sqlmap.rb 8.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296
  1. require 'sqlmap/sqlmap_session'
  2. require 'sqlmap/sqlmap_manager'
  3. require 'json'
  4. module Msf
  5. class Plugin::Sqlmap < Msf::Plugin
  6. class SqlmapCommandDispatcher
  7. include Msf::Ui::Console::CommandDispatcher
  8. def name
  9. 'Sqlmap'
  10. end
  11. def commands
  12. {
  13. 'sqlmap_new_task' => 'Create a new task',
  14. 'sqlmap_connect' => 'sqlmap_connect <host> [<port>]',
  15. 'sqlmap_list_tasks' => 'List the knows tasks. New tasks are not stored in DB, so lives as long as the console does',
  16. 'sqlmap_get_option' => 'Get an option for a task',
  17. 'sqlmap_set_option' => 'Set an option for a task',
  18. 'sqlmap_start_task' => 'Start the task',
  19. 'sqlmap_get_status' => 'Get the status of a task',
  20. 'sqlmap_get_log' => 'Get the running log of a task',
  21. 'sqlmap_get_data' => 'Get the resulting data of the task',
  22. 'sqlmap_save_data' => 'Save the resulting data as web_vulns'
  23. }
  24. end
  25. def cmd_sqlmap_connect(*args)
  26. if args.empty?
  27. print_error('Need a host, and optionally a port')
  28. return
  29. end
  30. @host, @port = args
  31. if !@port
  32. @port = '8775'
  33. end
  34. @manager = Sqlmap::Manager.new(Sqlmap::Session.new(@host, @port))
  35. print_good("Set connection settings for host #{@host} on port #{@port}")
  36. end
  37. def cmd_sqlmap_set_option(*args)
  38. unless args.length == 3
  39. print_error('Usage:')
  40. print_error('\tsqlmap_set_option <taskid> <option_name> <option_value>')
  41. return
  42. end
  43. unless @manager
  44. print_error('Please run sqlmap_connect <host> first.')
  45. return
  46. end
  47. val = args[2] =~ /^\d+$/ ? args[2].to_i : args[2]
  48. res = @manager.set_option(@hid_tasks[args[0]], args[1], val)
  49. print_status("Success: #{res['success']}")
  50. end
  51. def cmd_sqlmap_start_task(*args)
  52. if args.empty?
  53. print_error('Usage:')
  54. print_error('\tsqlmap_start_task <taskid> [<url>]')
  55. return
  56. end
  57. options = {}
  58. options['url'] = args[1] if args.length == 2
  59. if !options['url'] && @tasks[@hid_tasks[args[0]]]['url'] == ''
  60. print_error('You need to specify a URL either as an argument to sqlmap_start_task or sqlmap_set_option')
  61. return
  62. end
  63. unless @manager
  64. print_error('Please run sqlmap_connect <host> first.')
  65. return
  66. end
  67. res = @manager.start_task(@hid_tasks[args[0]], options)
  68. print_status("Started task: #{res['success']}")
  69. end
  70. def cmd_sqlmap_get_log(*args)
  71. unless args.length == 1
  72. print_error('Usage:')
  73. print_error('\tsqlmap_get_log <taskid>')
  74. return
  75. end
  76. unless @manager
  77. print_error('Please run sqlmap_connect <host> first.')
  78. return
  79. end
  80. res = @manager.get_task_log(@hid_tasks[args[0]])
  81. res['log'].each do |message|
  82. print_status("[#{message['time']}] #{message['level']}: #{message['message']}")
  83. end
  84. end
  85. def cmd_sqlmap_get_status(*args)
  86. unless args.length == 1
  87. print_error('Usage:')
  88. print_error('\tsqlmap_get_status <taskid>')
  89. return
  90. end
  91. unless @manager
  92. print_error('Please run sqlmap_connect <host> first.')
  93. return
  94. end
  95. res = @manager.get_task_status(@hid_tasks[args[0]])
  96. print_status("Status: #{res['status']}")
  97. end
  98. def cmd_sqlmap_get_data(*args)
  99. unless args.length == 1
  100. print_error('Usage:')
  101. print_error('\tsqlmap_get_data <taskid>')
  102. return
  103. end
  104. @hid_tasks ||= {}
  105. @tasks ||= {}
  106. unless @manager
  107. print_error('Please run sqlmap_connect <host> first.')
  108. return
  109. end
  110. @tasks[@hid_tasks[args[0]]] = @manager.get_options(@hid_tasks[args[0]])['options']
  111. print_line
  112. print_status("URL: #{@tasks[@hid_tasks[args[0]]]['url']}")
  113. res = @manager.get_task_data(@hid_tasks[args[0]])
  114. tbl = Rex::Text::Table.new(
  115. 'Columns' => ['Title', 'Payload']
  116. )
  117. res['data'].each do |d|
  118. d['value'].each do |v|
  119. v['data'].each do |i|
  120. title = i[1]['title'].split('-')[0]
  121. payload = i[1]['payload']
  122. tbl << [title, payload]
  123. end
  124. end
  125. end
  126. print_line
  127. print_line tbl.to_s
  128. print_line
  129. end
  130. def cmd_sqlmap_save_data(*args)
  131. unless args.length == 1
  132. print_error('Usage:')
  133. print_error('\tsqlmap_save_data <taskid>')
  134. return
  135. end
  136. unless framework.db && framework.db.usable
  137. print_error('No database is connected or usable')
  138. return
  139. end
  140. @hid_tasks ||= {}
  141. @tasks ||= {}
  142. unless @manager
  143. print_error('Please run sqlmap_connect <host> first.')
  144. return
  145. end
  146. @tasks[@hid_tasks[args[0]]] = @manager.get_options(@hid_tasks[args[0]])['options']
  147. print_line
  148. print_status('URL: ' + @tasks[@hid_tasks[args[0]]]['url'])
  149. res = @manager.get_task_data(@hid_tasks[args[0]])
  150. web_vuln_info = {}
  151. url = @tasks[@hid_tasks[args[0]]]['url']
  152. proto = url.split(':')[0]
  153. host = url.split('/')[2]
  154. port = 80
  155. host, port = host.split(':') if host.include?(':')
  156. path = '/' + url.split('/')[3..(url.split('/').length - 1)].join('/')
  157. query = url.split('?')[1]
  158. web_vuln_info[:web_site] = url
  159. web_vuln_info[:path] = path
  160. web_vuln_info[:query] = query
  161. web_vuln_info[:host] = host
  162. web_vuln_info[:port] = port
  163. web_vuln_info[:ssl] = (proto =~ /https/)
  164. web_vuln_info[:category] = 'imported from sqlmap'
  165. res['data'].each do |d|
  166. d['value'].each do |v|
  167. web_vuln_info[:pname] = v['parameter']
  168. web_vuln_info[:method] = v['place']
  169. web_vuln_info[:payload] = v['suffix']
  170. v['data'].each_value do |i|
  171. web_vuln_info[:name] = i['title']
  172. web_vuln_info[:description] = res.to_json
  173. web_vuln_info[:proof] = i['payload']
  174. framework.db.report_web_vuln(web_vuln_info)
  175. end
  176. end
  177. end
  178. print_good('Saved vulnerabilities to database.')
  179. end
  180. def cmd_sqlmap_get_option(*args)
  181. @hid_tasks ||= {}
  182. @tasks ||= {}
  183. unless args.length == 2
  184. print_error('Usage:')
  185. print_error('\tsqlmap_get_option <taskid> <option_name>')
  186. end
  187. unless @manager
  188. print_error('Please run sqlmap_connect <host> first.')
  189. return
  190. end
  191. arg = args.first
  192. task_options = @manager.get_options(@hid_tasks[arg])
  193. @tasks[@hid_tasks[arg]] = task_options['options']
  194. if @tasks[@hid_tasks[arg]]
  195. print_good("#{args[1]} : #{@tasks[@hid_tasks[arg]][args[1]]}")
  196. else
  197. print_error("Option #{arg} doesn't exist")
  198. end
  199. end
  200. def cmd_sqlmap_new_task
  201. @hid_tasks ||= {}
  202. @tasks ||= {}
  203. unless @manager
  204. print_error('Please run sqlmap_connect <host> first.')
  205. return
  206. end
  207. task_id = @manager.new_task
  208. if task_id['taskid']
  209. t_id = task_id['taskid'].to_s
  210. @hid_tasks[(@hid_tasks.length + 1).to_s] = t_id
  211. task_options = @manager.get_options(t_id)
  212. @tasks[@hid_tasks[@hid_tasks.length]] = task_options['options']
  213. print_good("Created task: #{@hid_tasks.length}")
  214. else
  215. print_error("Error connecting to the server. Please make sure the sqlmapapi server is running at #{@host}:#{@port}")
  216. end
  217. end
  218. def cmd_sqlmap_list_tasks
  219. @hid_tasks ||= {}
  220. @tasks ||= {}
  221. @hid_tasks.each_key do |task|
  222. print_good("Task ID: #{task}")
  223. end
  224. end
  225. end
  226. def initialize(framework, opts)
  227. super
  228. add_console_dispatcher(SqlmapCommandDispatcher)
  229. print_status('Sqlmap plugin loaded')
  230. end
  231. def cleanup
  232. remove_console_dispatcher('Sqlmap')
  233. end
  234. def name
  235. 'Sqlmap'
  236. end
  237. def desc
  238. 'sqlmap plugin for Metasploit'
  239. end
  240. end
  241. end