2010-03-24 00:26:45 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
2012-07-12 21:38:03 +04:00
|
|
|
Copyright (c) 2006-2012 sqlmap developers (http://sqlmap.org/)
|
2010-10-15 03:18:29 +04:00
|
|
|
See the file 'doc/COPYING' for copying permission
|
2010-03-24 00:26:45 +03:00
|
|
|
"""
|
|
|
|
|
|
|
|
import re
|
|
|
|
|
2011-01-28 19:36:09 +03:00
|
|
|
from lib.core.common import Backend
|
|
|
|
from lib.core.common import Format
|
2010-12-21 01:45:01 +03:00
|
|
|
from lib.core.common import getCurrentThreadData
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.common import randomInt
|
2010-11-02 13:50:57 +03:00
|
|
|
from lib.core.common import randomStr
|
2010-11-16 13:42:42 +03:00
|
|
|
from lib.core.common import wasLastRequestDBMSError
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2010-11-08 12:20:02 +03:00
|
|
|
from lib.core.enums import DBMS
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.session import setDbms
|
|
|
|
from lib.core.settings import ACCESS_ALIASES
|
2010-12-12 01:13:19 +03:00
|
|
|
from lib.core.settings import METADB_SUFFIX
|
2010-12-09 14:23:44 +03:00
|
|
|
from lib.request import inject
|
2010-03-24 00:26:45 +03:00
|
|
|
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
|
|
|
|
|
|
|
|
class Fingerprint(GenericFingerprint):
|
|
|
|
def __init__(self):
|
2011-01-14 14:55:20 +03:00
|
|
|
GenericFingerprint.__init__(self, DBMS.ACCESS)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
def _sandBoxCheck(self):
|
2010-03-24 00:26:45 +03:00
|
|
|
# Reference: http://milw0rm.com/papers/198
|
|
|
|
retVal = None
|
|
|
|
table = None
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2011-01-28 19:36:09 +03:00
|
|
|
if Backend.isVersionWithin(("97", "2000")):
|
2011-01-20 02:06:15 +03:00
|
|
|
table = "MSysAccessObjects"
|
2011-01-28 19:36:09 +03:00
|
|
|
elif Backend.isVersionWithin(("2002-2003", "2007")):
|
2011-01-20 02:06:15 +03:00
|
|
|
table = "MSysAccessStorage"
|
|
|
|
|
|
|
|
if table is not None:
|
|
|
|
result = inject.checkBooleanExpression("EXISTS(SELECT CURDIR() FROM %s)" % table)
|
|
|
|
retVal = "not sandboxed" if result else "sandboxed"
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return retVal
|
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
def _sysTablesCheck(self):
|
2011-05-22 12:24:13 +04:00
|
|
|
infoMsg = "executing system table(s) existence fingerprint"
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.info(infoMsg)
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
# Microsoft Access table reference updated on 01/2010
|
2012-02-22 14:40:11 +04:00
|
|
|
sysTables = {
|
2011-01-20 02:06:15 +03:00
|
|
|
"97": ("MSysModules2", "MSysAccessObjects"),
|
|
|
|
"2000" : ("!MSysModules2", "MSysAccessObjects"),
|
|
|
|
"2002-2003" : ("MSysAccessStorage", "!MSysNavPaneObjectIDs"),
|
2013-01-10 18:02:28 +04:00
|
|
|
"2007" : ("MSysAccessStorage", "MSysNavPaneObjectIDs"),
|
2010-03-24 00:26:45 +03:00
|
|
|
}
|
|
|
|
# MSysAccessXML is not a reliable system table because it doesn't always exist
|
|
|
|
# ("Access through Access", p6, should be "normally doesn't exist" instead of "is normally empty")
|
|
|
|
|
|
|
|
for version, tables in sysTables.items():
|
|
|
|
exist = True
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
for table in tables:
|
|
|
|
negate = False
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if table[0] == '!':
|
|
|
|
negate = True
|
|
|
|
table = table[1:]
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
randInt = randomInt()
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("EXISTS(SELECT * FROM %s WHERE %d=%d)" % (table, randInt, randInt))
|
2010-03-30 16:48:51 +04:00
|
|
|
if result is None:
|
|
|
|
result = False
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if negate:
|
|
|
|
result = not result
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
exist &= result
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if not exist:
|
|
|
|
break
|
2011-01-20 02:06:15 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if exist:
|
|
|
|
return version
|
|
|
|
|
|
|
|
return None
|
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
def _getDatabaseDir(self):
|
2010-11-02 13:50:57 +03:00
|
|
|
retVal = None
|
|
|
|
|
|
|
|
infoMsg = "searching for database directory"
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
|
|
|
randInt = randomInt()
|
|
|
|
randStr = randomStr()
|
2012-12-06 14:15:05 +04:00
|
|
|
inject.checkBooleanExpression("EXISTS(SELECT * FROM %s.%s WHERE %d=%d)" % (randStr, randStr, randInt, randInt))
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-11-16 13:42:42 +03:00
|
|
|
if wasLastRequestDBMSError():
|
2010-12-21 01:45:01 +03:00
|
|
|
threadData = getCurrentThreadData()
|
|
|
|
match = re.search("Could not find file\s+'([^']+?)'", threadData.lastErrorPage[1])
|
2010-11-02 13:50:57 +03:00
|
|
|
|
|
|
|
if match:
|
|
|
|
retVal = match.group(1).rstrip("%s.mdb" % randStr)
|
|
|
|
|
|
|
|
if retVal.endswith('\\'):
|
|
|
|
retVal = retVal[:-1]
|
|
|
|
|
|
|
|
return retVal
|
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
def getFingerprint(self):
|
2011-04-30 17:20:05 +04:00
|
|
|
value = ""
|
2011-01-28 19:36:09 +03:00
|
|
|
wsOsFp = Format.getOs("web server", kb.headersFp)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if wsOsFp:
|
|
|
|
value += "%s\n" % wsOsFp
|
|
|
|
|
|
|
|
if kb.data.banner:
|
2011-01-28 19:36:09 +03:00
|
|
|
dbmsOsFp = Format.getOs("back-end DBMS", kb.bannerFp)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if dbmsOsFp:
|
|
|
|
value += "%s\n" % dbmsOsFp
|
|
|
|
|
2011-04-30 17:20:05 +04:00
|
|
|
value += "back-end DBMS: "
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
2011-01-20 02:06:15 +03:00
|
|
|
value += DBMS.ACCESS
|
2010-03-24 00:26:45 +03:00
|
|
|
return value
|
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
actVer = Format.getDbms() + " (%s)" % (self._sandBoxCheck())
|
2011-04-30 17:20:05 +04:00
|
|
|
blank = " " * 15
|
2010-03-24 00:26:45 +03:00
|
|
|
value += "active fingerprint: %s" % actVer
|
|
|
|
|
|
|
|
if kb.bannerFp:
|
|
|
|
banVer = kb.bannerFp["dbmsVersion"]
|
|
|
|
|
|
|
|
if re.search("-log$", kb.data.banner):
|
|
|
|
banVer += ", logging enabled"
|
|
|
|
|
2011-01-28 19:36:09 +03:00
|
|
|
banVer = Format.getDbms([banVer])
|
2010-03-24 00:26:45 +03:00
|
|
|
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
|
|
|
|
|
2011-01-28 19:36:09 +03:00
|
|
|
htmlErrorFp = Format.getErrorParsedDBMSes()
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if htmlErrorFp:
|
|
|
|
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
|
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
value += "\ndatabase directory: '%s'" % self._getDatabaseDir()
|
2010-11-02 13:50:57 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return value
|
|
|
|
|
|
|
|
def checkDbms(self):
|
2011-01-28 19:36:09 +03:00
|
|
|
if not conf.extensiveFp and (Backend.isDbmsWithin(ACCESS_ALIASES) or conf.dbms in ACCESS_ALIASES):
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms(DBMS.ACCESS)
|
2010-03-31 14:50:47 +04:00
|
|
|
|
2011-01-14 15:47:07 +03:00
|
|
|
return True
|
2010-03-24 00:26:45 +03:00
|
|
|
|
2011-04-30 19:29:59 +04:00
|
|
|
infoMsg = "testing %s" % DBMS.ACCESS
|
|
|
|
logger.info(infoMsg)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("VAL(CVAR(1))=1")
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if result:
|
2011-04-30 19:29:59 +04:00
|
|
|
infoMsg = "confirming %s" % DBMS.ACCESS
|
|
|
|
logger.info(infoMsg)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
2010-12-14 00:33:42 +03:00
|
|
|
result = inject.checkBooleanExpression("IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0")
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
if not result:
|
2011-01-20 02:06:15 +03:00
|
|
|
warnMsg = "the back-end DBMS is not %s" % DBMS.ACCESS
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
return False
|
|
|
|
|
2011-01-20 02:06:15 +03:00
|
|
|
setDbms(DBMS.ACCESS)
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2011-01-20 02:06:15 +03:00
|
|
|
infoMsg = "actively fingerprinting %s" % DBMS.ACCESS
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2012-12-06 17:14:19 +04:00
|
|
|
version = self._sysTablesCheck()
|
2011-01-20 02:06:15 +03:00
|
|
|
|
|
|
|
if version is not None:
|
2011-01-28 19:36:09 +03:00
|
|
|
Backend.setVersion(version)
|
2010-11-02 13:13:36 +03:00
|
|
|
|
2010-03-24 00:26:45 +03:00
|
|
|
return True
|
|
|
|
else:
|
2011-01-20 02:06:15 +03:00
|
|
|
warnMsg = "the back-end DBMS is not %s" % DBMS.ACCESS
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
2010-11-05 02:08:59 +03:00
|
|
|
|
|
|
|
def forceDbmsEnum(self):
|
2011-06-01 00:57:29 +04:00
|
|
|
conf.db = ("%s%s" % (DBMS.ACCESS, METADB_SUFFIX)).replace(' ', '_')
|