mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-23 23:55:27 +00:00
* feat: move fuzz package to root directory * feat: added support for input providers like openapi,postman,etc * feat: integration of new fuzzing logic in engine * bugfix: use and instead of or * fixed lint errors * go mod tidy * add new reqresp type + bump utils * custom http request parser * use new struct type RequestResponse * introduce unified input/target provider * abstract input formats via new inputprovider * completed input provider refactor * remove duplicated code * add sdk method to load targets * rename component url->path * add new yaml format + remove duplicated code * use gopkg.in/yaml.v3 for parsing * update .gitignore * refactor/move + docs fuzzing in http protocol * fuzz: header + query integration test using fuzzplayground * fix integration test runner in windows * feat add support for filter in http fuzz * rewrite header/query integration test with filter * add replace regex rule * support kv fuzzing + misc updates * add path fuzzing example + misc improvements * fix matchedURL + skip httpx on multi formats * cookie fuzz integration test * add json body + params body tests * feat add multipart/form-data fuzzing support * add all fuzz body integration test * misc bug fixes + minor refactor * add multipart form + body form unit tests * only run fuzzing templates if -fuzz flag is given * refactor/move fuzz playground server to pkg * fix integration test + refactor * add auth types and strategies * add file auth provider * start implementing auth logic in http * add logic in http protocol * static auth implemented for http * default :80,:443 normalization * feat: dynamic auth init * feat: dynamic auth using templates * validate targets count in openapi+swagger * inputformats: add support to accept variables * fix workflow integration test * update lazy cred fetch logic * fix unit test * drop postman support * domain related normalization * update secrets.yaml file format + misc updates * add auth prefetch option * remove old secret files * add fuzzing+auth related sdk options * fix/support multiple mode in kv header fuzzing * rename 'headers' -> 'header' in fuzzing rules * fix deadlock due to merge conflict resolution * misc update * add bool type in parsed value * add openapi validation+override+ new flags * misc updates * remove optional path parameters when unavailable * fix swagger.yaml file * misc updates * update print msg * multiple openapi validation enchancements + appMode * add optional params in required_openapi_vars.yaml file * improve warning/verbose msgs in format * fix skip-format-validation not working * use 'params/parameter' instead of 'variable' in openapi * add retry support for falky tests * fix nuclei loading ignored templates (#4849) * fix tag include logic * fix unit test * remove quoting in extractor output * remove quote in debug code command * feat: issue tracker URLs in JSON + misc fixes (#4855) * feat: issue tracker URLs in JSON + misc fixes * misc changes * feat: status update support for issues * feat: report metadata generation hook support * feat: added CLI summary of tickets created * misc changes * introduce `disable-unsigned-templates` flag (#4820) * introduce `disable-unsigned-templates` flag * minor * skip instead of exit * remove duplicate imports * use stats package + misc enhancements * force display warning + adjust skipped stats in unsigned count * include unsigned skipped templates without -dut flag --------- Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> * Purge cache on global callback set (#4840) * purge cache on global callback set * lint * purging cache * purge cache in runner after loading templates * include internal cache from parsers + add global cache register/purge via config * remove disable cache purge option --------- Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> * misc update * add application/octet-stream support * openapi: support path specific params * misc option + readme update --------- Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io> Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com> Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> Co-authored-by: Tarun Koyalwar <45962551+tarunKoyalwar@users.noreply.github.com> Co-authored-by: Dogan Can Bakir <65292895+dogancanbakir@users.noreply.github.com> Co-authored-by: Mzack9999 <mzack9999@protonmail.com>
164 lines
5.5 KiB
Go
164 lines
5.5 KiB
Go
package core
|
|
|
|
import (
|
|
"sync"
|
|
"sync/atomic"
|
|
|
|
"github.com/remeh/sizedwaitgroup"
|
|
|
|
"github.com/projectdiscovery/gologger"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/input/provider"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/output"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/contextargs"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/templates"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/templates/types"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/types/scanstrategy"
|
|
stringsutil "github.com/projectdiscovery/utils/strings"
|
|
)
|
|
|
|
// Execute takes a list of templates/workflows that have been compiled
|
|
// and executes them based on provided concurrency options.
|
|
//
|
|
// All the execution logic for the templates/workflows happens in this part
|
|
// of the engine.
|
|
func (e *Engine) Execute(templates []*templates.Template, target provider.InputProvider) *atomic.Bool {
|
|
return e.ExecuteScanWithOpts(templates, target, false)
|
|
}
|
|
|
|
// ExecuteWithResults a list of templates with results
|
|
func (e *Engine) ExecuteWithResults(templatesList []*templates.Template, target provider.InputProvider, callback func(*output.ResultEvent)) *atomic.Bool {
|
|
e.Callback = callback
|
|
return e.ExecuteScanWithOpts(templatesList, target, false)
|
|
}
|
|
|
|
// ExecuteScanWithOpts executes scan with given scanStrategy
|
|
func (e *Engine) ExecuteScanWithOpts(templatesList []*templates.Template, target provider.InputProvider, noCluster bool) *atomic.Bool {
|
|
results := &atomic.Bool{}
|
|
selfcontainedWg := &sync.WaitGroup{}
|
|
|
|
totalReqBeforeCluster := getRequestCount(templatesList) * int(target.Count())
|
|
|
|
// attempt to cluster templates if noCluster is false
|
|
var finalTemplates []*templates.Template
|
|
clusterCount := 0
|
|
if !noCluster {
|
|
finalTemplates, clusterCount = templates.ClusterTemplates(templatesList, e.executerOpts)
|
|
} else {
|
|
finalTemplates = templatesList
|
|
}
|
|
|
|
totalReqAfterClustering := getRequestCount(finalTemplates) * int(target.Count())
|
|
|
|
if !noCluster && totalReqAfterClustering < totalReqBeforeCluster {
|
|
gologger.Info().Msgf("Templates clustered: %d (Reduced %d Requests)", clusterCount, totalReqBeforeCluster-totalReqAfterClustering)
|
|
}
|
|
|
|
// 0 matches means no templates were found in the directory
|
|
if len(finalTemplates) == 0 {
|
|
return &atomic.Bool{}
|
|
}
|
|
|
|
if e.executerOpts.Progress != nil {
|
|
// Notes:
|
|
// workflow requests are not counted as they can be conditional
|
|
// templateList count is user requested templates count (before clustering)
|
|
// totalReqAfterClustering is total requests count after clustering
|
|
e.executerOpts.Progress.Init(target.Count(), len(templatesList), int64(totalReqAfterClustering))
|
|
}
|
|
|
|
if stringsutil.EqualFoldAny(e.options.ScanStrategy, scanstrategy.Auto.String(), "") {
|
|
// TODO: this is only a placeholder, auto scan strategy should choose scan strategy
|
|
// based on no of hosts , templates , stream and other optimization parameters
|
|
e.options.ScanStrategy = scanstrategy.TemplateSpray.String()
|
|
}
|
|
|
|
filtered := []*templates.Template{}
|
|
selfContained := []*templates.Template{}
|
|
// Filter Self Contained templates since they are not bound to target
|
|
for _, v := range finalTemplates {
|
|
if v.SelfContained {
|
|
selfContained = append(selfContained, v)
|
|
} else {
|
|
filtered = append(filtered, v)
|
|
}
|
|
}
|
|
|
|
// Execute All SelfContained in parallel
|
|
e.executeAllSelfContained(selfContained, results, selfcontainedWg)
|
|
|
|
strategyResult := &atomic.Bool{}
|
|
switch e.options.ScanStrategy {
|
|
case scanstrategy.TemplateSpray.String():
|
|
strategyResult = e.executeTemplateSpray(filtered, target)
|
|
case scanstrategy.HostSpray.String():
|
|
strategyResult = e.executeHostSpray(filtered, target)
|
|
}
|
|
|
|
results.CompareAndSwap(false, strategyResult.Load())
|
|
|
|
selfcontainedWg.Wait()
|
|
return results
|
|
}
|
|
|
|
// executeTemplateSpray executes scan using template spray strategy where targets are iterated over each template
|
|
func (e *Engine) executeTemplateSpray(templatesList []*templates.Template, target provider.InputProvider) *atomic.Bool {
|
|
results := &atomic.Bool{}
|
|
|
|
// wp is workpool that contains different waitgroups for
|
|
// headless and non-headless templates
|
|
wp := e.GetWorkPool()
|
|
|
|
for _, template := range templatesList {
|
|
templateType := template.Type()
|
|
|
|
var wg *sizedwaitgroup.SizedWaitGroup
|
|
if templateType == types.HeadlessProtocol {
|
|
wg = wp.Headless
|
|
} else {
|
|
wg = wp.Default
|
|
}
|
|
|
|
wg.Add()
|
|
go func(tpl *templates.Template) {
|
|
defer wg.Done()
|
|
// All other request types are executed here
|
|
// Note: executeTemplateWithTargets creates goroutines and blocks
|
|
// given template is executed on all targets
|
|
e.executeTemplateWithTargets(tpl, target, results)
|
|
}(template)
|
|
}
|
|
wp.Wait()
|
|
return results
|
|
}
|
|
|
|
// executeHostSpray executes scan using host spray strategy where templates are iterated over each target
|
|
func (e *Engine) executeHostSpray(templatesList []*templates.Template, target provider.InputProvider) *atomic.Bool {
|
|
results := &atomic.Bool{}
|
|
wp := sizedwaitgroup.New(e.options.BulkSize + e.options.HeadlessBulkSize)
|
|
|
|
target.Iterate(func(value *contextargs.MetaInput) bool {
|
|
wp.Add()
|
|
go func(targetval *contextargs.MetaInput) {
|
|
defer wp.Done()
|
|
e.executeTemplatesOnTarget(templatesList, targetval, results)
|
|
}(value)
|
|
return true
|
|
})
|
|
wp.Wait()
|
|
return results
|
|
}
|
|
|
|
// returns total requests count
|
|
func getRequestCount(templates []*templates.Template) int {
|
|
count := 0
|
|
for _, template := range templates {
|
|
// ignore requests in workflows as total requests in workflow
|
|
// depends on what templates will be called in workflow
|
|
if len(template.Workflows) > 0 {
|
|
continue
|
|
}
|
|
count += template.TotalRequests
|
|
}
|
|
return count
|
|
}
|