mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-18 14:35:26 +00:00
* add flow logic * progress * working POC * fix string slice normalization issue in variables * update * fix nil panic * remove poll() * load file with sandbox and more * fix failing integration tests * JS: log: print in vardump format * fix missing id in protocols * fix proto prefix in template context * flow: add unit tests * conditional flow support using flow * fix proto callbacks + more unit tests * adds integration test * conditional flow: check if req has any matchers * fix lint error * deprecate iterate-all+ missing multi-proto implementation * fix ip input in raw request * JS: feat dedupe object+ more builtin funcs * feat: hide protocol result using hide * feat: async execution * complete async execution support * fix condition-flow without any matchers * refactor: template executer package (tmplexec) * flow executor working * fix data race in templateCtx * templateCtx redesign * fix failing unit test * add multiprotocol support to deprecated syntax * fix race condition in utils & tlsx * add documentation in flow package * remove regions.txt file * fix minor issue with self contained templates * fix typos of copilot * dep + misc update * fix reqID: use req.Type instead of template.Type --------- Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com>
121 lines
4.3 KiB
Go
121 lines
4.3 KiB
Go
package generators
|
|
|
|
import (
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"testing"
|
|
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/catalog/config"
|
|
"github.com/projectdiscovery/nuclei/v2/pkg/catalog/disk"
|
|
osutils "github.com/projectdiscovery/utils/os"
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestLoadPayloads(t *testing.T) {
|
|
// since we are changing value of global variable i.e templates directory
|
|
// run this test as subprocess
|
|
if os.Getenv("LOAD_PAYLOAD_NO_ACCESS") != "1" {
|
|
cmd := exec.Command(os.Args[0], "-test.run=TestLoadPayloadsWithAccess")
|
|
cmd.Env = append(os.Environ(), "LOAD_PAYLOAD_NO_ACCESS=1")
|
|
err := cmd.Run()
|
|
if e, ok := err.(*exec.ExitError); ok && !e.Success() {
|
|
return
|
|
}
|
|
if err != nil {
|
|
t.Fatalf("process ran with err %v, want exit status 1", err)
|
|
}
|
|
}
|
|
templateDir := getTemplatesDir(t)
|
|
config.DefaultConfig.SetTemplatesDir(templateDir)
|
|
|
|
generator := &PayloadGenerator{catalog: disk.NewCatalog(templateDir), options: getOptions(false)}
|
|
fullpath := filepath.Join(templateDir, "payloads.txt")
|
|
|
|
// Test sandbox
|
|
t.Run("templates-directory", func(t *testing.T) {
|
|
// testcase when loading file from template directory and template file is in root
|
|
// expected to succeed
|
|
values, err := generator.loadPayloads(map[string]interface{}{
|
|
"new": fullpath,
|
|
}, "/test")
|
|
require.NoError(t, err, "could not load payloads")
|
|
require.Equal(t, map[string][]string{"new": {"test", "another"}}, values, "could not get values")
|
|
})
|
|
t.Run("templates-path-relative", func(t *testing.T) {
|
|
// testcase when loading file from template directory and template file is current working directory
|
|
// expected to fail since this is LFI
|
|
_, err := generator.loadPayloads(map[string]interface{}{
|
|
"new": "../../../../../../../../../etc/passwd",
|
|
}, ".")
|
|
require.Error(t, err, "could load payloads")
|
|
})
|
|
t.Run("template-directory", func(t *testing.T) {
|
|
// testcase when loading file from template directory and template file is inside template directory
|
|
// expected to succeed
|
|
values, err := generator.loadPayloads(map[string]interface{}{
|
|
"new": fullpath,
|
|
}, filepath.Join(templateDir, "test.yaml"))
|
|
require.NoError(t, err, "could not load payloads")
|
|
require.Equal(t, map[string][]string{"new": {"test", "another"}}, values, "could not get values")
|
|
})
|
|
|
|
t.Run("invalid", func(t *testing.T) {
|
|
// testcase when loading file from /etc/passwd and template file is at root i.e /
|
|
// expected to fail since this is LFI
|
|
values, err := generator.loadPayloads(map[string]interface{}{
|
|
"new": "/etc/passwd",
|
|
}, "/random")
|
|
require.Error(t, err, "could load payloads")
|
|
require.Equal(t, 0, len(values), "could get values")
|
|
|
|
// testcase when loading file from template directory and template file is at root i.e /
|
|
// expected to succeed
|
|
values, err = generator.loadPayloads(map[string]interface{}{
|
|
"new": fullpath,
|
|
}, "/random")
|
|
require.NoError(t, err, "could load payloads %v", values)
|
|
require.Equal(t, 1, len(values), "could get values")
|
|
require.Equal(t, []string{"test", "another"}, values["new"], "could get values")
|
|
})
|
|
}
|
|
|
|
func TestLoadPayloadsWithAccess(t *testing.T) {
|
|
// since we are changing value of global variable i.e templates directory
|
|
// run this test as subprocess
|
|
if os.Getenv("LOAD_PAYLOAD_WITH_ACCESS") != "1" {
|
|
cmd := exec.Command(os.Args[0], "-test.run=TestLoadPayloadsWithAccess")
|
|
cmd.Env = append(os.Environ(), "LOAD_PAYLOAD_WITH_ACCESS=1")
|
|
err := cmd.Run()
|
|
if e, ok := err.(*exec.ExitError); ok && !e.Success() {
|
|
return
|
|
}
|
|
if err != nil {
|
|
t.Fatalf("process ran with err %v, want exit status 1", err)
|
|
}
|
|
}
|
|
templateDir := getTemplatesDir(t)
|
|
config.DefaultConfig.SetTemplatesDir(templateDir)
|
|
|
|
generator := &PayloadGenerator{catalog: disk.NewCatalog(templateDir), options: getOptions(true)}
|
|
|
|
t.Run("no-sandbox-unix", func(t *testing.T) {
|
|
if osutils.IsWindows() {
|
|
return
|
|
}
|
|
_, err := generator.loadPayloads(map[string]interface{}{
|
|
"new": "/etc/passwd",
|
|
}, "/random")
|
|
require.NoError(t, err, "could load payloads")
|
|
})
|
|
}
|
|
|
|
func getTemplatesDir(t *testing.T) string {
|
|
tempdir, err := os.MkdirTemp("", "templates-*")
|
|
require.NoError(t, err, "could not create temp dir")
|
|
fullpath := filepath.Join(tempdir, "payloads.txt")
|
|
err = os.WriteFile(fullpath, []byte("test\nanother"), 0777)
|
|
require.NoError(t, err, "could not write payload")
|
|
return tempdir
|
|
}
|