mirror of
https://github.com/sqlmapproject/sqlmap.git
synced 2024-11-30 05:23:50 +03:00
374 lines
14 KiB
Python
374 lines
14 KiB
Python
#!/usr/bin/env python
|
|
|
|
"""
|
|
$Id$
|
|
|
|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
|
|
See the file 'doc/COPYING' for copying permission
|
|
"""
|
|
|
|
import re
|
|
|
|
from lib.controller.action import action
|
|
from lib.controller.checks import checkSqlInjection
|
|
from lib.controller.checks import heuristicCheckSqlInjection
|
|
from lib.controller.checks import checkDynParam
|
|
from lib.controller.checks import checkStability
|
|
from lib.controller.checks import checkString
|
|
from lib.controller.checks import checkRegexp
|
|
from lib.controller.checks import checkConnection
|
|
from lib.controller.checks import checkNullConnection
|
|
from lib.core.common import getUnicode
|
|
from lib.core.common import paramToDict
|
|
from lib.core.common import parseTargetUrl
|
|
from lib.core.common import readInput
|
|
from lib.core.data import conf
|
|
from lib.core.data import kb
|
|
from lib.core.data import logger
|
|
from lib.core.enums import HTTPMETHOD
|
|
from lib.core.enums import PLACE
|
|
from lib.core.exception import exceptionsTuple
|
|
from lib.core.exception import sqlmapNotVulnerableException
|
|
from lib.core.exception import sqlmapSilentQuitException
|
|
from lib.core.exception import sqlmapUserQuitException
|
|
from lib.core.session import setInjection
|
|
from lib.core.session import setMatchRatio
|
|
from lib.core.target import initTargetEnv
|
|
from lib.core.target import setupTargetEnv
|
|
from lib.utils.parenthesis import checkForParenthesis
|
|
|
|
def __selectInjection(injData):
|
|
"""
|
|
Selection function for injection place, parameters and type.
|
|
"""
|
|
|
|
message = "there were multiple injection points, please select the "
|
|
message += "one to use to go ahead:\n"
|
|
|
|
for i in xrange(0, len(injData)):
|
|
injPlace = injData[i][0]
|
|
injParameter = injData[i][1]
|
|
injType = injData[i][2]
|
|
|
|
message += "[%d] place: %s, parameter: " % (i, injPlace)
|
|
message += "%s, type: %s" % (injParameter, injType)
|
|
|
|
if i == 0:
|
|
message += " (default)"
|
|
|
|
message += "\n"
|
|
|
|
message += "[q] Quit"
|
|
select = readInput(message, default="0")
|
|
|
|
if not select:
|
|
index = 0
|
|
|
|
elif select.isdigit() and int(select) < len(injData) and int(select) >= 0:
|
|
index = int(select)
|
|
|
|
elif select[0] in ( "Q", "q" ):
|
|
return "Quit"
|
|
|
|
else:
|
|
warnMsg = "invalid choice, retry"
|
|
logger.warn(warnMsg)
|
|
__selectInjection(injData)
|
|
|
|
return injData[index]
|
|
|
|
def start():
|
|
"""
|
|
This function calls a function that performs checks on both URL
|
|
stability and all GET, POST, Cookie and User-Agent parameters to
|
|
check if they are dynamic and SQL injection affected
|
|
"""
|
|
|
|
if not conf.start:
|
|
return False
|
|
|
|
if conf.direct:
|
|
initTargetEnv()
|
|
setupTargetEnv()
|
|
action()
|
|
return True
|
|
|
|
if conf.url and not conf.forms:
|
|
kb.targetUrls.add(( conf.url, conf.method, conf.data, conf.cookie ))
|
|
|
|
if conf.configFile and not kb.targetUrls:
|
|
errMsg = "you did not edit the configuration file properly, set "
|
|
errMsg += "the target url, list of targets or google dork"
|
|
logger.error(errMsg)
|
|
return False
|
|
|
|
if kb.targetUrls and len(kb.targetUrls) > 1:
|
|
infoMsg = "sqlmap got a total of %d targets" % len(kb.targetUrls)
|
|
logger.info(infoMsg)
|
|
|
|
hostCount = 0
|
|
cookieStr = ""
|
|
setCookieAsInjectable = True
|
|
|
|
for targetUrl, targetMethod, targetData, targetCookie in kb.targetUrls:
|
|
try:
|
|
conf.url = targetUrl
|
|
conf.method = targetMethod
|
|
conf.data = targetData
|
|
conf.cookie = targetCookie
|
|
injData = []
|
|
|
|
initTargetEnv()
|
|
parseTargetUrl()
|
|
|
|
testSqlInj = False
|
|
if PLACE.GET in conf.parameters:
|
|
for parameter in re.findall(r"([^=]+)=[^&]+&?", conf.parameters[PLACE.GET]):
|
|
paramKey = (conf.hostname, conf.path, PLACE.GET, parameter)
|
|
if paramKey not in kb.testedParams:
|
|
testSqlInj = True
|
|
break
|
|
else:
|
|
paramKey = (conf.hostname, conf.path, None, None)
|
|
if paramKey not in kb.testedParams:
|
|
testSqlInj = True
|
|
|
|
if not testSqlInj:
|
|
infoMsg = "skipping '%s'" % targetUrl
|
|
logger.info(infoMsg)
|
|
continue
|
|
|
|
if conf.multipleTargets:
|
|
hostCount += 1
|
|
if conf.forms:
|
|
name = kb.formNames[(targetUrl, targetMethod, targetData, targetCookie)]
|
|
message = "[#%d] %s:\n%s %s" % (hostCount, "form%s" % (" '%s'" % name if name else ""), conf.method or HTTPMETHOD.GET, targetUrl)
|
|
else:
|
|
message = "%s %d:\n%s %s" % ("url", hostCount, conf.method or HTTPMETHOD.GET, targetUrl)
|
|
|
|
if conf.cookie:
|
|
message += "\nCookie: %s" % conf.cookie
|
|
|
|
if conf.data:
|
|
message += "\nPOST data: %s" % repr(conf.data) if conf.data else ""
|
|
|
|
if conf.forms:
|
|
if conf.method == HTTPMETHOD.GET and targetUrl.find("?") == -1:
|
|
continue
|
|
|
|
message += "\ndo you want to test this form? [Y/n/q] "
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
if conf.method == HTTPMETHOD.POST:
|
|
message = "Edit POST data [default: %s]: " % (conf.data if conf.data else "")
|
|
conf.data = readInput(message, default=conf.data)
|
|
|
|
elif conf.method == HTTPMETHOD.GET:
|
|
if conf.url.find("?") > -1:
|
|
firstPart = conf.url[:conf.url.find("?")]
|
|
secondPart = conf.url[conf.url.find("?")+1:]
|
|
message = "Edit GET data [default: %s]: " % secondPart
|
|
test = readInput(message, default=secondPart)
|
|
conf.url = "%s?%s" % (firstPart, test)
|
|
|
|
elif test[0] in ("n", "N"):
|
|
continue
|
|
elif test[0] in ("q", "Q"):
|
|
break
|
|
|
|
else:
|
|
message += "\ndo you want to test this url? [Y/n/q]"
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
pass
|
|
elif test[0] in ("n", "N"):
|
|
continue
|
|
elif test[0] in ("q", "Q"):
|
|
break
|
|
|
|
logMsg = "testing url %s" % targetUrl
|
|
logger.info(logMsg)
|
|
|
|
setupTargetEnv()
|
|
|
|
if not checkConnection(conf.forms) or not checkString() or not checkRegexp():
|
|
continue
|
|
|
|
if conf.nullConnection:
|
|
checkNullConnection()
|
|
|
|
if not conf.dropSetCookie and conf.cj:
|
|
for _, cookie in enumerate(conf.cj):
|
|
cookie = getUnicode(cookie)
|
|
index = cookie.index(" for ")
|
|
|
|
cookieStr += "%s;" % cookie[8:index]
|
|
|
|
if cookieStr:
|
|
cookieStr = cookieStr[:-1]
|
|
|
|
if PLACE.COOKIE in conf.parameters:
|
|
message = "you provided an HTTP Cookie header value. "
|
|
message += "The target url provided its own Cookie within "
|
|
message += "the HTTP Set-Cookie header. Do you want to "
|
|
message += "continue using the HTTP Cookie values that "
|
|
message += "you provided? [Y/n] "
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
setCookieAsInjectable = False
|
|
|
|
if setCookieAsInjectable:
|
|
conf.httpHeaders.append(("Cookie", cookieStr))
|
|
conf.parameters[PLACE.COOKIE] = cookieStr
|
|
__paramDict = paramToDict(PLACE.COOKIE, cookieStr)
|
|
|
|
if __paramDict:
|
|
conf.paramDict[PLACE.COOKIE] = __paramDict
|
|
# TODO: consider the following line in __setRequestParams()
|
|
__testableParameters = True
|
|
|
|
if not kb.injPlace or not kb.injParameter or not kb.injType:
|
|
if not conf.string and not conf.regexp and not conf.eRegexp:
|
|
# NOTE: this is not needed anymore, leaving only to display
|
|
# a warning message to the user in case the page is not stable
|
|
checkStability()
|
|
|
|
# Do a little prioritization reorder of a testable parameter list
|
|
parameters = conf.parameters.keys()
|
|
|
|
for place in (PLACE.URI, PLACE.POST, PLACE.GET):
|
|
if place in parameters:
|
|
parameters.remove(place)
|
|
parameters.insert(0, place)
|
|
|
|
for place in parameters:
|
|
if not conf.paramDict.has_key(place):
|
|
continue
|
|
|
|
paramDict = conf.paramDict[place]
|
|
for parameter, value in paramDict.items():
|
|
testSqlInj = True
|
|
paramKey = (conf.hostname, conf.path, place, parameter)
|
|
|
|
if paramKey in kb.testedParams:
|
|
testSqlInj = False
|
|
|
|
infoMsg = "skipping previously processed %s parameter '%s'" % (place, parameter)
|
|
logger.info(infoMsg)
|
|
|
|
# Avoid dinamicity test if the user provided the
|
|
# parameter manually
|
|
elif parameter in conf.testParameter:
|
|
pass
|
|
|
|
elif not checkDynParam(place, parameter, value):
|
|
warnMsg = "%s parameter '%s' is not dynamic" % (place, parameter)
|
|
logger.warn(warnMsg)
|
|
testSqlInj = False
|
|
|
|
else:
|
|
logMsg = "%s parameter '%s' is dynamic" % (place, parameter)
|
|
logger.info(logMsg)
|
|
|
|
kb.testedParams.add(paramKey)
|
|
|
|
if testSqlInj:
|
|
heuristicCheckSqlInjection(place, parameter, value)
|
|
|
|
for parenthesis in range(0, 4):
|
|
logMsg = "testing sql injection on %s " % place
|
|
logMsg += "parameter '%s' with " % parameter
|
|
logMsg += "%d parenthesis" % parenthesis
|
|
logger.info(logMsg)
|
|
|
|
injType = checkSqlInjection(place, parameter, value, parenthesis)
|
|
|
|
if injType:
|
|
injData.append((place, parameter, injType))
|
|
break
|
|
|
|
else:
|
|
infoMsg = "%s parameter '%s' is not " % (place, parameter)
|
|
infoMsg += "injectable with %d parenthesis" % parenthesis
|
|
logger.info(infoMsg)
|
|
|
|
if not injData:
|
|
warnMsg = "%s parameter '%s' is not " % (place, parameter)
|
|
warnMsg += "injectable"
|
|
logger.warn(warnMsg)
|
|
|
|
if not kb.injPlace or not kb.injParameter or not kb.injType:
|
|
if len(injData) == 1:
|
|
injDataSelected = injData[0]
|
|
|
|
elif len(injData) > 1:
|
|
injDataSelected = __selectInjection(injData)
|
|
|
|
else:
|
|
raise sqlmapNotVulnerableException, "all parameters are not injectable"
|
|
|
|
if injDataSelected == "Quit":
|
|
return
|
|
|
|
else:
|
|
kb.injPlace, kb.injParameter, kb.injType = injDataSelected
|
|
setInjection()
|
|
|
|
if kb.injPlace and kb.injParameter and kb.injType:
|
|
if conf.multipleTargets:
|
|
message = "do you want to exploit this SQL injection? [Y/n] "
|
|
exploit = readInput(message, default="Y")
|
|
|
|
condition = not exploit or exploit[0] in ("y", "Y")
|
|
else:
|
|
condition = True
|
|
|
|
if condition:
|
|
if kb.paramMatchRatio:
|
|
conf.matchRatio = kb.paramMatchRatio[(kb.injPlace, kb.injParameter)]
|
|
setMatchRatio()
|
|
|
|
checkForParenthesis()
|
|
action()
|
|
|
|
except KeyboardInterrupt:
|
|
if conf.multipleTargets:
|
|
warnMsg = "Ctrl+C detected in multiple target mode"
|
|
logger.warn(warnMsg)
|
|
|
|
message = "do you want to skip to the next target in list? [Y/n/q]"
|
|
test = readInput(message, default="Y")
|
|
|
|
if not test or test[0] in ("y", "Y"):
|
|
pass
|
|
elif test[0] in ("n", "N"):
|
|
return False
|
|
elif test[0] in ("q", "Q"):
|
|
raise sqlmapUserQuitException
|
|
else:
|
|
raise
|
|
|
|
except sqlmapUserQuitException:
|
|
raise
|
|
|
|
except sqlmapSilentQuitException:
|
|
raise
|
|
|
|
except exceptionsTuple, e:
|
|
e = getUnicode(e)
|
|
|
|
if conf.multipleTargets:
|
|
e += ", skipping to the next %s" % ("form" if conf.forms else "url")
|
|
logger.error(e)
|
|
else:
|
|
logger.critical(e)
|
|
return False
|
|
|
|
if conf.loggedToOut:
|
|
logger.info("Fetched data logged to text files under '%s'" % conf.outputPath)
|
|
|
|
return True
|