mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-23 01:56:36 +03:00
617 lines
25 KiB
Python
617 lines
25 KiB
Python
#!/usr/bin/env python
|
|
|
|
"""
|
|
$Id$
|
|
|
|
Copyright (c) 2006-2011 sqlmap developers (http://www.sqlmap.org/)
|
|
See the file 'doc/COPYING' for copying permission
|
|
"""
|
|
|
|
import os
|
|
import re
|
|
|
|
from lib.controller.action import action
|
|
from lib.controller.checks import checkSqlInjection
|
|
from lib.controller.checks import checkDynParam
|
|
from lib.controller.checks import checkStability
|
|
from lib.controller.checks import checkString
|
|
from lib.controller.checks import checkRegexp
|
|
from lib.controller.checks import checkConnection
|
|
from lib.controller.checks import checkNullConnection
|
|
from lib.controller.checks import checkWaf
|
|
from lib.controller.checks import heuristicCheckSqlInjection
|
|
from lib.controller.checks import simpletonCheckSqlInjection
|
|
from lib.core.agent import agent
|
|
from lib.core.common import extractRegexResult
|
|
from lib.core.common import getFilteredPageContent
|
|
from lib.core.common import getPublicTypeMembers
|
|
from lib.core.common import getUnicode
|
|
from lib.core.common import intersect
|
|
from lib.core.common import paramToDict
|
|
from lib.core.common import parseTargetUrl
|
|
from lib.core.common import randomStr
|
|
from lib.core.common import readInput
|
|
from lib.core.common import showHttpErrorCodes
|
|
from lib.core.convert import urlencode
|
|
from lib.core.convert import urldecode
|
|
from lib.core.data import conf
|
|
from lib.core.data import kb
|
|
from lib.core.data import logger
|
|
from lib.core.enums import HTTPMETHOD
|
|
from lib.core.enums import PAYLOAD
|
|
from lib.core.enums import PLACE
|
|
from lib.core.exception import exceptionsTuple
|
|
from lib.core.exception import sqlmapNoneDataException
|
|
from lib.core.exception import sqlmapNotVulnerableException
|
|
from lib.core.exception import sqlmapSilentQuitException
|
|
from lib.core.exception import sqlmapValueException
|
|
from lib.core.exception import sqlmapUserQuitException
|
|
from lib.core.session import setInjection
|
|
from lib.core.settings import EMPTY_FORM_FIELDS_REGEX
|
|
from lib.core.settings import IGNORE_PARAMETERS
|
|
from lib.core.settings import LOW_TEXT_PERCENT
|
|
from lib.core.settings import REFERER_ALIASES
|
|
from lib.core.settings import USER_AGENT_ALIASES
|
|
from lib.core.target import initTargetEnv
|
|
from lib.core.target import setupTargetEnv
|
|
from extra.pagerank.pagerank import get_pagerank
|
|
|
|
def __selectInjection():
|
|
"""
|
|
Selection function for injection place, parameters and type.
|
|
"""
|
|
|
|
points = {}
|
|
|
|
for injection in kb.injections:
|
|
place = injection.place
|
|
parameter = injection.parameter
|
|
ptype = injection.ptype
|
|
|
|
point = (place, parameter, ptype)
|
|
|
|
if point not in points:
|
|
points[point] = injection
|
|
else:
|
|
for key in points[point].keys():
|
|
if key != 'data':
|
|
points[point][key] = points[point][key] or injection[key]
|
|
points[point]['data'].update(injection['data'])
|
|
|
|
if len(points) == 1:
|
|
kb.injection = kb.injections[0]
|
|
|
|
elif len(points) > 1:
|
|
message = "there were multiple injection points, please select "
|
|
message += "the one to use for following injections:\n"
|
|
|
|
points = []
|
|
|
|
for i in xrange(0, len(kb.injections)):
|
|
place = kb.injections[i].place
|
|
parameter = kb.injections[i].parameter
|
|
ptype = kb.injections[i].ptype
|
|
point = (place, parameter, ptype)
|
|
|
|
if point not in points:
|
|
points.append(point)
|
|
ptype = PAYLOAD.PARAMETER[ptype] if isinstance(ptype, int) else ptype
|
|
|
|
message += "[%d] place: %s, parameter: " % (i, place)
|
|
message += "%s, type: %s" % (parameter, ptype)
|
|
|
|
if i == 0:
|
|
message += " (default)"
|
|
|
|
message += "\n"
|
|
|
|
message += "[q] Quit"
|
|
select = readInput(message, default="0")
|
|
|
|
if select.isdigit() and int(select) < len(kb.injections) and int(select) >= 0:
|
|
index = int(select)
|
|
elif select[0] in ( "Q", "q" ):
|
|
raise sqlmapUserQuitException
|
|
else:
|
|
errMsg = "invalid choice"
|
|
raise sqlmapValueException, errMsg
|
|
|
|
kb.injection = kb.injections[index]
|
|
|
|
def __formatInjection(inj):
|
|
data = "Place: %s\n" % inj.place
|
|
data += "Parameter: %s\n" % inj.parameter
|
|
|
|
for stype, sdata in inj.data.items():
|
|
title = sdata.title
|
|
if stype == PAYLOAD.TECHNIQUE.UNION:
|
|
count = re.sub(r"\(.+\)", "", sdata.payload).count(",") + 1
|
|
title = re.sub(r"\d+ to \d+", str(count), title)
|
|
if count == 1:
|
|
title = title.replace("columns", "column")
|
|
data += " Type: %s\n" % PAYLOAD.SQLINJECTION[stype]
|
|
data += " Title: %s\n" % title
|
|
data += " Payload: %s\n\n" % sdata.payload
|
|
|
|
return data
|
|
|
|
def __showInjections():
|
|
header = "sqlmap identified the following injection points with "
|
|
header += "a total of %d HTTP(s) requests" % kb.testQueryCount
|
|
|
|
data = "".join(set(map(lambda x: __formatInjection(x), kb.injections))).rstrip("\n")
|
|
|
|
conf.dumper.technic(header, data)
|
|
|
|
if conf.tamper:
|
|
infoMsg = "changes made by tampering scripts are not "
|
|
infoMsg += "included in shown payload content(s)"
|
|
logger.info(infoMsg)
|
|
|
|
def __randomFillBlankFields(value):
|
|
retVal = value
|
|
|
|
if extractRegexResult(EMPTY_FORM_FIELDS_REGEX, value):
|
|
message = "do you want to fill blank fields with random values? [Y/n] "
|
|
test = readInput(message, default="Y")
|
|
if not test or test[0] in ("y", "Y"):
|
|
while extractRegexResult(EMPTY_FORM_FIELDS_REGEX, retVal):
|
|
item = extractRegexResult(EMPTY_FORM_FIELDS_REGEX, retVal)
|
|
if item[-1] == '&':
|
|
retVal = retVal.replace(item, "%s%s&" % (item[:-1], randomStr()))
|
|
else:
|
|
retVal = retVal.replace(item, "%s%s" % (item, randomStr()))
|
|
|
|
return retVal
|
|
|
|
def __saveToSessionFile():
|
|
for inj in kb.injections:
|
|
if inj.place is None or inj.parameter is None:
|
|
continue
|
|
|
|
setInjection(inj)
|
|
|
|
def __saveToResultsFile():
|
|
if not conf.resultsFP:
|
|
return
|
|
|
|
found = False
|
|
results = {}
|
|
techniques = dict(map(lambda x: (x[1], x[0]), getPublicTypeMembers(PAYLOAD.TECHNIQUE)))
|
|
|
|
for inj in kb.injections:
|
|
if inj.place is None or inj.parameter is None:
|
|
continue
|
|
|
|
key = (inj.place, inj.parameter)
|
|
if key not in results:
|
|
results[key] = []
|
|
|
|
results[key].extend(inj.data.keys())
|
|
|
|
for key, value in results.items():
|
|
place, parameter = key
|
|
line = "%s,%s,%s,%s%s" % (conf.url, place, parameter, "".join(map(lambda x: techniques[x][0].upper(), sorted(value))), os.linesep)
|
|
conf.resultsFP.writelines(line)
|
|
|
|
if not results:
|
|
line = "%s,,,%s" % (conf.url, os.linesep)
|
|
conf.resultsFP.writelines(line)
|
|
|
|
def start():
|
|
"""
|
|
This function calls a function that performs checks on both URL
|
|
stability and all GET, POST, Cookie and User-Agent parameters to
|
|
check if they are dynamic and SQL injection affected
|
|
"""
|
|
|
|
if not conf.start:
|
|
return False
|
|
|
|
if conf.direct:
|
|
initTargetEnv()
|
|
setupTargetEnv()
|
|
action()
|
|
return True
|
|
|
|
if conf.url and not any([conf.forms, conf.crawlDepth]):
|
|
kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie ))
|
|
|
|
if conf.configFile and not kb.targetUrls:
|
|
errMsg = "you did not edit the configuration file properly, set "
|
|
errMsg += "the target url, list of targets or google dork"
|
|
logger.error(errMsg)
|
|
return False
|
|
|
|
if kb.targetUrls and len(kb.targetUrls) > 1:
|
|
infoMsg = "sqlmap got a total of %d targets" % len(kb.targetUrls)
|
|
logger.info(infoMsg)
|
|
|
|
hostCount = 0
|
|
cookieStr = ""
|
|
setCookieAsInjectable = True
|
|
|
|
for targetUrl, targetMethod, targetData, targetCookie in kb.targetUrls:
|
|
try:
|
|
conf.url = targetUrl
|
|
conf.method = targetMethod
|
|
conf.data = targetData
|
|
conf.cookie = targetCookie
|
|
|
|
initTargetEnv()
|
|
parseTargetUrl()
|
|
|
|
testSqlInj = False
|
|
|
|
if PLACE.GET in conf.parameters and not any([conf.data, conf.testParameter]):
|
|
for parameter in re.findall(r"([^=]+)=([^%s]+%s?|\Z)" % (conf.pDel or ";", conf.pDel or ";"), conf.parameters[PLACE.GET]):
|
|
paramKey = (conf.hostname, conf.path, PLACE.GET, parameter[0])
|
|
|
|
if paramKey not in kb.testedParams:
|
|
testSqlInj = True
|
|
break
|
|
else:
|
|
paramKey = (conf.hostname, conf.path, None, None)
|
|
if paramKey not in kb.testedParams:
|
|
testSqlInj = True
|
|
|
|
testSqlInj &= (conf.hostname, conf.path, None, None) not in kb.testedParams
|
|
|
|
if not testSqlInj:
|
|
infoMsg = "skipping '%s'" % targetUrl
|
|
logger.info(infoMsg)
|
|
continue
|
|
|
|
if conf.multipleTargets:
|
|
hostCount += 1
|
|
|
|
if conf.forms:
|
|
message = "[#%d] form:\n%s %s" % (hostCount, conf.method or HTTPMETHOD.GET, targetUrl)
|
|
else:
|
|
message = "url %d:\n%s %s%s" % (hostCount, conf.method or HTTPMETHOD.GET, targetUrl, " (PageRank: %s)" % get_pagerank(targetUrl) if conf.googleDork and conf.pageRank else "")
|
|
|
|
if conf.cookie:
|
|
message += "\nCookie: %s" % conf.cookie
|
|
|
|
if conf.data:
|
|
message += "\nPOST data: %s" % urlencode(conf.data) if conf.data else ""
|
|
|
|
if conf.forms:
|
|
if conf.method == HTTPMETHOD.GET and targetUrl.find("?") == -1:
|
|
continue
|
|
|
|
message += "\ndo you want to test this form? [Y/n/q] "
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
if conf.method == HTTPMETHOD.POST:
|
|
message = "Edit POST data [default: %s]%s: " % (urlencode(conf.data) if conf.data else "None", " (Warning: blank fields detected)" if conf.data and extractRegexResult(EMPTY_FORM_FIELDS_REGEX, conf.data) else "")
|
|
conf.data = readInput(message, default=conf.data)
|
|
conf.data = __randomFillBlankFields(conf.data)
|
|
conf.data = urldecode(conf.data)
|
|
|
|
elif conf.method == HTTPMETHOD.GET:
|
|
if targetUrl.find("?") > -1:
|
|
firstPart = targetUrl[:targetUrl.find("?")]
|
|
secondPart = targetUrl[targetUrl.find("?")+1:]
|
|
message = "Edit GET data [default: %s]: " % secondPart
|
|
test = readInput(message, default=secondPart)
|
|
test = __randomFillBlankFields(test)
|
|
conf.url = "%s?%s" % (firstPart, test)
|
|
|
|
parseTargetUrl()
|
|
|
|
elif test[0] in ("n", "N"):
|
|
continue
|
|
elif test[0] in ("q", "Q"):
|
|
break
|
|
|
|
elif conf.realTest:
|
|
logger.info(message)
|
|
else:
|
|
message += "\ndo you want to test this url? [Y/n/q]"
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
pass
|
|
elif test[0] in ("n", "N"):
|
|
continue
|
|
elif test[0] in ("q", "Q"):
|
|
break
|
|
|
|
infoMsg = "testing url %s" % targetUrl
|
|
logger.info(infoMsg)
|
|
|
|
setupTargetEnv()
|
|
|
|
if not checkConnection(suppressOutput=conf.forms) or not checkString() or not checkRegexp():
|
|
continue
|
|
|
|
if conf.checkWaf:
|
|
checkWaf()
|
|
|
|
if conf.nullConnection:
|
|
checkNullConnection()
|
|
|
|
if not conf.dropSetCookie and conf.cj:
|
|
cookieStr = ";".join("%s=%s" % (getUnicode(cookie.name), getUnicode(cookie.value)) for _, cookie in enumerate(conf.cj))
|
|
|
|
if cookieStr:
|
|
if PLACE.COOKIE in conf.parameters:
|
|
message = "you provided an HTTP Cookie header value. "
|
|
message += "The target url provided its own Cookie within "
|
|
message += "the HTTP Set-Cookie header. Do you want to "
|
|
message += "continue using the HTTP Cookie values that "
|
|
message += "you provided? [Y/n] "
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
setCookieAsInjectable = False
|
|
|
|
if setCookieAsInjectable:
|
|
conf.httpHeaders.append(("Cookie", cookieStr))
|
|
conf.parameters[PLACE.COOKIE] = cookieStr
|
|
__paramDict = paramToDict(PLACE.COOKIE, cookieStr)
|
|
|
|
if __paramDict:
|
|
conf.paramDict[PLACE.COOKIE] = __paramDict
|
|
# TODO: consider the following line in __setRequestParams()
|
|
# __testableParameters = True
|
|
|
|
if (len(kb.injections) == 0 or (len(kb.injections) == 1 and kb.injections[0].place is None)) \
|
|
and (kb.injection.place is None or kb.injection.parameter is None):
|
|
|
|
if not conf.string and not conf.regexp and PAYLOAD.TECHNIQUE.BOOLEAN in conf.tech:
|
|
# NOTE: this is not needed anymore, leaving only to display
|
|
# a warning message to the user in case the page is not stable
|
|
checkStability()
|
|
|
|
# Do a little prioritization reorder of a testable parameter list
|
|
parameters = conf.parameters.keys()
|
|
|
|
# Order of testing list (last to first)
|
|
orderList = (PLACE.URI, PLACE.GET, PLACE.POST)
|
|
|
|
for place in orderList:
|
|
if place in parameters:
|
|
parameters.remove(place)
|
|
parameters.insert(0, place)
|
|
|
|
proceed = True
|
|
|
|
for place in parameters:
|
|
# Test User-Agent and Referer headers only if
|
|
# --level >= 3
|
|
skip = (place == PLACE.UA and conf.level < 3)
|
|
skip |= (place == PLACE.REFERER and conf.level < 3)
|
|
|
|
# Test Cookie header only if --level >= 2
|
|
skip |= (place == PLACE.COOKIE and conf.level < 2)
|
|
|
|
skip |= (place == PLACE.UA and intersect(USER_AGENT_ALIASES, conf.skip, True) not in ([], None))
|
|
skip |= (place == PLACE.REFERER and intersect(REFERER_ALIASES, conf.skip, True) not in ([], None))
|
|
skip |= (place == PLACE.COOKIE and intersect('cookie', conf.skip, True) not in ([], None))
|
|
|
|
skip &= not (place == PLACE.UA and intersect(USER_AGENT_ALIASES, conf.testParameter, True))
|
|
skip &= not (place == PLACE.REFERER and intersect(REFERER_ALIASES, conf.testParameter, True))
|
|
|
|
if skip:
|
|
continue
|
|
|
|
if not conf.paramDict.has_key(place):
|
|
continue
|
|
|
|
paramDict = conf.paramDict[place]
|
|
|
|
for parameter, value in paramDict.items():
|
|
if not proceed:
|
|
break
|
|
|
|
kb.vainRun = False
|
|
testSqlInj = True
|
|
paramKey = (conf.hostname, conf.path, place, parameter)
|
|
|
|
if paramKey in kb.testedParams:
|
|
testSqlInj = False
|
|
|
|
infoMsg = "skipping previously processed %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
elif parameter in conf.testParameter:
|
|
pass
|
|
|
|
elif parameter == conf.rParam:
|
|
testSqlInj = False
|
|
|
|
infoMsg = "skipping randomizing %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
elif parameter in conf.skip:
|
|
testSqlInj = False
|
|
|
|
infoMsg = "skipping %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
# Ignore session-like parameters for --level < 4
|
|
elif conf.level < 4 and parameter.upper() in IGNORE_PARAMETERS:
|
|
testSqlInj = False
|
|
|
|
infoMsg = "ignoring %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
elif conf.realTest:
|
|
pass
|
|
|
|
elif PAYLOAD.TECHNIQUE.BOOLEAN in conf.tech:
|
|
if not checkDynParam(place, parameter, value):
|
|
warnMsg = "%s parameter '%s' appears to be not dynamic" % (place, parameter)
|
|
logger.warn(warnMsg)
|
|
|
|
else:
|
|
infoMsg = "%s parameter '%s' is dynamic" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
kb.testedParams.add(paramKey)
|
|
|
|
if testSqlInj:
|
|
check = heuristicCheckSqlInjection(place, parameter)
|
|
|
|
if not check:
|
|
if conf.smart or conf.realTest and not simpletonCheckSqlInjection(place, parameter, value):
|
|
infoMsg = "skipping %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
continue
|
|
|
|
infoMsg = "testing sql injection on %s " % place
|
|
infoMsg += "parameter '%s'" % parameter
|
|
logger.info(infoMsg)
|
|
|
|
injection = checkSqlInjection(place, parameter, value)
|
|
proceed = not kb.endDetection
|
|
|
|
if injection is not None and injection.place is not None:
|
|
kb.injections.append(injection)
|
|
|
|
# In case when user wants to end detection phase (Ctrl+C)
|
|
if not proceed:
|
|
break
|
|
|
|
msg = "%s parameter '%s' " % (injection.place, injection.parameter)
|
|
msg += "is vulnerable. Do you want to keep testing the others? [y/N] "
|
|
test = readInput(msg, default="N")
|
|
|
|
if test[0] in ("n", "N"):
|
|
proceed = False
|
|
paramKey = (conf.hostname, conf.path, None, None)
|
|
kb.testedParams.add(paramKey)
|
|
else:
|
|
warnMsg = "%s parameter '%s' is not " % (place, parameter)
|
|
warnMsg += "injectable"
|
|
logger.warn(warnMsg)
|
|
|
|
if len(kb.injections) == 0 or (len(kb.injections) == 1 and kb.injections[0].place is None):
|
|
if kb.vainRun and not conf.multipleTargets:
|
|
errMsg = "no testable parameter(s) found in the provided data "
|
|
errMsg += "(e.g. GET parameter 'id' in 'www.site.com/index.php?id=1')"
|
|
raise sqlmapNoneDataException, errMsg
|
|
elif not conf.realTest:
|
|
errMsg = "all parameters appear to be not injectable."
|
|
|
|
if conf.level < 5 or conf.risk < 3:
|
|
errMsg += " Try to increase --level/--risk values "
|
|
errMsg += "to perform more tests."
|
|
|
|
if isinstance(conf.tech, list) and len(conf.tech) < 5:
|
|
errMsg += " Rerun without providing the --technique switch."
|
|
|
|
if not conf.textOnly and kb.originalPage:
|
|
percent = (100.0 * len(getFilteredPageContent(kb.originalPage)) / len(kb.originalPage))
|
|
|
|
if kb.dynamicParameters:
|
|
errMsg += " You can give it a go with the --text-only "
|
|
errMsg += "switch if the target page has a low percentage "
|
|
errMsg += "of textual content (~%.2f%% of " % percent
|
|
errMsg += "page content is text)."
|
|
elif percent < LOW_TEXT_PERCENT and not kb.errorIsNone:
|
|
errMsg += " Please retry with the --text-only switch "
|
|
errMsg += "(along with --technique=BU) as this case "
|
|
errMsg += "looks like a perfect candidate "
|
|
errMsg += "(low textual content along with inability "
|
|
errMsg += "of comparison engine to detect at least "
|
|
errMsg += "one dynamic parameter)."
|
|
|
|
if kb.heuristicTest:
|
|
errMsg += " As heuristic test turned out positive you are "
|
|
errMsg += "strongly advised to continue on with the tests. "
|
|
errMsg += "Please, consider usage of tampering scripts as "
|
|
errMsg += "your target might filter the queries."
|
|
|
|
if not conf.string and not conf.regexp:
|
|
errMsg += " Also, you can try to rerun by providing "
|
|
errMsg += "either a valid --string "
|
|
errMsg += "or a valid --regexp, refer to the user's "
|
|
errMsg += "manual for details"
|
|
elif conf.string:
|
|
errMsg += " Also, you can try to rerun by providing a "
|
|
errMsg += "valid --string as perhaps the string you "
|
|
errMsg += "have choosen does not match "
|
|
errMsg += "exclusively True responses"
|
|
elif conf.regexp:
|
|
errMsg += " Also, you can try to rerun by providing a "
|
|
errMsg += "valid --regexp as perhaps the regular "
|
|
errMsg += "expression that you have choosen "
|
|
errMsg += "does not match exclusively True responses"
|
|
|
|
raise sqlmapNotVulnerableException, errMsg
|
|
else:
|
|
errMsg = "it seems that all parameters are not injectable"
|
|
raise sqlmapNotVulnerableException, errMsg
|
|
else:
|
|
# Flush the flag
|
|
kb.testMode = False
|
|
|
|
__saveToSessionFile()
|
|
__saveToResultsFile()
|
|
__showInjections()
|
|
__selectInjection()
|
|
|
|
if kb.injection.place is not None and kb.injection.parameter is not None:
|
|
if kb.testQueryCount == 0 and conf.realTest:
|
|
condition = False
|
|
elif conf.multipleTargets:
|
|
message = "do you want to exploit this SQL injection? [Y/n] "
|
|
exploit = readInput(message, default="Y")
|
|
|
|
condition = not exploit or exploit[0] in ("y", "Y")
|
|
else:
|
|
condition = True
|
|
|
|
if condition:
|
|
action()
|
|
|
|
except KeyboardInterrupt:
|
|
if conf.multipleTargets:
|
|
warnMsg = "user aborted in multiple target mode"
|
|
logger.warn(warnMsg)
|
|
|
|
message = "do you want to skip to the next target in list? [Y/n/q]"
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
pass
|
|
elif test[0] in ("n", "N"):
|
|
return False
|
|
elif test[0] in ("q", "Q"):
|
|
raise sqlmapUserQuitException
|
|
else:
|
|
raise
|
|
|
|
except sqlmapUserQuitException:
|
|
raise
|
|
|
|
except sqlmapSilentQuitException:
|
|
raise
|
|
|
|
except exceptionsTuple, e:
|
|
e = getUnicode(e)
|
|
|
|
if conf.multipleTargets:
|
|
e += ", skipping to the next %s" % ("form" if conf.forms else "url")
|
|
logger.error(e)
|
|
else:
|
|
logger.critical(e)
|
|
return False
|
|
|
|
finally:
|
|
showHttpErrorCodes()
|
|
|
|
if kb.dataOutputFlag and not conf.multipleTargets:
|
|
logger.info("Fetched data logged to text files under '%s'" % conf.outputPath)
|
|
|
|
if conf.multipleTargets and conf.resultsFilename:
|
|
infoMsg = "you can find results of scanning in multiple targets "
|
|
infoMsg += "mode inside the CSV file '%s'" % conf.resultsFilename
|
|
logger.info(infoMsg)
|
|
|
|
return True
|