use crate::{
modules::{HttpModule, Module, ModuleName, ModuleVersion},
report::{Finding, ModuleResult, Severity},
Error,
};
use async_trait::async_trait;
use reqwest::Client;
pub struct Cve2017_9506 {}
impl Cve2017_9506 {
pub fn new() -> Self {
Cve2017_9506 {}
}
}
impl Module for Cve2017_9506 {
fn name(&self) -> ModuleName {
ModuleName::HttpCve2017_9506
}
fn description(&self) -> String {
String::from("Check for CVE-2017-9506 (SSRF)")
}
fn version(&self) -> ModuleVersion {
ModuleVersion(1, 0, 0)
}
fn is_aggressive(&self) -> bool {
false
}
fn severity(&self) -> Severity {
Severity::Medium
}
}
#[async_trait]
impl HttpModule for Cve2017_9506 {
async fn scan(&self, http_client: &Client, endpoint: &str) -> Result<Option<Finding>, Error> {
let url = format!(
"{}/plugins/servlet/oauth/users/icon-uri?consumerUri=https://google.com/robots.txt",
&endpoint
);
let res = http_client.get(&url).send().await?;
if !res.status().is_success() {
return Ok(None);
}
let body = res.text().await?;
if body.contains("user-agent: *") && body.contains("disallow") {
return Ok(Some(Finding {
module: self.name(),
module_version: self.version(),
severity: self.severity(),
result: ModuleResult::Url(url),
}));
}
Ok(None)
}
}