all files / src/checks/server/ check_code_disclosure.js

100% Statements 36/36
100% Branches 8/8
100% Functions 3/3
100% Lines 36/36
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107                                                                                                                          87× 87×                    
/**
 * @license Apache-2.0
 * Copyright (C) 2016 The Sitecheck Project
 *
 * Licensed under the Apache License, Version 2.0 (the "License");
 * you may not use this file except in compliance with the License.
 * You may obtain a copy of the License at
 *
 *      http://www.apache.org/licenses/LICENSE-2.0
 *
 * Unless required by applicable law or agreed to in writing, software
 * distributed under the License is distributed on an "AS IS" BASIS,
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 * See the License for the specific language governing permissions and
 * limitations under the License.
 */
"use strict";
 
var Check = require('../../check');
var request = require('../../requestwrapper');
const CONSTANTS = require("../../constants.js");
 
const PHP = 'PHP';
const ASP = 'ASP';
const JSP = 'JSP';
const ASPX = 'ASPX';
const UNKNOWN = 'Unknown';
const SHELL = 'Shell script';
const JAVA = 'Java';
const RUBY = 'Ruby';
const PYTHON = 'Python';
const GROOVY = 'Groovy';
 
const SOURCE_CODE = [
    { "regEx": '<\\?php .*? \\?>', "language": PHP },
    { "regEx": '<\\?php\\n.*?\\?>', "language": PHP },
    { "regEx": '<\\?php\\r.*?\\?>', "language": PHP },
    { "regEx": '<\\?php\\n.*?\\n\\?>', "language": PHP },
    { "regEx": '<\\?php\\r.*?\\r\\?>', "language": PHP },
    { "regEx": '<\\? .*?\\?>', "language": PHP },
    { "regEx": '<\\?\n.*?\\?>', "language": PHP },
    { "regEx": '<\\?\r.*?\\?>', "language": PHP },
    { "regEx": '<% .*?%>', "language": ASP + "/" + JSP },
    { "regEx": '<%\n.*?%>', "language": ASP + "/" + JSP },
    { "regEx": '<%\r.*?%>', "language": ASP + "/" + JSP },
    { "regEx": '<%@ .*?%>', "language": ASPX },
    { "regEx": '<%@\n.*?%>', "language": ASPX },
    { "regEx": '<%@\r.*?%>', "language": ASPX },
    { "regEx": '<asp:.*?%>', "language": ASPX },
    { "regEx": '<jsp:.*?>', "language": JSP },
    { "regEx": '<%! .*%>', "language": JSP },
    { "regEx": '<%!\n.*%>', "language": JSP },
    { "regEx": '<%!\r.*%>', "language": JSP },
    { "regEx": '<%=.*%>', "language": JSP + "/" + PHP + "/" + RUBY },
    { "regEx": '<!--\\s*%.*?%(--)?>', "language": PHP },
    { "regEx": '<!--\\s*\?.*?\\?(--)?>', "language": ASP + "/" + JSP },
    { "regEx": '<!--\s*jsp:.*?(--)?>', "language": JSP },
    { "regEx": '#include <', "language": UNKNOWN },
    { "regEx": '#!\/usr', "language": SHELL },
    { "regEx": '#!\/bin', "language": SHELL },
    { "regEx": 'import java\.', "language": JAVA },
    { "regEx": 'public class .+\{', "language": JAVA },
    { "regEx": 'package\s\w+\;', "language": JAVA },
    { "regEx": '<!--g:render', "language": GROOVY },
    { "regEx": 'def .*?\(.*?\):\n', "language": PYTHON },
    { "regEx": 'class .*?< .*?end', "language": RUBY }
];
 
const BLACKLIST = ['xml', 'xpacket'];
 
module.exports = class CheckCodeDisclosure extends Check {
    constructor(target) {
        super(CONSTANTS.TARGETTYPE.SERVER, CONSTANTS.CHECKFAMILY.SECURITY, false, true, target);
    }
 
    _check(cancellationToken, done) {
        var self = this;
        var timeout = 15000;
            request.get({ url: self.target.uri, timeout: timeout, cancellationToken: cancellationToken }, function (err, res, body) {
                if (self._handleError(err)) {
                    done();
                    return;
                }
 
                for (let reg of SOURCE_CODE) {
                    let matched = body.match(new RegExp(reg.regEx, 'i'));
                    if (matched) {
                        for (let blacklist_item in BLACKLIST) {
                            if (matched[0].indexOf(blacklist_item) === -1) {
                                if (res.statusCode === 404) {
                                    self._raiseIssue("code_disclosure.xml", self.target.uri, "There is a code disclosure in your custom 404 script at '" + res.request.uri.href + "'", true);
                                    done();
                                    return;
                                }
                                else {
                                    self._raiseIssue("code_disclosure.xml", self.target.uri, reg.language + " tag non interpreted by browser at '" + res.request.uri.href + "'", true);
                                    done();
                                    return;
                                }
                            }
                        }
                    }
                }
                done();
            });
    }
};