metasploit-framework/lib/rex/parser/wapiti_nokogiri.rb

105 lines
2.5 KiB
Ruby
Raw Normal View History

require "rex/parser/nokogiri_doc_mixin"
module Rex
2012-05-13 21:28:50 +00:00
module Parser
2012-05-13 21:28:50 +00:00
load_nokogiri && class WapitiDocument < Nokogiri::XML::SAX::Document
2012-05-13 21:28:50 +00:00
include NokogiriDocMixin
2012-05-13 21:28:50 +00:00
def start_element(name=nil,attrs=[])
attrs = normalize_attrs(attrs)
block = @block
@state[:current_tag][name] = true
2012-05-13 21:28:50 +00:00
case name
when "timestamp"
@state[:has_text] = true
when "url"
@state[:has_text] = true
when "addr"
@state[:has_text] = true
when "port"
@state[:has_text] = true
when "parameter"
@state[:has_text] = true
when "info"
@state[:has_text] = true
when "description"
@state[:has_text] = true
when "solution"
@state[:has_text] = true
when "title"
@state[:has_text] = true
end
end
2012-05-13 21:28:50 +00:00
def end_element(name=nil)
block = @block
case name
when "timestamp"
@state[:timestamp] = @text.strip
@text = nil
when "url"
@state[:url] = @text.strip
@text = nil
when "addr"
@state[:host] = @text.strip
@text = nil
when "port"
@state[:port] = @text.strip
@text = nil
when "parameter"
@state[:parameter] = @text.strip
@text = nil
when "info"
@state[:info] = @text.strip
@text = nil
when "bug"
report_vuln
end
end
2012-05-13 21:28:50 +00:00
def report_vuln(&block)
proto = @state[:url].split(":")[0]
path = '/' + (@state[:url].split("/")[3..(@state[:url].split("/").length - 1)].join('/'))
web_vuln_info = {}
web_vuln_info[:web_site] = proto + "://" + @state[:host] + ":" + @state[:port]
web_vuln_info[:path] = path
web_vuln_info[:query] = @state[:url].split("?")[1]
2012-05-13 21:28:50 +00:00
#if the URL contains the parameter found to be vulnerable, it is probably a GET
#if it does not contains the parameter, it is probably a POST
if @state[:url].index(@state[:parameter])
web_vuln_info[:method] = "GET"
else
web_vuln_info[:method] = "POST"
end
2012-05-13 21:28:50 +00:00
@state[:parameter].split("&").each do |param|
if param.index("%27") #apostrophe
web_vuln_info[:pname] = param #sql injection
break
elsif param.index("alert")
web_vuln_info[:pname] = param #xss
end
end
2012-05-13 21:28:50 +00:00
web_vuln_info[:host] = @state[:host]
web_vuln_info[:port] = @state[:port]
web_vuln_info[:ssl] = (proto =~ /https/)
web_vuln_info[:proof] = ""
web_vuln_info[:risk] = ""
web_vuln_info[:params] = @state[:parameter]
web_vuln_info[:category] = "imported"
web_vuln_info[:confidence] = 90
web_vuln_info[:name] = @state[:info]
2012-05-13 21:28:50 +00:00
db.emit(:web_vuln, web_vuln_info[:name], &block) if block
vuln = db_report(:web_vuln, web_vuln_info)
end
end
end
end