/usr/share/w3af/plugins/evasion/modsecurity.py is in w3af-console 1.0-rc3svn3489-1.
This file is owned by root:root, with mode 0o644.
The actual contents of the file can be viewed below.
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 | '''
modsecurity.py
Copyright 2006 Andres Riancho
This file is part of w3af, w3af.sourceforge.net .
w3af is free software; you can redistribute it and/or modify
it under the terms of the GNU General Public License as published by
the Free Software Foundation version 2 of the License.
w3af is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
GNU General Public License for more details.
You should have received a copy of the GNU General Public License
along with w3af; if not, write to the Free Software
Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
'''
from core.controllers.basePlugin.baseEvasionPlugin import baseEvasionPlugin
from core.controllers.w3afException import w3afException
import core.data.parsers.urlParser as urlParser
# options
from core.data.options.option import option
from core.data.options.optionList import optionList
import urllib2
import copy
class modsecurity(baseEvasionPlugin):
'''
Evade detection using a mod_security vulnerability.
@author: Francisco Amato ( famato |at| infobyte.com.ar )
'''
def __init__(self):
baseEvasionPlugin.__init__(self)
def modifyRequest(self, request ):
'''
Mangles the request
@parameter request: urllib2.Request instance that is going to be modified by the evasion plugin
'''
# Mangle the postdata
data = request.get_data()
if data:
# Only mangle the postdata if it is a url encoded string
try:
urlParser.getQueryString('http://w3af/?' + data )
except:
pass
else:
data = '\x00' + data
headers_copy = copy.deepcopy(request.headers)
headers_copy['content-length'] = str(len(data))
request = urllib2.Request( request.get_full_url() , data,
headers_copy, request.get_origin_req_host() )
return request
def getOptions( self ):
'''
@return: A list of option objects for this plugin.
'''
ol = optionList()
return ol
def setOptions( self, OptionList ):
'''
This method sets all the options that are configured using the user interface
generated by the framework using the result of getOptions().
@parameter OptionList: A dictionary with the options for the plugin.
@return: No value is returned.
'''
pass
def getPluginDeps( self ):
'''
@return: A list with the names of the plugins that should be runned before the
current one.
'''
return []
def getPriority( self ):
'''
This function is called when sorting evasion plugins.
Each evasion plugin should implement this.
@return: An integer specifying the priority. 0 is runned first, 100 last.
'''
return 50
def getLongDesc( self ):
'''
@return: A DETAILED description of the plugin functions and features.
'''
return '''
This evasion plugin performs a bypass for mod_security version 2.1.0 or less here:
- http://www.php-security.org/MOPB/BONUS-12-2007.html
Important: The evasion only works for postdata.
Example:
Postdata Input: 'a=b'
Postdata Output : '\\x00a=b'
'''
|