mirror of https://github.com/CIRCL/AIL-framework
84 lines
2.9 KiB
Python
Executable File
84 lines
2.9 KiB
Python
Executable File
#!/usr/bin/env python3
|
|
# -*-coding:UTF-8 -*
|
|
|
|
"""
|
|
The SQLInjectionDetection Module
|
|
================================
|
|
|
|
This module is consuming the Redis-list created by the Urls module.
|
|
|
|
It test different possibility to makes some sqlInjection.
|
|
|
|
"""
|
|
|
|
import os
|
|
import sys
|
|
import re
|
|
import urllib.request
|
|
|
|
from datetime import datetime
|
|
from pyfaup.faup import Faup
|
|
from urllib.parse import unquote
|
|
|
|
sys.path.append(os.environ['AIL_BIN'])
|
|
##################################
|
|
# Import Project packages
|
|
##################################
|
|
from modules.abstract_module import AbstractModule
|
|
from lib.ConfigLoader import ConfigLoader
|
|
from lib.objects.Items import Item
|
|
# from lib import Statistics
|
|
|
|
class SQLInjectionDetection(AbstractModule):
|
|
"""docstring for SQLInjectionDetection module."""
|
|
|
|
# # TODO: IMPROVE ME
|
|
# Reference: https://github.com/stamparm/maltrail/blob/master/core/settings.py
|
|
SQLI_REGEX = r"information_schema|sysdatabases|sysusers|floor\(rand\(|ORDER BY \d+|\bUNION\s+(ALL\s+)?SELECT\b|\b(UPDATEXML|EXTRACTVALUE)\(|\bCASE[^\w]+WHEN.*THEN\b|\bWAITFOR[^\w]+DELAY\b|\bCONVERT\(|VARCHAR\(|\bCOUNT\(\*\)|\b(pg_)?sleep\(|\bSELECT\b.*\bFROM\b.*\b(WHERE|GROUP|ORDER)\b|\bSELECT \w+ FROM \w+|\b(AND|OR|SELECT)\b.*/\*.*\*/|/\*.*\*/.*\b(AND|OR|SELECT)\b|\b(AND|OR)[^\w]+\d+['\") ]?[=><]['\"( ]?\d+|ODBC;DRIVER|\bINTO\s+(OUT|DUMP)FILE"
|
|
|
|
def __init__(self):
|
|
super(SQLInjectionDetection, self).__init__()
|
|
|
|
self.faup = Faup()
|
|
|
|
self.logger.info(f"Module: {self.module_name} Launched")
|
|
|
|
def compute(self, message):
|
|
url = message
|
|
item = self.get_obj()
|
|
|
|
if self.is_sql_injection(url):
|
|
self.faup.decode(url)
|
|
url_parsed = self.faup.get()
|
|
|
|
print(f"Detected SQL in URL: {item.id}")
|
|
print(urllib.request.unquote(url))
|
|
to_print = f'SQLInjection;{item.get_source()};{item.get_date()};{item.get_basename()};Detected SQL in URL;{item.id}'
|
|
self.redis_logger.warning(to_print)
|
|
|
|
# Tag
|
|
tag = f'infoleak:automatic-detection="sql-injection"'
|
|
self.add_message_to_queue(message=tag, queue='Tags')
|
|
|
|
# statistics
|
|
# tld = url_parsed['tld']
|
|
# if tld is not None:
|
|
# # # TODO: # FIXME: remove me
|
|
# try:
|
|
# tld = tld.decode()
|
|
# except:
|
|
# pass
|
|
# date = datetime.now().strftime("%Y%m")
|
|
# Statistics.add_module_tld_stats_by_date(self.module_name, date, tld, 1)
|
|
|
|
# Try to detect if the url passed might be an sql injection by applying the regex
|
|
# defined above on it.
|
|
def is_sql_injection(self, url_parsed):
|
|
line = unquote(url_parsed)
|
|
return re.search(SQLInjectionDetection.SQLI_REGEX, line, re.I) is not None
|
|
|
|
|
|
if __name__ == "__main__":
|
|
module = SQLInjectionDetection()
|
|
module.run()
|