module WWMD attr_accessor :curl_object attr_accessor :body_data attr_accessor :post_data attr_accessor :header_data attr_accessor :use_referer attr_reader :forms attr_reader :last_error attr_reader :links # array of links (urls) attr_reader :jlinks # array of included javascript files attr_reader :spider # spider object attr_reader :scrape # scrape object attr_reader :urlparse # urlparse object attr_reader :comments attr_accessor :base_url # needed to properly munge relative urls into fq urls attr_accessor :logged_in # are we logged in? attr_accessor :opts attr_accessor :inputs # WWMD::Page is an extension of a Curl::Easy object which provides methods to # enhance and ease the performance of web application penetration testing. class Page include WWMDUtils def initialize(opts={}, &block) @opts = opts.clone DEFAULTS.each { |k,v| @opts[k] = v unless opts[k] } @spider = Spider.new(opts) @scrape = Scrape.new @base_url ||= opts[:base_url] @scrape.warn = opts[:scrape_warn] if !opts[:scrape_warn].nil? # yeah yeah... bool false @urlparse = URLParse.new() @inputs = Inputs.new(self) @logged_in = false @body_data = "" @post_data = "" @comments = [] @header_data = FormArray.new @curl_object = Curl::Easy.new @opts.each do |k,v| next if k == :proxy_url self.instance_variable_set("@#{k.to_s}".intern,v) if (@curl_object.methods.include?("#{k}=")) @curl_object.send("#{k}=",v) end end @curl_object.on_body { |data| self._body_cb(data) } @curl_object.on_header { |data| self._header_cb(data) } # cookies? @curl_object.enable_cookies = @opts[:enable_cookies] if @curl_object.enable_cookies? @curl_object.cookiejar = @opts[:cookiejar] || "./__cookiejar" end #proxy? @curl_object.proxy_url = @opts[:proxy_url] if @opts[:use_proxy] instance_eval(&block) if block_given? if opts.empty? && @scrape.warn putw "Page initialized without opts" @scrape.warn = false end end #:section: Heavy Lifting # set reporting data for the page # # Scan for comments, anchors, links and javascript includes and # set page flags. The heavy lifting for parsing is done in the # scrape class. # # returns: array [ code, page_status, body_data.size ] def set_data # reset scrape and inputs object # transparently gunzip begin io = StringIO.new(self.body_data) gz = Zlib::GzipReader.new(io) self.body_data.replace(gz.read) rescue => e end @scrape.reset(self.body_data) @inputs.set # remove comments that are css selectors for IE silliness @comments = @scrape.for_comments.reject do |c| c =~ /\[if IE\]/ || c =~ /\[if IE \d/ || c =~ /\[if lt IE \d/ end @links = @scrape.for_links.map do |url| @urlparse.parse(self.last_effective_url,url).to_s end @jlinks = @scrape.for_javascript_links @forms = @scrape.for_forms @spider.add(self.last_effective_url,@links) return [self.code,self.body_data.size] end # clear self.body_data and self.header_data def clear_data return false if self.opts[:parse] = false @body_data = "" @header_data.clear @last_error = nil end # override Curl::Easy.perform to perform page actions, # call self.set_data # # returns: array [ code, page_status, body_data.size ] # # don't call this directly if we are in console mode # use get and submit respectively for GET and POST def perform self.clear_data self.headers["Referer"] = self.cur if self.use_referer begin @curl_object.perform rescue => e @last_error = e putw "WARN: #{e.class}" if e.class =~ /Curl::Err/ end self.set_data end # replacement for Curl::Easy.http_post # # post the form attempting to remove curl supplied headers (Expect, X-Forwarded-For # call self.set_data # # if passed a regexp, escape values in the form using regexp before submitting # if passed nil for the regexp arg, the form will not be escaped # default: WWMD::ESCAPE[:url] # # returns: array [ code, body_data.size ] def submit(iform=nil,reg=WWMD::ESCAPE[:default]) ## this is just getting worse and worse if iform.class == "Symbol" reg = iform iform = nil end self.clear_data ["Expect","X-Forwarded-For","Content-length"].each { |s| self.clear_header(s) } self.headers["Referer"] = self.cur if self.use_referer unless iform unless self.form.empty? sform = self.form.clone else return "no form provided" end else sform = iform.clone # clone the form so that we don't change the original end sform.escape_all!(reg) self.url = sform.action if sform.action if sform.empty? self.http_post('') else self.http_post(self.post_data = sform.to_post) end self.set_data end # submit a form using POST string def submit_string(post_string) self.clear_data self.http_post(post_string) putw "WARN: authentication headers in response" if self.auth? self.set_data end # override for Curl::Easy.perform # # if the passed url string doesn't contain an fully qualified # path, we'll guess and prepend opts[:base_url] # # returns: array [ code, body_data.size ] def get(url=nil,parse=true) if !(url =~ /[a-z]+:\/\//) && parse self.url = @urlparse.parse(self.opts[:base_url],url).to_s if url elsif url self.url = url end self.perform putw "WARN: authentication headers in response" if self.auth? self.set_data end # GET with params and POST it as a form def post(url=nil) ep = url.clip self.url = @urlparse.parse(self.opts[:base_url],ep).to_s if ep form = url.clop.to_form self.submit(form) end # send arbitrary verb (only works with patch to taf2-curb) def verb(verb,url=nil) return false if !@curl_object.respond_to?(:http_verb) self.url = url if url self.clear_data self.headers["Referer"] = self.cur if self.use_referer self.http_verb(verb) self.set_data end #:section: Data callbacks and method_missing # callback for self.on_body def _body_cb(data) @body_data << data if data return data.length.to_i end # callback for self.on_header def _header_cb(data) myArr = Array.new(data.split(":",2)) @header_data.extend! myArr[0].to_s.strip,myArr[1].to_s.strip return data.length.to_i end # send methods not defined here to @curl_object def method_missing(methodname, *args) if WWMD.respond_to?(methodname) WWMD.send(methodname, *args) else @curl_object.send(methodname, *args) end end end end