From 47edf134a25e31446ea7d6c8f244bcdd62194637 Mon Sep 17 00:00:00 2001 From: Infected Drake Date: Mon, 11 Feb 2019 15:21:27 +0530 Subject: [PATCH] Create new detection script for WTS Firewall. (#3488) --- waf/wts.py | 25 +++++++++++++++++++++++++ 1 file changed, 25 insertions(+) create mode 100644 waf/wts.py diff --git a/waf/wts.py b/waf/wts.py new file mode 100644 index 000000000..a68d09ead --- /dev/null +++ b/waf/wts.py @@ -0,0 +1,25 @@ +#!/usr/bin/env python + +""" +Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/) +See the file 'LICENSE' for copying permission +""" + +import re + +from lib.core.enums import HTTP_HEADER +from lib.core.settings import WAF_ATTACK_VECTORS + +__product__ = "WTS Web Application Firewall" + +def detect(get_page): + retval = False + + for vector in WAF_ATTACK_VECTORS: + page, headers, _ = get_page(get=vector) + retval = re.search(r"wts(.*)?", headers.get(HTTP_HEADER.SERVER, ""), re.I) is not None + retval |= all(_ in (page or "") for _ in ("WTS.WAF", "<h1>WTS-WAF")) + if retval: + break + + return retval