metasploit-framework/lib/rex/parser/mbsa_nokogiri.rb

256 lines
7.0 KiB
Ruby
Raw Normal View History

2011-11-21 20:37:26 +00:00
require "rex/parser/nokogiri_doc_mixin"
module Rex
module Parser
# If Nokogiri is available, define Template document class.
load_nokogiri && class MbsaDocument < Nokogiri::XML::SAX::Document
include NokogiriDocMixin
# Triggered every time a new element is encountered. We keep state
# ourselves with the @state variable, turning things on when we
# get here (and turning things off when we exit in end_element()).
def start_element(name=nil,attrs=[])
attrs = normalize_attrs(attrs)
block = @block
@state[:current_tag][name] = true
case name
when "SecScan"
record_host(attrs)
when "IP" # TODO: Check to see if IPList/IP is useful to import
when "Check" # A list of MBSA checks. They have an ID and a Name.
record_check(attrs)
when "Advice" # Check advice. Free form text about the check
@state[:has_text] = true
when "Detail" # Check/Detail is where missing fixes are.
record_detail(attrs)
when "UpdateData" # Info about installed/missing hotfixes
record_updatedata(attrs)
when "Title" # MSB Title
@state[:has_text] = true
when "InformationURL" # Only use this if we don't have a Bulletin ID
@state[:has_text] = true
end
end
# This breaks xml-encoded characters, so need to append
def characters(text)
return unless @state[:has_text]
@text ||= ""
@text << text
end
# When we exit a tag, this is triggered.
def end_element(name=nil)
block = @block
case name
when "SecScan" # Wrap it up
collect_host_data
host_object = report_host &block
if host_object
db.report_import_note(@args[:wspace],host_object)
report_fingerprint(host_object)
report_vulns(host_object,&block)
end
# Reset the state once we close a host
@state.delete_if {|k| k != :current_tag}
when "Check"
collect_check_data
when "Advice"
@state[:has_text] = false
collect_advice_data
when "Detail"
collect_detail_data
when "UpdateData"
collect_updatedata
when "Title"
@state[:has_text] = false
collect_title
when "InformationURL"
collect_url
@state[:has_text] = false
end
@state[:current_tag].delete name
end
def report_fingerprint(host_object)
return unless host_object.kind_of? Msf::DBManager::Host
return unless @report_data[:os_fingerprint]
fp_note = @report_data[:os_fingerprint].merge(
{
:workspace => host_object.workspace,
:host => host_object
})
db_report(:note, fp_note)
end
def collect_url
return unless in_tag("References")
return unless in_tag("UpdateData")
return unless in_tag("Detail")
return unless in_tag("Check")
@state[:update][:url] = @text.to_s.strip
@text = nil
end
def report_vulns(host_object, &block)
return unless host_object.kind_of? Msf::DBManager::Host
return unless @report_data[:vulns]
return if @report_data[:vulns].empty?
@report_data[:vulns].each do |vuln|
next unless vuln[:refs]
if vuln[:refs].empty?
next
end
if block
db.emit(:vuln, ["Missing #{vuln[:name]}",1], &block) if block
end
db_report(:vuln, vuln.merge(:host => host_object))
end
end
def collect_title
return unless in_tag("SecScan")
return unless in_tag("Check")
collect_bulletin_title
@text = nil
end
def collect_bulletin_title
return unless @state[:check_state]["ID"] == 500.to_s
return unless in_tag("UpdateData")
return unless @state[:update]
return if @text.to_s.strip.empty?
@state[:update]["Title"] = @text.to_s.strip
end
def collect_updatedata
return unless in_tag("SecScan")
return unless in_tag("Check")
return unless in_tag("Detail")
collect_missing_update
@state[:updates] = {}
end
def collect_missing_update
return unless @state[:check_state]["ID"] == 500.to_s
return if @state[:update]["IsInstalled"] == "true"
@report_data[:missing_updates] ||= []
this_update = {}
this_update[:name] = @state[:update]["Title"].to_s.strip
this_update[:refs] = []
if @state[:update]["BulletinID"].empty?
this_update[:refs] << "URL-#{@state[:update][:url]}"
else
this_update[:refs] << "MSB-#{@state[:update]["BulletinID"]}"
end
@report_data[:missing_updates] << this_update
end
# So far, just care about Host OS
# There is assuredly more interesting things going on in here.
def collect_advice_data
return unless in_tag("SecScan")
return unless in_tag("Check")
collect_os_name
@text = nil
end
def collect_os_name
return unless @state[:check_state]["ID"] == 10101.to_s
return unless @text
return if @text.strip.empty?
os_match = @text.match(/Computer is running (.*)/)
return unless os_match
os_info = os_match[1]
os_vendor = os_info[/Microsoft/]
os_family = os_info[/Windows/]
os_version = os_info[/(XP|2000 Advanced Server|2000|2003|2008|SBS|Vista|7 .* Edition|7)/]
if os_info
@report_data[:os_fingerprint] = {}
@report_data[:os_fingerprint][:type] = "host.os.mbsa_fingerprint"
@report_data[:os_fingerprint][:data] = {
:os_vendor => os_vendor,
:os_family => os_family,
:os_version => os_version,
:os_accuracy => 100,
:os_match => os_info.gsub(/\x2e$/,"")
}
end
end
def collect_detail_data
return unless in_tag("SecScan")
return unless in_tag("Check")
if @report_data[:missing_updates]
@report_data[:vulns] = @report_data[:missing_updates]
end
end
def collect_check_data
return unless in_tag("SecScan")
@state[:check_state] = {}
end
def collect_host_data
return unless @state[:address]
return if @state[:address].strip.empty?
@report_data[:host] = @state[:address].strip
if @state[:hostname] && !@state[:hostname].empty?
@report_data[:name] = @state[:hostname]
end
@report_data[:state] = Msf::HostState::Alive
end
def report_host(&block)
if host_is_okay
db.emit(:address,@report_data[:host],&block) if block
host_info = @report_data.merge(:workspace => @args[:wspace])
db_report(:host, host_info)
end
end
def record_updatedata(attrs)
return unless in_tag("SecScan")
return unless in_tag("Check")
return unless in_tag("Detail")
update_attrs = attr_hash(attrs)
@state[:update] = attr_hash(attrs)
end
def record_host(attrs)
host_attrs = attr_hash(attrs)
@state[:address] = host_attrs["IP"]
@state[:hostname] = host_attrs["Machine"]
end
def record_check(attrs)
return unless in_tag("SecScan")
@state[:check_state] = attr_hash(attrs)
end
def record_detail(attrs)
return unless in_tag("SecScan")
return unless in_tag("Check")
@state[:detail_state] = attr_hash(attrs)
end
# We need to override the usual host_is_okay because MBSA apparently
# doesn't report on open ports at all.
def host_is_okay
return false unless @report_data[:host]
return false unless valid_ip(@report_data[:host])
return false unless @report_data[:state] == Msf::HostState::Alive
if @args[:blacklist]
return false if @args[:blacklist].include?(@report_data[:host])
end
return true
end
end
end
end