mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 09:57:38 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			62 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			62 lines
		
	
	
		
			2.2 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
#!/usr/bin/env python
 | 
						|
 | 
						|
"""
 | 
						|
$Id$
 | 
						|
 | 
						|
This file is part of the sqlmap project, http://sqlmap.sourceforge.net.
 | 
						|
 | 
						|
Copyright (c) 2007-2010 Bernardo Damele A. G. <bernardo.damele@gmail.com>
 | 
						|
Copyright (c) 2006 Daniele Bellucci <daniele.bellucci@gmail.com>
 | 
						|
 | 
						|
sqlmap is free software; you can redistribute it and/or modify it under
 | 
						|
the terms of the GNU General Public License as published by the Free
 | 
						|
Software Foundation version 2 of the License.
 | 
						|
 | 
						|
sqlmap is distributed in the hope that it will be useful, but WITHOUT ANY
 | 
						|
WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS
 | 
						|
FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more
 | 
						|
details.
 | 
						|
 | 
						|
You should have received a copy of the GNU General Public License along
 | 
						|
with sqlmap; if not, write to the Free Software Foundation, Inc., 51
 | 
						|
Franklin St, Fifth Floor, Boston, MA  02110-1301  USA
 | 
						|
"""
 | 
						|
import re, sre_constants
 | 
						|
from xml.dom import minidom
 | 
						|
 | 
						|
from lib.core.data import paths
 | 
						|
from lib.core.data import logger
 | 
						|
 | 
						|
rules = None
 | 
						|
 | 
						|
def __adjustGrammar(string):
 | 
						|
    string = re.sub('\ADetects', 'Detected', string)
 | 
						|
    string = re.sub('\Afinds', 'Found', string)
 | 
						|
    string = re.sub('attempts\Z', 'attempt', string)
 | 
						|
    string = re.sub('injections\Z', 'injection', string)
 | 
						|
    string = re.sub('attacks\Z', 'attack', string)
 | 
						|
    return string
 | 
						|
 | 
						|
def checkPayload(string):
 | 
						|
    """
 | 
						|
    This method checks if the generated payload is detectable by the PHPIDS filter rules
 | 
						|
    """
 | 
						|
    global rules
 | 
						|
 | 
						|
    if not rules:
 | 
						|
        file = open(paths.DETECTION_RULES_XML, 'r')
 | 
						|
        xmlrules = minidom.parse(file).documentElement
 | 
						|
        file.close()
 | 
						|
        rules = []
 | 
						|
        for xmlrule in xmlrules.getElementsByTagName("filter"):
 | 
						|
            try:
 | 
						|
                rule = re.compile(xmlrule.getElementsByTagName('rule')[0].childNodes[0].nodeValue)
 | 
						|
                desc = __adjustGrammar(xmlrule.getElementsByTagName('description')[0].childNodes[0].nodeValue)
 | 
						|
                rules.append((rule, desc))
 | 
						|
            except sre_constants.error: #some issues with some regex expressions in Python 2.5
 | 
						|
                pass
 | 
						|
    
 | 
						|
    for rule, desc in rules:
 | 
						|
        if rule.search(string, re.IGNORECASE):
 | 
						|
            logger.warn("highly probable IDS/IPS detection: '%s'" % desc)
 |