mirror of
https://github.com/defparam/smuggler
synced 2024-11-14 16:05:05 +00:00
b3516c3684
initial checkin
461 lines
15 KiB
Python
461 lines
15 KiB
Python
#!/usr/bin/python3
|
|
# MIT License
|
|
#
|
|
# Copyright (c) 2020 Evan Custodio
|
|
#
|
|
# Permission is hereby granted, free of charge, to any person obtaining a copy
|
|
# of this software and associated documentation files (the "Software"), to deal
|
|
# in the Software without restriction, including without limitation the rights
|
|
# to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
|
|
# copies of the Software, and to permit persons to whom the Software is
|
|
# furnished to do so, subject to the following conditions:
|
|
#
|
|
# The above copyright notice and this permission notice shall be included in all
|
|
# copies or substantial portions of the Software.
|
|
#
|
|
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
|
|
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
|
|
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
|
|
# AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
|
|
# LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
|
|
# OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
|
|
# SOFTWARE.
|
|
import argparse
|
|
import re
|
|
import time
|
|
import sys
|
|
import os
|
|
import random
|
|
import string
|
|
import importlib
|
|
import hashlib
|
|
from copy import deepcopy
|
|
from time import sleep
|
|
from datetime import datetime
|
|
from lib.Payload import Payload, Chunked, EndChunk
|
|
from lib.EasySSL import EasySSL
|
|
from lib.colorama import Fore, Style
|
|
|
|
class Desyncr():
|
|
def __init__(self, configfile, smhost, smport=443, url="", method="GET", endpoint="/", SSLFlag=False, logh=None, smargs=None):
|
|
self._configfile = configfile
|
|
self._host = smhost
|
|
self._port = smport
|
|
self._method = method
|
|
self._endpoint = endpoint
|
|
self._vhost = smargs.vhost
|
|
self._url = url
|
|
self._timeout = float(smargs.timeout)
|
|
self.ssl_flag = SSLFlag
|
|
self._logh = logh
|
|
self._quiet = smargs.quiet
|
|
self._exit_early = smargs.exit_early
|
|
self._attempts = 0
|
|
self._cookies = []
|
|
|
|
def _test(self, payload_obj):
|
|
try:
|
|
web = EasySSL(self.ssl_flag)
|
|
web.connect(self._host, self._port, self._timeout)
|
|
web.send(str(payload_obj).encode())
|
|
#print(payload_obj)
|
|
start_time = datetime.now()
|
|
res = web.recv_nb(self._timeout)
|
|
end_time = datetime.now()
|
|
web.close()
|
|
if res is None:
|
|
delta_time = end_time - start_time
|
|
if delta_time.seconds < (self._timeout-1):
|
|
return (2, res, payload_obj) # Return code 2 if disconnected before timeout
|
|
return (1, res, payload_obj) # Return code 1 if connection timedout
|
|
# Filter out problematic characters
|
|
res_filtered = ""
|
|
for single in res:
|
|
if single > 0x7F:
|
|
res_filtered += '\x30'
|
|
else:
|
|
res_filtered += chr(single)
|
|
res = res_filtered
|
|
#if '504' in res:
|
|
|
|
#print("\n\n"+str(str(payload_obj)))
|
|
#print("\n\n"+res)
|
|
return (0, res, payload_obj) # Return code 0 if normal response returned
|
|
except Exception as exception_data:
|
|
#print(exception_data)
|
|
return (-1, None, payload_obj) # Return code -1 if some except occured
|
|
|
|
def _get_cookies(self):
|
|
RN = "\r\n"
|
|
try:
|
|
cookies = []
|
|
web = EasySSL(self.ssl_flag)
|
|
web.connect(self._host, self._port, 2.0)
|
|
p = Payload()
|
|
p.host = self._host
|
|
p.method = "GET"
|
|
p.endpoint = self._endpoint
|
|
p.header = "__METHOD__ __ENDPOINT__?cb=__RANDOM__ HTTP/1.1" + RN
|
|
p.header += "Host: __HOST__" + RN
|
|
p.header += "User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.87 Safari/537.36" + RN
|
|
p.header += "Content-type: application/x-www-form-urlencoded; charset=UTF-8" + RN
|
|
p.header += "Content-Length: 0" + RN
|
|
p.body = ""
|
|
#print (str(p))
|
|
web.send(str(p).encode())
|
|
sleep(0.5)
|
|
res = web.recv_nb(2.0)
|
|
web.close()
|
|
if (res is not None):
|
|
res = res.decode().split("\r\n")
|
|
for elem in res:
|
|
if len(elem) > 11:
|
|
if elem[0:11].lower().replace(" ", "") == "set-cookie:":
|
|
cookie = elem.lower().replace("set-cookie:","")
|
|
cookie = cookie.split(";")[0] + ';'
|
|
cookies += [cookie]
|
|
info = ((Fore.CYAN + str(len(cookies))+ Fore.MAGENTA), self._logh)
|
|
print_info("Cookies : %s (Appending to the attack)" % (info[0]))
|
|
self._cookies += cookies
|
|
return True
|
|
except Exception as exception_data:
|
|
error = ((Fore.CYAN + "Unable to connect to host"+ Fore.MAGENTA), self._logh)
|
|
print_info("Error : %s" % (error[0]))
|
|
return False
|
|
|
|
def run(self):
|
|
RN = "\r\n"
|
|
mutations = {}
|
|
|
|
if not self._get_cookies():
|
|
return
|
|
|
|
if (self._configfile[1] != '/'):
|
|
self._configfile = os.path.dirname(os.path.abspath(__file__)) + "/configs/" + self._configfile
|
|
|
|
try:
|
|
f = open(self._configfile)
|
|
except:
|
|
error = ((Fore.CYAN + "Cannot find config file"+ Fore.MAGENTA), self._logh)
|
|
print_info("Error : %s" % (error[0]))
|
|
exit(1)
|
|
|
|
script = f.read()
|
|
f.close()
|
|
|
|
exec(script)
|
|
|
|
for mutation_name in mutations.keys():
|
|
if self._create_exec_test(mutation_name, mutations[mutation_name]) and self._exit_early:
|
|
break
|
|
|
|
if self._quiet:
|
|
sys.stdout.write("\r"+" "*100+"\r")
|
|
|
|
# ptype == 0 (Attack payload, timeout could mean potential TECL desync)
|
|
# ptype == 1 (Edgecase payload, expected to work)
|
|
def _check_tecl(self, payload, ptype=0):
|
|
te_payload = deepcopy(payload)
|
|
if (self._vhost == ""):
|
|
te_payload.host = self._host
|
|
else:
|
|
te_payload.host = self._vhost
|
|
te_payload.method = self._method
|
|
te_payload.endpoint = self._endpoint
|
|
|
|
if len(self._cookies) > 0:
|
|
te_payload.header += "Cookie: " + ''.join(self._cookies) + "\r\n"
|
|
|
|
if not ptype:
|
|
te_payload.cl = 6 # timeout val == 6, good value == 5
|
|
else:
|
|
te_payload.cl = 5 # timeout val == 6, good value == 5
|
|
te_payload.body = EndChunk+"X"
|
|
#print (te_payload)
|
|
return self._test(te_payload)
|
|
|
|
# ptype == 0 (timeout payload, timeout could mean potential CLTE desync)
|
|
# ptype == 1 (Edgecase payload, expected to work)
|
|
def _check_clte(self, payload, ptype=0):
|
|
te_payload = deepcopy(payload)
|
|
if (self._vhost == ""):
|
|
te_payload.host = self._host
|
|
else:
|
|
te_payload.host = self._vhost
|
|
te_payload.method = self._method
|
|
te_payload.endpoint = self._endpoint
|
|
|
|
if len(self._cookies) > 0:
|
|
te_payload.header += "Cookie: " + ''.join(self._cookies) + "\r\n"
|
|
|
|
if not ptype:
|
|
te_payload.cl = 4 # timeout val == 4, good value == 11
|
|
else:
|
|
te_payload.cl = 11 # timeout val == 4, good value == 11
|
|
te_payload.body = Chunked("Z")+EndChunk
|
|
#print (te_payload)
|
|
return self._test(te_payload)
|
|
|
|
|
|
def _create_exec_test(self, name, te_payload):
|
|
def pretty_print(name, dismsg):
|
|
spacing = 13
|
|
sys.stdout.write("\r"+" "*100+"\r")
|
|
msg = Style.BRIGHT + Fore.MAGENTA + "[%s]%s: %s" % \
|
|
(Fore.CYAN + name + Fore.MAGENTA, " "*(spacing-len(name)), dismsg)
|
|
sys.stdout.write(CF(msg))
|
|
sys.stdout.flush()
|
|
|
|
if dismsg[-1] == "\n":
|
|
ansi_escape = re.compile(r'\x1B[@-_][0-?]*[ -/]*[@-~]')
|
|
plaintext = ansi_escape.sub('', msg)
|
|
if self._logh is not None:
|
|
self._logh.write(plaintext)
|
|
self._logh.flush()
|
|
|
|
|
|
def write_payload(smhost, payload, ptype):
|
|
furl = smhost.replace('.', '_')
|
|
if (self.ssl_flag):
|
|
furl = "https_" + furl
|
|
else:
|
|
furl = "http_" + furl
|
|
if os.path.islink(sys.argv[0]):
|
|
_me = os.readlink(sys.argv[0])
|
|
else:
|
|
_me = sys.argv[0]
|
|
fname = os.path.abspath(os.path.dirname(_me)) + "/payloads/%s_%s_%s.txt" % (furl,ptype,name)
|
|
pretty_print("CRITICAL", "%s Payload: %s URL: %s\n" % \
|
|
(Fore.MAGENTA+ptype, Fore.CYAN+fname+Fore.MAGENTA, Fore.CYAN+self._url))
|
|
with open(fname, 'wb') as file:
|
|
file.write(bytes(str(payload),'utf-8'))
|
|
|
|
# First lets test TECL
|
|
pretty_print(name, "Checking TECL...")
|
|
start_time = time.time()
|
|
tecl_res = self._check_tecl(te_payload, 0)
|
|
tecl_time = time.time()-start_time
|
|
|
|
# Next lets test CLTE
|
|
pretty_print(name, "Checking CLTE...")
|
|
start_time = time.time()
|
|
clte_res = self._check_clte(te_payload, 0)
|
|
clte_time = time.time()-start_time
|
|
|
|
if (clte_res[0] == 1):
|
|
# Potential CLTE found
|
|
# Lets check the edge case to be sure
|
|
clte_res2 = self._check_clte(te_payload, 1)
|
|
if clte_res2[0] == 0:
|
|
self._attempts += 1
|
|
if (self._attempts < 3):
|
|
return self._create_exec_test(name, te_payload)
|
|
else:
|
|
dismsg = Fore.RED + "Potential CLTE Issue Found" + Fore.MAGENTA + " - " + Fore.CYAN + self._method + Fore.MAGENTA + " @ " + Fore.CYAN + ["http://","https://",][self.ssl_flag]+ self._host + self._endpoint + Fore.MAGENTA + " - " + Fore.CYAN + self._configfile.split('/')[-1] + "\n"
|
|
pretty_print(name, dismsg)
|
|
|
|
# Write payload out to file
|
|
write_payload(self._host, clte_res[2], "CLTE")
|
|
self._attempts = 0
|
|
return True
|
|
|
|
else:
|
|
# No edge behavior found
|
|
dismsg = Fore.YELLOW + "CLTE TIMEOUT ON BOTH LENGTH 4 AND 11" + ["\n", ""][self._quiet]
|
|
pretty_print(name, dismsg)
|
|
|
|
elif (tecl_res[0] == 1):
|
|
# Potential TECL found
|
|
# Lets check the edge case to be sure
|
|
tecl_res2 = self._check_tecl(te_payload, 1)
|
|
if tecl_res2[0] == 0:
|
|
self._attempts += 1
|
|
if (self._attempts < 3):
|
|
return self._create_exec_test(name, te_payload)
|
|
else:
|
|
#print (str(tecl_res2[2]))
|
|
#print (tecl_res2[1])
|
|
dismsg = Fore.RED + "Potential TECL Issue Found" + Fore.MAGENTA + " - " + Fore.CYAN + self._method + Fore.MAGENTA + " @ " + Fore.CYAN + ["http://","https://",][self.ssl_flag]+ self._host + self._endpoint + Fore.MAGENTA + " - " + Fore.CYAN + self._configfile.split('/')[-1] + "\n"
|
|
pretty_print(name, dismsg)
|
|
|
|
# Write payload out to file
|
|
write_payload(self._host, tecl_res[2], "TECL")
|
|
self._attempts = 0
|
|
return True
|
|
else:
|
|
# No edge behavior found
|
|
dismsg = Fore.YELLOW + "TECL TIMEOUT ON BOTH LENGTH 6 AND 5" + ["\n", ""][self._quiet]
|
|
pretty_print(name, dismsg)
|
|
|
|
|
|
#elif ((tecl_res[0] == 1) and (clte_res[0] == 1)):
|
|
# # Both types of payloads not supported
|
|
# dismsg = Fore.YELLOW + "NOT SUPPORTED" + ["\n", ""][self._quiet]
|
|
# pretty_print(name, dismsg)
|
|
elif ((tecl_res[0] == -1) or (clte_res[0] == -1)):
|
|
# ERROR
|
|
dismsg = Fore.YELLOW + "SOCKET ERROR" + ["\n", ""][self._quiet]
|
|
pretty_print(name, dismsg)
|
|
|
|
elif ((tecl_res[0] == 0) and (clte_res[0] == 0)):
|
|
# No Desync Found
|
|
tecl_msg = (Fore.MAGENTA + " (TECL: " + Fore.CYAN +"%.2f" + Fore.MAGENTA + " - " + \
|
|
Fore.CYAN +"%s" + Fore.MAGENTA + ")") % (tecl_time, tecl_res[1][9:9+3])
|
|
|
|
clte_msg = (Fore.MAGENTA + " (CLTE: " + Fore.CYAN +"%.2f" + Fore.MAGENTA + " - " + \
|
|
Fore.CYAN +"%s" + Fore.MAGENTA + ")") % (clte_time, clte_res[1][9:9+3])
|
|
|
|
dismsg = Fore.GREEN + "OK" + tecl_msg + clte_msg + ["\n", ""][self._quiet]
|
|
pretty_print(name, dismsg)
|
|
|
|
elif ((tecl_res[0] == 2) or (clte_res[0] == 2)):
|
|
# Disconnected
|
|
dismsg = Fore.YELLOW + "DISCONNECTED" + ["\n", ""][self._quiet]
|
|
pretty_print(name, dismsg)
|
|
|
|
self._attempts = 0
|
|
return False
|
|
|
|
def process_uri(uri):
|
|
#remove shouldering white spaces and go lowercase
|
|
uri = uri.strip().lower()
|
|
|
|
#if it starts with https:// then strip it
|
|
if ((len(uri) > 8) and (uri[0:8] == "https://")):
|
|
uri = uri[8:]
|
|
ssl_flag = True
|
|
std_port = 443
|
|
elif ((len(uri) > 7) and (uri[0:7] == "http://")):
|
|
uri = uri[7:]
|
|
ssl_flag = False
|
|
std_port = 80
|
|
else:
|
|
print_info("Error malformed URL not supported: %s" % (Fore.CYAN + uri))
|
|
exit(1)
|
|
|
|
#check for any forward slashes and filter only domain portion
|
|
uri_tokenized = uri.split("/")
|
|
uri = uri_tokenized[0]
|
|
smendpoint = '/' + '/'.join(uri_tokenized[1:])
|
|
|
|
#check for any port designators
|
|
uri = uri.split(":")
|
|
|
|
if len(uri) > 1:
|
|
return (uri[0], int(uri[1]), smendpoint, ssl_flag)
|
|
|
|
return (uri[0], std_port, smendpoint, ssl_flag)
|
|
|
|
def CF(text):
|
|
global NOCOLOR
|
|
if NOCOLOR:
|
|
ansi_escape = re.compile(r'\x1B[@-_][0-?]*[ -/]*[@-~]')
|
|
text = ansi_escape.sub('', text)
|
|
return text
|
|
|
|
def banner(sm_version):
|
|
print(CF(Fore.CYAN))
|
|
print(CF(r" ______ _ "))
|
|
print(CF(r" / _____) | | "))
|
|
print(CF(r"( (____ ____ _ _ ____ ____| | _____ ____ "))
|
|
print(CF(r" \____ \| \| | | |/ _ |/ _ | || ___ |/ ___)"))
|
|
print(CF(r" _____) ) | | | |_| ( (_| ( (_| | || ____| | "))
|
|
print(CF(r"(______/|_|_|_|____/ \___ |\___ |\_)_____)_| "))
|
|
print(CF(r" (_____(_____| "))
|
|
print(CF(r""))
|
|
print(CF(r" @defparam %s"%(sm_version)))
|
|
print(CF(Style.RESET_ALL))
|
|
|
|
def print_info(msg, file_handle=None):
|
|
ansi_escape = re.compile(r'\x1B[@-_][0-?]*[ -/]*[@-~]')
|
|
msg = Style.BRIGHT + Fore.MAGENTA + "[%s] %s"%(Fore.CYAN+'+'+Fore.MAGENTA, msg) + Style.RESET_ALL
|
|
plaintext = ansi_escape.sub('', msg)
|
|
print(CF(msg))
|
|
if file_handle is not None:
|
|
file_handle.write(plaintext+"\n")
|
|
|
|
if __name__ == "__main__":
|
|
global NOCOLOR
|
|
if sys.version_info < (3, 0):
|
|
print("Error: Smuggler requires Python 3.x")
|
|
sys.exit(1)
|
|
|
|
Parser = argparse.ArgumentParser()
|
|
Parser.add_argument('-u', '--url', help="Target URL with Endpoint")
|
|
Parser.add_argument('-c', action="store_true",help="")
|
|
Parser.add_argument('-v', '--vhost', default="", help="Specify a virtual host")
|
|
Parser.add_argument('-x', '--exit_early', action='store_true',help="Exit scan on first finding")
|
|
Parser.add_argument('-m', '--method', default="GET", help="HTTP method to use (e.g GET, POST) Default: GET")
|
|
Parser.add_argument('-l', '--log', help="Specify a log file")
|
|
Parser.add_argument('-q', '--quiet', action='store_true', help="Quiet mode will only log issues found")
|
|
Parser.add_argument('-t', '--timeout', default=5.0, help="Socket timeout value Default: 5")
|
|
Parser.add_argument('--no-color', action='store_true', help="Suppress color codes")
|
|
Parser.add_argument('--configfile', default="default.py", help="Filepath to the configuration file of payloads")
|
|
Args = Parser.parse_args() # returns data from the options specified (echo)
|
|
|
|
NOCOLOR = Args.no_color
|
|
if os.name == 'nt':
|
|
NOCOLOR = True
|
|
|
|
Version = "v1.1"
|
|
banner(Version)
|
|
|
|
if sys.version_info < (3, 0):
|
|
print_info("Error: Smuggler requires Python 3.x")
|
|
sys.exit(1)
|
|
|
|
# If the URL argument is not specified then check stdin
|
|
if Args.url is None:
|
|
if sys.stdin.isatty():
|
|
print_info("Error: no direct URL or piped URL specified\n")
|
|
Parser.print_help()
|
|
exit(1)
|
|
Servers = sys.stdin.read().split("\n")
|
|
else:
|
|
Servers = [Args.url + " " + Args.method]
|
|
|
|
FileHandle = None
|
|
if Args.log is not None:
|
|
try:
|
|
FileHandle = open(Args.log, "w")
|
|
except:
|
|
print_info("Error: Issue with log file destination")
|
|
print(Parser.print_help())
|
|
sys.exit(1)
|
|
|
|
for server in Servers:
|
|
# If the next on the list is blank, continue
|
|
if server == "":
|
|
continue
|
|
# Tokenize
|
|
server = server.split(" ")
|
|
|
|
# This is for the stdin case, if no method was specified default to GET
|
|
if len(server) == 1:
|
|
server += [Args.method]
|
|
|
|
# If a protocol is not specified then default to https
|
|
if server[0].lower().strip()[0:4] != "http":
|
|
server[0] = "https://" + server[0]
|
|
|
|
params = process_uri(server[0])
|
|
method = server[1].upper()
|
|
host = params[0]
|
|
port = params[1]
|
|
endpoint = params[2]
|
|
SSLFlagval = params[3]
|
|
configfile = Args.configfile
|
|
|
|
print_info("URL : %s"%(Fore.CYAN + server[0]), FileHandle)
|
|
print_info("Method : %s"%(Fore.CYAN + method), FileHandle)
|
|
print_info("Endpoint : %s"%(Fore.CYAN + endpoint), FileHandle)
|
|
print_info("Configfile : %s"%(Fore.CYAN + configfile), FileHandle)
|
|
print_info("Timeout : %s"%(Fore.CYAN + str(float(Args.timeout)) + Fore.MAGENTA + " seconds"), FileHandle)
|
|
|
|
sm = Desyncr(configfile, host, port, url=server[0], method=method, endpoint=endpoint, SSLFlag=SSLFlagval, logh=FileHandle, smargs=Args)
|
|
sm.run()
|
|
|
|
|
|
if FileHandle is not None:
|
|
FileHandle.close()
|