|
|
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
|
|
|
|
|
|
|
|
class Fingerprint(GenericFingerprint):
|
|
|
|
def __init__(self):
|
2011-01-14 14:55:20 +03:00
|
|
|
GenericFingerprint.__init__(self, DBMS.ACCESS)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
def __sandBoxCheck(self):
|
|
|
|
# Reference: http://milw0rm.com/papers/198
|
|
|
|
retVal = None
|
|
|
|
table = None
|
|
|
|
if kb.dbmsVersion and len(kb.dbmsVersion) > 0:
|
|
|
|
if kb.dbmsVersion[0] in ("97", "2000"):
|
|
|
|
table = "MSysAccessObjects"
|
|
|
|
elif kb.dbmsVersion[0] in ("2002-2003", "2007"):
|
|
|
|
table = "MSysAccessStorage"
|
|
|
|
if table:
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("EXISTS(SELECT CURDIR() FROM %s)" % table)
|
2010-03-24 00:26:45 +03:00
|
|
|
retVal = "not sandboxed" if result else "sandboxed"
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return retVal
|
|
|
|
|
|
|
|
def __sysTablesCheck(self):
|
|
|
|
infoMsg = "executing system table(s) existance fingerprint"
|
|
|
|
logger.info(infoMsg)
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
# Microsoft Access table reference updated on 01/2010
|
|
|
|
sysTables = {
|
|
|
|
"97": ("MSysModules2", "MSysAccessObjects"),
|
|
|
|
"2000" : ("!MSysModules2", "MSysAccessObjects"),
|
|
|
|
"2002-2003" : ("MSysAccessStorage", "!MSysNavPaneObjectIDs"),
|
|
|
|
"2007" : ("MSysAccessStorage", "MSysNavPaneObjectIDs")
|
|
|
|
}
|
|
|
|
# MSysAccessXML is not a reliable system table because it doesn't always exist
|
|
|
|
# ("Access through Access", p6, should be "normally doesn't exist" instead of "is normally empty")
|
|
|
|
|
|
|
|
for version, tables in sysTables.items():
|
|
|
|
exist = True
|
|
|
|
for table in tables:
|
|
|
|
negate = False
|
|
|
|
if table[0] == '!':
|
|
|
|
negate = True
|
|
|
|
table = table[1:]
|
|
|
|
randInt = randomInt()
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("EXISTS(SELECT * FROM %s WHERE %d=%d)" % (table, randInt, randInt))
|
2010-03-30 16:48:51 +04:00
|
|
|
if result is None:
|
|
|
|
result = False
|
2010-03-24 00:26:45 +03:00
|
|
|
if negate:
|
|
|
|
result = not result
|
|
|
|
exist &= result
|
|
|
|
if not exist:
|
|
|
|
break
|
|
|
|
if exist:
|
|
|
|
return version
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2010-11-02 13:50:57 +03:00
|
|
|
def __getDatabaseDir(self):
|
|
|
|
retVal = None
|
|
|
|
|
|
|
|
infoMsg = "searching for database directory"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
|
|
|
randInt = randomInt()
|
|
|
|
randStr = randomStr()
|
2010-12-14 00:33:42 +03:00
|
|
|
_ = inject.checkBooleanExpression("EXISTS(SELECT * FROM %s.%s WHERE %d=%d)" % (randStr, randStr, randInt, randInt))
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-11-16 13:42:42 +03:00
|
|
|
if wasLastRequestDBMSError():
|
2010-12-21 01:45:01 +03:00
|
|
|
threadData = getCurrentThreadData()
|
|
|
|
match = re.search("Could not find file\s+'([^']+?)'", threadData.lastErrorPage[1])
|
2010-11-02 13:50:57 +03:00
|
|
|
|
|
|
|
if match:
|
|
|
|
retVal = match.group(1).rstrip("%s.mdb" % randStr)
|
|
|
|
|
|
|
|
if retVal.endswith('\\'):
|
|
|
|
retVal = retVal[:-1]
|
|
|
|
|
|
|
|
return retVal
|
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
def getFingerprint(self):
|
|
|
|
value = ""
|
|
|
|
wsOsFp = formatFingerprint("web server", kb.headersFp)
|
|
|
|
|
|
|
|
if wsOsFp:
|
|
|
|
value += "%s\n" % wsOsFp
|
|
|
|
|
|
|
|
if kb.data.banner:
|
|
|
|
dbmsOsFp = formatFingerprint("back-end DBMS", kb.bannerFp)
|
|
|
|
|
|
|
|
if dbmsOsFp:
|
|
|
|
value += "%s\n" % dbmsOsFp
|
|
|
|
|
|
|
|
value += "back-end DBMS: "
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
value += "Microsoft Access"
|
|
|
|
return value
|
|
|
|
|
|
|
|
actVer = formatDBMSfp() + " (%s)" % (self.__sandBoxCheck())
|
|
|
|
blank = " " * 15
|
|
|
|
value += "active fingerprint: %s" % actVer
|
|
|
|
|
|
|
|
if kb.bannerFp:
|
|
|
|
banVer = kb.bannerFp["dbmsVersion"]
|
|
|
|
|
|
|
|
if re.search("-log$", kb.data.banner):
|
|
|
|
banVer += ", logging enabled"
|
|
|
|
|
|
|
|
banVer = formatDBMSfp([banVer])
|
|
|
|
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
|
|
|
|
|
2011-01-02 19:51:21 +03:00
|
|
|
htmlErrorFp = getErrorParsedDBMSesFormatted()
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if htmlErrorFp:
|
|
|
|
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
|
|
|
|
|
2010-11-02 13:50:57 +03:00
|
|
|
value += "\ndatabase directory: '%s'" % self.__getDatabaseDir()
|
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return value
|
|
|
|
|
|
|
|
def checkDbms(self):
|
2011-01-13 20:36:54 +03:00
|
|
|
if (getIdentifiedDBMS() is not None and getIdentifiedDBMS().lower() in ACCESS_ALIASES) or conf.dbms in ACCESS_ALIASES:
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms(DBMS.ACCESS)
|
2010-03-31 14:50:47 +04:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
|
|
|
logMsg = "testing Microsoft Access"
|
|
|
|
logger.info(logMsg)
|
|
|
|
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("VAL(CVAR(1))=1")
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if result:
|
|
|
|
logMsg = "confirming Microsoft Access"
|
|
|
|
logger.info(logMsg)
|
|
|
|
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0")
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if not result:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not Microsoft Access"
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
return False
|
|
|
|
|
|
|
|
setDbms("Microsoft Access")
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
kb.dbmsVersion = [self.__sysTablesCheck()]
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return True
|
|
|
|
else:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not Microsoft Access"
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
2010-11-05 02:08:59 +03:00
|
|
|
|
|
|
|
def forceDbmsEnum(self):
|
2010-12-12 01:13:19 +03:00
|
|
|
conf.db = "%s%s" % (DBMS.ACCESS, METADB_SUFFIX)
|