mirror of
				https://github.com/sqlmapproject/sqlmap.git
				synced 2025-11-04 01:47:37 +03:00 
			
		
		
		
	
		
			
				
	
	
		
			261 lines
		
	
	
		
			8.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
			
		
		
	
	
			261 lines
		
	
	
		
			8.9 KiB
		
	
	
	
		
			Python
		
	
	
	
	
	
#!/usr/bin/env python
 | 
						|
 | 
						|
"""
 | 
						|
$Id$
 | 
						|
 | 
						|
Copyright (c) 2006-2010 sqlmap developers (http://sqlmap.sourceforge.net/)
 | 
						|
See the file 'doc/COPYING' for copying permission
 | 
						|
"""
 | 
						|
 | 
						|
import re
 | 
						|
 | 
						|
from lib.core.common import backend
 | 
						|
from lib.core.common import format
 | 
						|
from lib.core.common import dataToSessionFile
 | 
						|
from lib.core.common import getFilteredPageContent
 | 
						|
from lib.core.common import readInput
 | 
						|
from lib.core.convert import base64pickle
 | 
						|
from lib.core.convert import base64unpickle
 | 
						|
from lib.core.data import conf
 | 
						|
from lib.core.data import kb
 | 
						|
from lib.core.data import logger
 | 
						|
from lib.core.datatype import injectionDict
 | 
						|
from lib.core.enums import PAYLOAD
 | 
						|
from lib.core.enums import PLACE
 | 
						|
from lib.core.settings import METADB_SUFFIX
 | 
						|
from lib.core.settings import SUPPORTED_DBMS
 | 
						|
from lib.core.settings import UNKNOWN_DBMS_VERSION
 | 
						|
 | 
						|
def safeFormatString(value):
 | 
						|
    retVal = value
 | 
						|
    if retVal:
 | 
						|
        retVal = retVal.replace("[", "__LEFT_SQUARE_BRACKET__").replace("]", "__RIGHT_SQUARE_BRACKET__")
 | 
						|
    return retVal
 | 
						|
 | 
						|
def unSafeFormatString(value):
 | 
						|
    retVal = value
 | 
						|
    if retVal:
 | 
						|
        retVal = retVal.replace("__LEFT_SQUARE_BRACKET__", "[").replace("__RIGHT_SQUARE_BRACKET__", "]")
 | 
						|
    return retVal
 | 
						|
 | 
						|
def setInjection(inj):
 | 
						|
    """
 | 
						|
    Save information retrieved about injection place and parameter in the
 | 
						|
    session file.
 | 
						|
    """
 | 
						|
 | 
						|
    condition = (
 | 
						|
                  ( not kb.resumedQueries
 | 
						|
                  or ( kb.resumedQueries.has_key(conf.url) and
 | 
						|
                  not kb.resumedQueries[conf.url].has_key("Injection data")
 | 
						|
                  ) )
 | 
						|
                )
 | 
						|
 | 
						|
    if condition:
 | 
						|
        dataToSessionFile("[%s][%s][%s][Injection data][%s]\n" % (conf.url, inj.place, safeFormatString(conf.parameters[inj.place]), base64pickle(inj)))
 | 
						|
 | 
						|
def setDynamicMarkings(markings):
 | 
						|
    """
 | 
						|
    Save information retrieved about dynamic markings to the
 | 
						|
    session file.
 | 
						|
    """
 | 
						|
 | 
						|
    condition = (
 | 
						|
                  ( not kb.resumedQueries
 | 
						|
                  or ( kb.resumedQueries.has_key(conf.url) and
 | 
						|
                  not kb.resumedQueries[conf.url].has_key("Dynamic markings")
 | 
						|
                  ) )
 | 
						|
                )
 | 
						|
 | 
						|
    if condition:
 | 
						|
        dataToSessionFile("[%s][%s][%s][Dynamic markings][%s]\n" % (conf.url, None, None, base64pickle(markings)))
 | 
						|
 | 
						|
def setDbms(dbms):
 | 
						|
    """
 | 
						|
    @param dbms: database management system to be set into the knowledge
 | 
						|
    base as fingerprint.
 | 
						|
    @type dbms: C{str}
 | 
						|
    """
 | 
						|
    condition = (
 | 
						|
                  not kb.resumedQueries
 | 
						|
                  or ( kb.resumedQueries.has_key(conf.url) and
 | 
						|
                  not kb.resumedQueries[conf.url].has_key("DBMS") )
 | 
						|
                )
 | 
						|
 | 
						|
    if condition:
 | 
						|
        dataToSessionFile("[%s][%s][%s][DBMS][%s]\n" % (conf.url, kb.injection.place, safeFormatString(conf.parameters[kb.injection.place]), safeFormatString(dbms)))
 | 
						|
 | 
						|
    firstRegExp = "(%s)" % ("|".join([alias for alias in SUPPORTED_DBMS]))
 | 
						|
    dbmsRegExp = re.search("^%s" % firstRegExp, dbms, re.I)
 | 
						|
 | 
						|
    if dbmsRegExp:
 | 
						|
        dbms = dbmsRegExp.group(1)
 | 
						|
 | 
						|
    backend.setDbms(dbms)
 | 
						|
 | 
						|
    logger.info("the back-end DBMS is %s" % backend.getDbms())
 | 
						|
 | 
						|
def setOs():
 | 
						|
    """
 | 
						|
    Example of kb.bannerFp dictionary:
 | 
						|
 | 
						|
    {
 | 
						|
      'sp': set(['Service Pack 4']),
 | 
						|
      'dbmsVersion': '8.00.194',
 | 
						|
      'dbmsServicePack': '0',
 | 
						|
      'distrib': set(['2000']),
 | 
						|
      'dbmsRelease': '2000',
 | 
						|
      'type': set(['Windows'])
 | 
						|
    }
 | 
						|
    """
 | 
						|
 | 
						|
    infoMsg   = ""
 | 
						|
    condition = (
 | 
						|
                  not kb.resumedQueries
 | 
						|
                  or ( kb.resumedQueries.has_key(conf.url) and
 | 
						|
                  not kb.resumedQueries[conf.url].has_key("OS") )
 | 
						|
                )
 | 
						|
 | 
						|
    if not kb.bannerFp:
 | 
						|
        return
 | 
						|
 | 
						|
    if "type" in kb.bannerFp:
 | 
						|
        kb.os = format.humanize(kb.bannerFp["type"])
 | 
						|
        infoMsg = "the back-end DBMS operating system is %s" % kb.os
 | 
						|
 | 
						|
    if "distrib" in kb.bannerFp:
 | 
						|
        kb.osVersion = format.humanize(kb.bannerFp["distrib"])
 | 
						|
        infoMsg += " %s" % kb.osVersion
 | 
						|
 | 
						|
    if "sp" in kb.bannerFp:
 | 
						|
        kb.osSP = int(format.humanize(kb.bannerFp["sp"]).replace("Service Pack ", ""))
 | 
						|
 | 
						|
    elif "sp" not in kb.bannerFp and kb.os == "Windows":
 | 
						|
        kb.osSP = 0
 | 
						|
 | 
						|
    if kb.os and kb.osVersion and kb.osSP:
 | 
						|
        infoMsg += " Service Pack %d" % kb.osSP
 | 
						|
 | 
						|
    if infoMsg:
 | 
						|
        logger.info(infoMsg)
 | 
						|
 | 
						|
    if condition:
 | 
						|
        dataToSessionFile("[%s][%s][%s][OS][%s]\n" % (conf.url, kb.injection.place, safeFormatString(conf.parameters[kb.injection.place]), safeFormatString(kb.os)))
 | 
						|
 | 
						|
def setRemoteTempPath():
 | 
						|
    condition = (
 | 
						|
                  not kb.resumedQueries or ( kb.resumedQueries.has_key(conf.url) and
 | 
						|
                  not kb.resumedQueries[conf.url].has_key("Remote temp path") )
 | 
						|
                )
 | 
						|
 | 
						|
    if condition:
 | 
						|
        dataToSessionFile("[%s][%s][%s][Remote temp path][%s]\n" % (conf.url, kb.injection.place, safeFormatString(conf.parameters[kb.injection.place]), safeFormatString(conf.tmpPath)))
 | 
						|
 | 
						|
def resumeConfKb(expression, url, value):
 | 
						|
    if expression == "Injection data" and url == conf.url:
 | 
						|
        injection = base64unpickle(value[:-1])
 | 
						|
        logMsg = "resuming injection data from session file"
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
        if injection.place in conf.paramDict and\
 | 
						|
          injection.parameter in conf.paramDict[injection.place]:
 | 
						|
            kb.injections.append(injection)
 | 
						|
        else:
 | 
						|
            warnMsg = "there is an injection in %s parameter '%s' " % (injection.place, injection.parameter)
 | 
						|
            warnMsg += "but you did not provided it this time"
 | 
						|
            logger.warn(warnMsg)
 | 
						|
 | 
						|
    elif expression == "Dynamic markings" and url == conf.url:
 | 
						|
        kb.dynamicMarkings = base64unpickle(value[:-1])
 | 
						|
        logMsg = "resuming dynamic markings from session file"
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
    elif expression == "DBMS" and url == conf.url:
 | 
						|
        dbms        = unSafeFormatString(value[:-1])
 | 
						|
        dbms        = dbms.lower()
 | 
						|
        dbmsVersion = [UNKNOWN_DBMS_VERSION]
 | 
						|
 | 
						|
        logMsg = "resuming back-end DBMS '%s' " % dbms
 | 
						|
        logMsg += "from session file"
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
        firstRegExp = "(%s)" % ("|".join([alias for alias in SUPPORTED_DBMS]))
 | 
						|
        dbmsRegExp = re.search("%s ([\d\.]+)" % firstRegExp, dbms)
 | 
						|
 | 
						|
        if dbmsRegExp:
 | 
						|
            dbms        = dbmsRegExp.group(1)
 | 
						|
            dbmsVersion = [ dbmsRegExp.group(2) ]
 | 
						|
 | 
						|
        if conf.dbms and conf.dbms.lower() != dbms:
 | 
						|
            message  = "you provided '%s' as back-end DBMS, " % conf.dbms
 | 
						|
            message += "but from a past scan information on the target URL "
 | 
						|
            message += "sqlmap assumes the back-end DBMS is %s. " % dbms
 | 
						|
            message += "Do you really want to force the back-end "
 | 
						|
            message += "DBMS value? [y/N] "
 | 
						|
            test = readInput(message, default="N")
 | 
						|
 | 
						|
            if not test or test[0] in ("n", "N"):
 | 
						|
                backend.setDbms(dbms)
 | 
						|
                backend.setVersionList(dbmsVersion)
 | 
						|
        else:
 | 
						|
            backend.setDbms(dbms)
 | 
						|
            backend.setVersionList(dbmsVersion)
 | 
						|
 | 
						|
    elif expression == "OS" and url == conf.url:
 | 
						|
        os = unSafeFormatString(value[:-1])
 | 
						|
 | 
						|
        if os and os != 'None':
 | 
						|
            logMsg = "resuming back-end DBMS operating system '%s' " % os
 | 
						|
            logMsg += "from session file"
 | 
						|
            logger.info(logMsg)
 | 
						|
 | 
						|
            if conf.os and conf.os.lower() != os.lower():
 | 
						|
                message  = "you provided '%s' as back-end DBMS operating " % conf.os
 | 
						|
                message += "system, but from a past scan information on the "
 | 
						|
                message += "target URL sqlmap assumes the back-end DBMS "
 | 
						|
                message += "operating system is %s. " % os
 | 
						|
                message += "Do you really want to force the back-end DBMS "
 | 
						|
                message += "OS value? [y/N] "
 | 
						|
                test = readInput(message, default="N")
 | 
						|
 | 
						|
                if not test or test[0] in ("n", "N"):
 | 
						|
                    conf.os = os
 | 
						|
            else:
 | 
						|
                conf.os = os
 | 
						|
 | 
						|
    elif expression == "Remote temp path" and url == conf.url:
 | 
						|
        conf.tmpPath = unSafeFormatString(value[:-1])
 | 
						|
 | 
						|
        logMsg = "resuming remote absolute path of temporary "
 | 
						|
        logMsg += "files directory '%s' from session file" % conf.tmpPath
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
    elif expression == "TABLE_EXISTS" and url == conf.url:
 | 
						|
        table = unSafeFormatString(value[:-1])
 | 
						|
 | 
						|
        if '.' in table:
 | 
						|
            db, table = table.split('.')
 | 
						|
        else:
 | 
						|
            db = "%s%s" % (backend.getIdentifiedDbms(), METADB_SUFFIX)
 | 
						|
 | 
						|
        logMsg = "resuming brute forced table name "
 | 
						|
        logMsg += "'%s' from session file" % table
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
        kb.brute.tables.append((db, table))
 | 
						|
 | 
						|
    elif expression == "COLUMN_EXISTS" and url == conf.url:
 | 
						|
        table, column = unSafeFormatString(value[:-1]).split('..')
 | 
						|
        colName, colType = column.split(' ')
 | 
						|
 | 
						|
        if '.' in table:
 | 
						|
            db, table = table.split('.')
 | 
						|
        else:
 | 
						|
            db = "%s%s" % (backend.getIdentifiedDbms(), METADB_SUFFIX)
 | 
						|
 | 
						|
        logMsg = "resuming brute forced column name "
 | 
						|
        logMsg += "'%s' for table '%s' from session file" % (colName, table)
 | 
						|
        logger.info(logMsg)
 | 
						|
 | 
						|
        kb.brute.columns.append((db, table, colName, colType))
 |