2010-03-24 00:26:45 +03:00
|
|
|
#!/usr/bin/env python
|
|
|
|
|
|
|
|
"""
|
|
|
|
$Id$
|
|
|
|
|
2010-10-14 18:41:14 +04:00
|
|
|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
|
2010-10-15 03:18:29 +04:00
|
|
|
See the file 'doc/COPYING' for copying permission
|
2010-03-24 00:26:45 +03:00
|
|
|
"""
|
|
|
|
|
|
|
|
from lib.core.agent import agent
|
|
|
|
from lib.core.common import formatDBMSfp
|
|
|
|
from lib.core.common import formatFingerprint
|
|
|
|
from lib.core.common import getHtmlErrorFp
|
|
|
|
from lib.core.data import conf
|
|
|
|
from lib.core.data import kb
|
|
|
|
from lib.core.data import logger
|
2010-11-08 12:20:02 +03:00
|
|
|
from lib.core.enums import DBMS
|
2010-03-24 00:26:45 +03:00
|
|
|
from lib.core.session import setDbms
|
|
|
|
from lib.core.settings import SQLITE_ALIASES
|
|
|
|
from lib.request import inject
|
|
|
|
from lib.request.connect import Connect as Request
|
|
|
|
|
|
|
|
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
|
|
|
|
|
|
|
|
class Fingerprint(GenericFingerprint):
|
|
|
|
def __init__(self):
|
|
|
|
GenericFingerprint.__init__(self)
|
|
|
|
|
|
|
|
def getFingerprint(self):
|
|
|
|
value = ""
|
|
|
|
wsOsFp = formatFingerprint("web server", kb.headersFp)
|
|
|
|
|
|
|
|
if wsOsFp:
|
|
|
|
value += "%s\n" % wsOsFp
|
|
|
|
|
|
|
|
if kb.data.banner:
|
|
|
|
dbmsOsFp = formatFingerprint("back-end DBMS", kb.bannerFp)
|
|
|
|
|
|
|
|
if dbmsOsFp:
|
|
|
|
value += "%s\n" % dbmsOsFp
|
|
|
|
|
|
|
|
value += "back-end DBMS: "
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
2010-11-02 15:08:28 +03:00
|
|
|
value += DBMS.SQLITE
|
2010-03-24 00:26:45 +03:00
|
|
|
return value
|
|
|
|
|
|
|
|
actVer = formatDBMSfp()
|
|
|
|
blank = " " * 15
|
|
|
|
value += "active fingerprint: %s" % actVer
|
|
|
|
|
|
|
|
if kb.bannerFp:
|
|
|
|
banVer = kb.bannerFp["dbmsVersion"]
|
|
|
|
banVer = formatDBMSfp([banVer])
|
|
|
|
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
|
|
|
|
|
|
|
|
htmlErrorFp = getHtmlErrorFp()
|
|
|
|
|
|
|
|
if htmlErrorFp:
|
|
|
|
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
|
|
|
|
|
|
|
|
return value
|
|
|
|
|
|
|
|
def checkDbms(self):
|
|
|
|
"""
|
|
|
|
References for fingerprint:
|
|
|
|
|
|
|
|
* http://www.sqlite.org/lang_corefunc.html
|
|
|
|
* http://www.sqlite.org/cvstrac/wiki?p=LoadableExtensions
|
|
|
|
"""
|
|
|
|
|
|
|
|
if conf.dbms in SQLITE_ALIASES:
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms(DBMS.SQLITE)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
self.getBanner()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
|
|
|
logMsg = "testing SQLite"
|
|
|
|
logger.info(logMsg)
|
|
|
|
|
2010-11-08 00:18:09 +03:00
|
|
|
payload = agent.fullPayload("AND LAST_INSERT_ROWID()=LAST_INSERT_ROWID()")
|
2010-03-24 00:26:45 +03:00
|
|
|
result = Request.queryPage(payload)
|
|
|
|
|
|
|
|
if result:
|
|
|
|
logMsg = "confirming SQLite"
|
|
|
|
logger.info(logMsg)
|
|
|
|
|
2010-11-08 00:18:09 +03:00
|
|
|
payload = agent.fullPayload("AND SQLITE_VERSION()=SQLITE_VERSION()")
|
2010-03-24 00:26:45 +03:00
|
|
|
result = Request.queryPage(payload)
|
|
|
|
|
|
|
|
if not result:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not SQLite"
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
2010-11-02 14:59:24 +03:00
|
|
|
setDbms(DBMS.SQLITE)
|
2010-03-24 00:26:45 +03:00
|
|
|
|
|
|
|
self.getBanner()
|
|
|
|
|
|
|
|
if not conf.extensiveFp:
|
|
|
|
return True
|
|
|
|
|
2010-10-11 17:52:32 +04:00
|
|
|
version = inject.getValue("SELECT SUBSTR((SQLITE_VERSION()), 1, 1)", unpack=False, charsetType=2, suppressOutput=True)
|
2010-03-24 00:26:45 +03:00
|
|
|
kb.dbmsVersion = [ version ]
|
|
|
|
|
|
|
|
return True
|
|
|
|
else:
|
2010-11-12 13:02:02 +03:00
|
|
|
warnMsg = "the back-end DBMS is not SQLite"
|
2010-03-24 00:26:45 +03:00
|
|
|
logger.warn(warnMsg)
|
|
|
|
|
|
|
|
return False
|
|
|
|
|
|
|
|
def forceDbmsEnum(self):
|
2010-11-12 01:26:36 +03:00
|
|
|
conf.db = "SQLite (*)"
|