mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-27 03:53:48 +03:00
129 lines
3.8 KiB
Python
129 lines
3.8 KiB
Python
#!/usr/bin/env python
|
|
|
|
"""
|
|
Copyright (c) 2006-2022 sqlmap developers (https://sqlmap.org/)
|
|
See the file 'LICENSE' for copying permission
|
|
"""
|
|
|
|
import re
|
|
|
|
from lib.core.common import Backend
|
|
from lib.core.common import Format
|
|
from lib.core.data import conf
|
|
from lib.core.data import kb
|
|
from lib.core.data import logger
|
|
from lib.core.enums import DBMS
|
|
from lib.core.session import setDbms
|
|
from lib.core.settings import ORACLE_ALIASES
|
|
from lib.request import inject
|
|
from plugins.generic.fingerprint import Fingerprint as GenericFingerprint
|
|
|
|
class Fingerprint(GenericFingerprint):
|
|
def __init__(self):
|
|
GenericFingerprint.__init__(self, DBMS.ORACLE)
|
|
|
|
def getFingerprint(self):
|
|
value = ""
|
|
wsOsFp = Format.getOs("web server", kb.headersFp)
|
|
|
|
if wsOsFp:
|
|
value += "%s\n" % wsOsFp
|
|
|
|
if kb.data.banner:
|
|
dbmsOsFp = Format.getOs("back-end DBMS", kb.bannerFp)
|
|
|
|
if dbmsOsFp:
|
|
value += "%s\n" % dbmsOsFp
|
|
|
|
value += "back-end DBMS: "
|
|
|
|
if not conf.extensiveFp:
|
|
value += DBMS.ORACLE
|
|
return value
|
|
|
|
actVer = Format.getDbms()
|
|
blank = " " * 15
|
|
value += "active fingerprint: %s" % actVer
|
|
|
|
if kb.bannerFp:
|
|
banVer = kb.bannerFp.get("dbmsVersion")
|
|
|
|
if banVer:
|
|
banVer = Format.getDbms([banVer])
|
|
value += "\n%sbanner parsing fingerprint: %s" % (blank, banVer)
|
|
|
|
htmlErrorFp = Format.getErrorParsedDBMSes()
|
|
|
|
if htmlErrorFp:
|
|
value += "\n%shtml error message fingerprint: %s" % (blank, htmlErrorFp)
|
|
|
|
return value
|
|
|
|
def checkDbms(self):
|
|
if not conf.extensiveFp and Backend.isDbmsWithin(ORACLE_ALIASES):
|
|
setDbms(DBMS.ORACLE)
|
|
|
|
self.getBanner()
|
|
|
|
return True
|
|
|
|
infoMsg = "testing %s" % DBMS.ORACLE
|
|
logger.info(infoMsg)
|
|
|
|
# NOTE: SELECT LENGTH(SYSDATE)=LENGTH(SYSDATE) FROM DUAL does
|
|
# not work connecting directly to the Oracle database
|
|
if conf.direct:
|
|
result = True
|
|
else:
|
|
result = inject.checkBooleanExpression("LENGTH(SYSDATE)=LENGTH(SYSDATE)")
|
|
|
|
if result:
|
|
infoMsg = "confirming %s" % DBMS.ORACLE
|
|
logger.info(infoMsg)
|
|
|
|
# NOTE: SELECT NVL(RAWTOHEX([RANDNUM1]),[RANDNUM1])=RAWTOHEX([RANDNUM1]) FROM DUAL does
|
|
# not work connecting directly to the Oracle database
|
|
if conf.direct:
|
|
result = True
|
|
else:
|
|
result = inject.checkBooleanExpression("NVL(RAWTOHEX([RANDNUM1]),[RANDNUM1])=RAWTOHEX([RANDNUM1])")
|
|
|
|
if not result:
|
|
warnMsg = "the back-end DBMS is not %s" % DBMS.ORACLE
|
|
logger.warning(warnMsg)
|
|
|
|
return False
|
|
|
|
setDbms(DBMS.ORACLE)
|
|
|
|
self.getBanner()
|
|
|
|
if not conf.extensiveFp:
|
|
return True
|
|
|
|
infoMsg = "actively fingerprinting %s" % DBMS.ORACLE
|
|
logger.info(infoMsg)
|
|
|
|
# Reference: https://en.wikipedia.org/wiki/Oracle_Database
|
|
for version in ("21c", "19c", "18c", "12c", "11g", "10g", "9i", "8i", "7"):
|
|
number = int(re.search(r"([\d]+)", version).group(1))
|
|
output = inject.checkBooleanExpression("%d=(SELECT SUBSTR((VERSION),1,%d) FROM SYS.PRODUCT_COMPONENT_VERSION WHERE ROWNUM=1)" % (number, 1 if number < 10 else 2))
|
|
|
|
if output:
|
|
Backend.setVersion(version)
|
|
break
|
|
|
|
return True
|
|
else:
|
|
warnMsg = "the back-end DBMS is not %s" % DBMS.ORACLE
|
|
logger.warning(warnMsg)
|
|
|
|
return False
|
|
|
|
def forceDbmsEnum(self):
|
|
if conf.db:
|
|
conf.db = conf.db.upper()
|
|
|
|
if conf.tbl:
|
|
conf.tbl = conf.tbl.upper()
|