mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-23 01:56:36 +03:00
183 lines
7.3 KiB
Python
183 lines
7.3 KiB
Python
#!/usr/bin/env python2
|
|
|
|
"""
|
|
Copyright (c) 2006-2019 sqlmap developers (http://sqlmap.org/)
|
|
See the file 'LICENSE' for copying permission
|
|
"""
|
|
|
|
import io
|
|
import time
|
|
import types
|
|
|
|
from lib.core.data import conf
|
|
from lib.core.data import kb
|
|
from lib.core.data import logger
|
|
from lib.core.common import getHostHeader
|
|
from lib.core.common import getSafeExString
|
|
from lib.core.common import getUnicode
|
|
from lib.core.common import logHTTPTraffic
|
|
from lib.core.common import readInput
|
|
from lib.core.enums import CUSTOM_LOGGING
|
|
from lib.core.enums import HTTP_HEADER
|
|
from lib.core.enums import HTTPMETHOD
|
|
from lib.core.enums import REDIRECTION
|
|
from lib.core.exception import SqlmapConnectionException
|
|
from lib.core.settings import DEFAULT_COOKIE_DELIMITER
|
|
from lib.core.settings import MAX_CONNECTION_CHUNK_SIZE
|
|
from lib.core.settings import MAX_CONNECTION_TOTAL_SIZE
|
|
from lib.core.settings import MAX_SINGLE_URL_REDIRECTIONS
|
|
from lib.core.settings import MAX_TOTAL_REDIRECTIONS
|
|
from lib.core.threads import getCurrentThreadData
|
|
from lib.request.basic import decodePage
|
|
from lib.request.basic import parseResponse
|
|
from thirdparty.six.moves import urllib as _urllib
|
|
|
|
class SmartRedirectHandler(_urllib.request.HTTPRedirectHandler):
|
|
def _get_header_redirect(self, headers):
|
|
retVal = None
|
|
|
|
if headers:
|
|
if "location" in headers:
|
|
retVal = headers.getheaders("location")[0]
|
|
elif "uri" in headers:
|
|
retVal = headers.getheaders("uri")[0]
|
|
|
|
return retVal
|
|
|
|
def _ask_redirect_choice(self, redcode, redurl, method):
|
|
with kb.locks.redirect:
|
|
if kb.redirectChoice is None:
|
|
msg = "sqlmap got a %d redirect to " % redcode
|
|
msg += "'%s'. Do you want to follow? [Y/n] " % redurl
|
|
|
|
kb.redirectChoice = REDIRECTION.YES if readInput(msg, default='Y', boolean=True) else REDIRECTION.NO
|
|
|
|
if kb.redirectChoice == REDIRECTION.YES and method == HTTPMETHOD.POST and kb.resendPostOnRedirect is None:
|
|
msg = "redirect is a result of a "
|
|
msg += "POST request. Do you want to "
|
|
msg += "resend original POST data to a new "
|
|
msg += "location? [%s] " % ("Y/n" if not kb.originalPage else "y/N")
|
|
|
|
kb.resendPostOnRedirect = readInput(msg, default=('Y' if not kb.originalPage else 'N'), boolean=True)
|
|
|
|
if kb.resendPostOnRedirect:
|
|
self.redirect_request = self._redirect_request
|
|
|
|
def _redirect_request(self, req, fp, code, msg, headers, newurl):
|
|
newurl = newurl.replace(' ', '%20')
|
|
return _urllib.request.Request(newurl, data=req.data, headers=req.headers, origin_req_host=req.get_origin_req_host())
|
|
|
|
def http_error_302(self, req, fp, code, msg, headers):
|
|
start = time.time()
|
|
content = None
|
|
redurl = self._get_header_redirect(headers) if not conf.ignoreRedirects else None
|
|
|
|
try:
|
|
content = fp.read(MAX_CONNECTION_TOTAL_SIZE)
|
|
except Exception as ex:
|
|
dbgMsg = "there was a problem while retrieving "
|
|
dbgMsg += "redirect response content ('%s')" % getSafeExString(ex)
|
|
logger.debug(dbgMsg)
|
|
finally:
|
|
if content:
|
|
try: # try to write it back to the read buffer so we could reuse it in further steps
|
|
fp.fp._rbuf.truncate(0)
|
|
fp.fp._rbuf.write(content)
|
|
except:
|
|
pass
|
|
|
|
content = decodePage(content, headers.get(HTTP_HEADER.CONTENT_ENCODING), headers.get(HTTP_HEADER.CONTENT_TYPE))
|
|
|
|
threadData = getCurrentThreadData()
|
|
threadData.lastRedirectMsg = (threadData.lastRequestUID, content)
|
|
|
|
redirectMsg = "HTTP redirect "
|
|
redirectMsg += "[#%d] (%d %s):\r\n" % (threadData.lastRequestUID, code, getUnicode(msg))
|
|
|
|
if headers:
|
|
logHeaders = "\r\n".join("%s: %s" % (getUnicode(key.capitalize() if hasattr(key, "capitalize") else key), getUnicode(value)) for (key, value) in headers.items())
|
|
else:
|
|
logHeaders = ""
|
|
|
|
redirectMsg += logHeaders
|
|
if content:
|
|
redirectMsg += "\r\n\r\n%s" % getUnicode(content[:MAX_CONNECTION_CHUNK_SIZE])
|
|
|
|
logHTTPTraffic(threadData.lastRequestMsg, redirectMsg, start, time.time())
|
|
logger.log(CUSTOM_LOGGING.TRAFFIC_IN, redirectMsg)
|
|
|
|
if redurl:
|
|
try:
|
|
if not _urllib.parse.urlsplit(redurl).netloc:
|
|
redurl = _urllib.parse.urljoin(req.get_full_url(), redurl)
|
|
|
|
self._infinite_loop_check(req)
|
|
self._ask_redirect_choice(code, redurl, req.get_method())
|
|
except ValueError:
|
|
redurl = None
|
|
result = fp
|
|
|
|
if redurl and kb.redirectChoice == REDIRECTION.YES:
|
|
parseResponse(content, headers)
|
|
|
|
req.headers[HTTP_HEADER.HOST] = getHostHeader(redurl)
|
|
if headers and HTTP_HEADER.SET_COOKIE in headers:
|
|
cookies = dict()
|
|
delimiter = conf.cookieDel or DEFAULT_COOKIE_DELIMITER
|
|
last = None
|
|
|
|
for part in req.headers.get(HTTP_HEADER.COOKIE, "").split(delimiter) + headers.getheaders(HTTP_HEADER.SET_COOKIE):
|
|
if '=' in part:
|
|
part = part.strip()
|
|
key, value = part.split('=', 1)
|
|
cookies[key] = value
|
|
last = key
|
|
elif last:
|
|
cookies[last] += "%s%s" % (delimiter, part)
|
|
|
|
req.headers[HTTP_HEADER.COOKIE] = delimiter.join("%s=%s" % (key, cookies[key]) for key in cookies)
|
|
|
|
try:
|
|
result = _urllib.request.HTTPRedirectHandler.http_error_302(self, req, fp, code, msg, headers)
|
|
except _urllib.error.HTTPError as ex:
|
|
result = ex
|
|
|
|
# Dirty hack for http://bugs.python.org/issue15701
|
|
try:
|
|
result.info()
|
|
except AttributeError:
|
|
def _(self):
|
|
return getattr(self, "hdrs") or {}
|
|
result.info = types.MethodType(_, result)
|
|
|
|
if not hasattr(result, "read"):
|
|
def _(self, length=None):
|
|
return ex.msg
|
|
result.read = types.MethodType(_, result)
|
|
|
|
if not getattr(result, "url", None):
|
|
result.url = redurl
|
|
|
|
if not getattr(result, "code", None):
|
|
result.code = 999
|
|
except:
|
|
redurl = None
|
|
result = fp
|
|
fp.read = io.BytesIO("").read
|
|
else:
|
|
result = fp
|
|
|
|
threadData.lastRedirectURL = (threadData.lastRequestUID, redurl)
|
|
|
|
result.redcode = code
|
|
result.redurl = redurl
|
|
return result
|
|
|
|
http_error_301 = http_error_303 = http_error_307 = http_error_302
|
|
|
|
def _infinite_loop_check(self, req):
|
|
if hasattr(req, 'redirect_dict') and (req.redirect_dict.get(req.get_full_url(), 0) >= MAX_SINGLE_URL_REDIRECTIONS or len(req.redirect_dict) >= MAX_TOTAL_REDIRECTIONS):
|
|
errMsg = "infinite redirect loop detected (%s). " % ", ".join(item for item in req.redirect_dict.keys())
|
|
errMsg += "Please check all provided parameters and/or provide missing ones"
|
|
raise SqlmapConnectionException(errMsg)
|