SIGN IN SIGN UP
sqlmapproject / sqlmap UNCLAIMED

Automatic SQL injection and database takeover tool

36950 0 0 Python
2019-05-08 12:47:52 +02:00
#!/usr/bin/env python
2008-10-15 15:38:22 +00:00
"""
2025-01-02 00:51:30 +01:00
Copyright (c) 2006-2025 sqlmap developers (https://sqlmap.org/)
2017-10-11 14:50:46 +02:00
See the file 'LICENSE' for copying permission
2008-10-15 15:38:22 +00:00
"""
import re
from xml.sax.handler import ContentHandler
2018-06-01 10:21:59 +02:00
from lib.core.common import urldecode
2010-04-16 19:57:00 +00:00
from lib.core.common import parseXmlFile
from lib.core.data import kb
from lib.core.data import paths
2021-01-07 14:20:03 +01:00
from lib.core.settings import HEURISTIC_PAGE_SIZE_THRESHOLD
from lib.core.threads import getCurrentThreadData
2008-10-15 15:38:22 +00:00
class HTMLHandler(ContentHandler):
2008-10-15 15:38:22 +00:00
"""
This class defines methods to parse the input HTML page to
fingerprint the back-end database management system
"""
def __init__(self, page):
2011-01-15 12:53:40 +00:00
ContentHandler.__init__(self)
self._dbms = None
2016-04-08 15:30:25 +02:00
self._page = (page or "")
2020-01-31 21:51:02 +01:00
try:
self._lower_page = self._page.lower()
except SystemError: # https://bugs.python.org/issue18183
self._lower_page = None
2018-06-01 10:21:59 +02:00
self._urldecoded_page = urldecode(self._page)
2008-10-15 15:38:22 +00:00
2011-04-30 13:20:05 +00:00
self.dbms = None
2008-10-15 15:38:22 +00:00
def _markAsErrorPage(self):
threadData = getCurrentThreadData()
threadData.lastErrorPage = (threadData.lastRequestUID, self._page)
2008-10-15 15:38:22 +00:00
def startElement(self, name, attrs):
2016-04-08 15:30:25 +02:00
if self.dbms:
return
2008-10-15 15:38:22 +00:00
if name == "dbms":
self._dbms = attrs.get("value")
2008-10-15 15:38:22 +00:00
2011-11-16 16:06:21 +00:00
elif name == "error":
2016-04-08 15:30:25 +02:00
regexp = attrs.get("regexp")
if regexp not in kb.cache.regex:
2017-10-31 11:38:09 +01:00
keywords = re.findall(r"\w+", re.sub(r"\\.", " ", regexp))
2016-04-08 15:30:25 +02:00
keywords = sorted(keywords, key=len)
kb.cache.regex[regexp] = keywords[-1].lower()
2020-02-27 14:31:43 +01:00
if ('|' in regexp or kb.cache.regex[regexp] in (self._lower_page or kb.cache.regex[regexp])) and re.search(regexp, self._urldecoded_page, re.I):
self.dbms = self._dbms
self._markAsErrorPage()
2020-01-20 23:11:37 +01:00
kb.forkNote = kb.forkNote or attrs.get("fork")
2008-10-15 15:38:22 +00:00
2008-11-17 00:13:49 +00:00
def htmlParser(page):
2008-10-15 15:38:22 +00:00
"""
This function calls a class that parses the input HTML page to
fingerprint the back-end database management system
2020-01-03 13:46:12 +01:00
>>> from lib.core.enums import DBMS
>>> htmlParser("Warning: mysql_fetch_array() expects parameter 1 to be resource") == DBMS.MYSQL
True
>>> threadData = getCurrentThreadData()
>>> threadData.lastErrorPage = None
2008-10-15 15:38:22 +00:00
"""
2021-01-07 14:20:03 +01:00
page = page[:HEURISTIC_PAGE_SIZE_THRESHOLD]
2008-11-17 00:13:49 +00:00
xmlfile = paths.ERRORS_XML
handler = HTMLHandler(page)
2016-09-09 11:06:38 +02:00
key = hash(page)
# generic SQL warning/error messages
if re.search(r"SQL (warning|error|syntax)", page, re.I):
handler._markAsErrorPage()
2016-09-09 11:06:38 +02:00
if key in kb.cache.parsedDbms:
retVal = kb.cache.parsedDbms[key]
if retVal:
handler._markAsErrorPage()
return retVal
2011-01-23 11:21:27 +00:00
parseXmlFile(xmlfile, handler)
2008-10-15 15:38:22 +00:00
if handler.dbms and handler.dbms not in kb.htmlFp:
kb.lastParserStatus = handler.dbms
kb.htmlFp.append(handler.dbms)
else:
kb.lastParserStatus = None
2016-09-09 11:06:38 +02:00
kb.cache.parsedDbms[key] = handler.dbms
2008-10-15 15:38:22 +00:00
return handler.dbms