mirror of
https://github.com/thegeeklab/ansible-later.git
synced 2024-11-18 02:40:40 +00:00
116 lines
3.6 KiB
Python
116 lines
3.6 KiB
Python
# -*- coding:utf-8 -*-
|
|
#
|
|
# Copyright 2014 Hewlett-Packard Development Company, L.P.
|
|
#
|
|
# Licensed under the Apache License, Version 2.0 (the "License"); you may
|
|
# not use this file except in compliance with the License. You may obtain
|
|
# a copy of the License at
|
|
#
|
|
# http://www.apache.org/licenses/LICENSE-2.0
|
|
#
|
|
# Unless required by applicable law or agreed to in writing, software
|
|
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
# License for the specific language governing permissions and limitations
|
|
# under the License.
|
|
|
|
r"""
|
|
============================
|
|
B608: Test for SQL injection
|
|
============================
|
|
|
|
An SQL injection attack consists of insertion or "injection" of a SQL query via
|
|
the input data given to an application. It is a very common attack vector. This
|
|
plugin test looks for strings that resemble SQL statements that are involved in
|
|
some form of string building operation. For example:
|
|
|
|
- "SELECT %s FROM derp;" % var
|
|
- "SELECT thing FROM " + tab
|
|
- "SELECT " + val + " FROM " + tab + ...
|
|
- "SELECT {} FROM derp;".format(var)
|
|
|
|
Unless care is taken to sanitize and control the input data when building such
|
|
SQL statement strings, an injection attack becomes possible. If strings of this
|
|
nature are discovered, a LOW confidence issue is reported. In order to boost
|
|
result confidence, this plugin test will also check to see if the discovered
|
|
string is in use with standard Python DBAPI calls `execute` or `executemany`.
|
|
If so, a MEDIUM issue is reported. For example:
|
|
|
|
- cursor.execute("SELECT %s FROM derp;" % var)
|
|
|
|
|
|
:Example:
|
|
|
|
.. code-block:: none
|
|
|
|
>> Issue: Possible SQL injection vector through string-based query
|
|
construction.
|
|
Severity: Medium Confidence: Low
|
|
Location: ./examples/sql_statements_without_sql_alchemy.py:4
|
|
3 query = "DELETE FROM foo WHERE id = '%s'" % identifier
|
|
4 query = "UPDATE foo SET value = 'b' WHERE id = '%s'" % identifier
|
|
5
|
|
|
|
.. seealso::
|
|
|
|
- https://www.owasp.org/index.php/SQL_Injection
|
|
- https://security.openstack.org/guidelines/dg_parameterize-database-queries.html # noqa
|
|
|
|
.. versionadded:: 0.9.0
|
|
|
|
"""
|
|
|
|
import ast
|
|
import re
|
|
|
|
import bandit
|
|
from bandit.core import test_properties as test
|
|
from bandit.core import utils
|
|
|
|
SIMPLE_SQL_RE = re.compile(
|
|
r'(select\s.*from\s|'
|
|
r'delete\s+from\s|'
|
|
r'insert\s+into\s.*values\s|'
|
|
r'update\s.*set\s)',
|
|
re.IGNORECASE | re.DOTALL,
|
|
)
|
|
|
|
|
|
def _check_string(data):
|
|
return SIMPLE_SQL_RE.search(data) is not None
|
|
|
|
|
|
def _evaluate_ast(node):
|
|
wrapper = None
|
|
statement = ''
|
|
|
|
if isinstance(node.parent, ast.BinOp):
|
|
out = utils.concat_string(node, node.parent)
|
|
wrapper = out[0].parent
|
|
statement = out[1]
|
|
elif (isinstance(node.parent, ast.Attribute)
|
|
and node.parent.attr == 'format'):
|
|
statement = node.s
|
|
# Hierarchy for "".format() is Wrapper -> Call -> Attribute -> Str
|
|
wrapper = node.parent.parent.parent
|
|
|
|
if isinstance(wrapper, ast.Call): # wrapped in "execute" call?
|
|
names = ['execute', 'executemany']
|
|
name = utils.get_called_name(wrapper)
|
|
return (name in names, statement)
|
|
else:
|
|
return (False, statement)
|
|
|
|
|
|
@test.checks('Str')
|
|
@test.test_id('B608')
|
|
def hardcoded_sql_expressions(context):
|
|
val = _evaluate_ast(context.node)
|
|
if _check_string(val[1]):
|
|
return bandit.Issue(
|
|
severity=bandit.MEDIUM,
|
|
confidence=bandit.MEDIUM if val[0] else bandit.LOW,
|
|
text="Possible SQL injection vector through string-based "
|
|
"query construction."
|
|
)
|