mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2025-12-18 03:35:27 +00:00
* feat: move fuzz package to root directory * feat: added support for input providers like openapi,postman,etc * feat: integration of new fuzzing logic in engine * bugfix: use and instead of or * fixed lint errors * go mod tidy * add new reqresp type + bump utils * custom http request parser * use new struct type RequestResponse * introduce unified input/target provider * abstract input formats via new inputprovider * completed input provider refactor * remove duplicated code * add sdk method to load targets * rename component url->path * add new yaml format + remove duplicated code * use gopkg.in/yaml.v3 for parsing * update .gitignore * refactor/move + docs fuzzing in http protocol * fuzz: header + query integration test using fuzzplayground * fix integration test runner in windows * feat add support for filter in http fuzz * rewrite header/query integration test with filter * add replace regex rule * support kv fuzzing + misc updates * add path fuzzing example + misc improvements * fix matchedURL + skip httpx on multi formats * cookie fuzz integration test * add json body + params body tests * feat add multipart/form-data fuzzing support * add all fuzz body integration test * misc bug fixes + minor refactor * add multipart form + body form unit tests * only run fuzzing templates if -fuzz flag is given * refactor/move fuzz playground server to pkg * fix integration test + refactor * add auth types and strategies * add file auth provider * start implementing auth logic in http * add logic in http protocol * static auth implemented for http * default :80,:443 normalization * feat: dynamic auth init * feat: dynamic auth using templates * validate targets count in openapi+swagger * inputformats: add support to accept variables * fix workflow integration test * update lazy cred fetch logic * fix unit test * drop postman support * domain related normalization * update secrets.yaml file format + misc updates * add auth prefetch option * remove old secret files * add fuzzing+auth related sdk options * fix/support multiple mode in kv header fuzzing * rename 'headers' -> 'header' in fuzzing rules * fix deadlock due to merge conflict resolution * misc update * add bool type in parsed value * add openapi validation+override+ new flags * misc updates * remove optional path parameters when unavailable * fix swagger.yaml file * misc updates * update print msg * multiple openapi validation enchancements + appMode * add optional params in required_openapi_vars.yaml file * improve warning/verbose msgs in format * fix skip-format-validation not working * use 'params/parameter' instead of 'variable' in openapi * add retry support for falky tests * fix nuclei loading ignored templates (#4849) * fix tag include logic * fix unit test * remove quoting in extractor output * remove quote in debug code command * feat: issue tracker URLs in JSON + misc fixes (#4855) * feat: issue tracker URLs in JSON + misc fixes * misc changes * feat: status update support for issues * feat: report metadata generation hook support * feat: added CLI summary of tickets created * misc changes * introduce `disable-unsigned-templates` flag (#4820) * introduce `disable-unsigned-templates` flag * minor * skip instead of exit * remove duplicate imports * use stats package + misc enhancements * force display warning + adjust skipped stats in unsigned count * include unsigned skipped templates without -dut flag --------- Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> * Purge cache on global callback set (#4840) * purge cache on global callback set * lint * purging cache * purge cache in runner after loading templates * include internal cache from parsers + add global cache register/purge via config * remove disable cache purge option --------- Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> * misc update * add application/octet-stream support * openapi: support path specific params * misc option + readme update --------- Co-authored-by: Sandeep Singh <sandeep@projectdiscovery.io> Co-authored-by: sandeep <8293321+ehsandeep@users.noreply.github.com> Co-authored-by: Tarun Koyalwar <tarun@projectdiscovery.io> Co-authored-by: Tarun Koyalwar <45962551+tarunKoyalwar@users.noreply.github.com> Co-authored-by: Dogan Can Bakir <65292895+dogancanbakir@users.noreply.github.com> Co-authored-by: Mzack9999 <mzack9999@protonmail.com>
187 lines
5.6 KiB
Go
187 lines
5.6 KiB
Go
package component
|
|
|
|
import (
|
|
"context"
|
|
"strings"
|
|
|
|
"github.com/projectdiscovery/retryablehttp-go"
|
|
)
|
|
|
|
// Header is a component for a request header
|
|
type Header struct {
|
|
value *Value
|
|
|
|
req *retryablehttp.Request
|
|
}
|
|
|
|
var _ Component = &Header{}
|
|
|
|
// NewHeader creates a new header component
|
|
func NewHeader() *Header {
|
|
return &Header{}
|
|
}
|
|
|
|
// Name returns the name of the component
|
|
func (q *Header) Name() string {
|
|
return RequestHeaderComponent
|
|
}
|
|
|
|
// Parse parses the component and returns the
|
|
// parsed component
|
|
func (q *Header) Parse(req *retryablehttp.Request) (bool, error) {
|
|
q.req = req
|
|
q.value = NewValue("")
|
|
|
|
parsedHeaders := make(map[string]interface{})
|
|
for key, value := range req.Header {
|
|
if len(value) == 1 {
|
|
parsedHeaders[key] = value[0]
|
|
continue
|
|
}
|
|
parsedHeaders[key] = value
|
|
}
|
|
q.value.SetParsed(parsedHeaders, "")
|
|
return true, nil
|
|
}
|
|
|
|
// Iterate iterates through the component
|
|
func (q *Header) Iterate(callback func(key string, value interface{}) error) error {
|
|
for key, value := range q.value.Parsed() {
|
|
// Skip ignored headers
|
|
if _, ok := defaultIgnoredHeaderKeys[key]; ok {
|
|
continue
|
|
}
|
|
if err := callback(key, value); err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// SetValue sets a value in the component
|
|
// for a key
|
|
func (q *Header) SetValue(key string, value string) error {
|
|
if !q.value.SetParsedValue(key, value) {
|
|
return ErrSetValue
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Delete deletes a key from the component
|
|
func (q *Header) Delete(key string) error {
|
|
if !q.value.Delete(key) {
|
|
return ErrKeyNotFound
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Rebuild returns a new request with the
|
|
// component rebuilt
|
|
func (q *Header) Rebuild() (*retryablehttp.Request, error) {
|
|
cloned := q.req.Clone(context.Background())
|
|
for key, value := range q.value.parsed {
|
|
if strings.EqualFold(key, "Host") {
|
|
cloned.Host = value.(string)
|
|
}
|
|
switch v := value.(type) {
|
|
case []interface{}:
|
|
for _, vv := range v {
|
|
if cloned.Header[key] == nil {
|
|
cloned.Header[key] = make([]string, 0)
|
|
}
|
|
cloned.Header[key] = append(cloned.Header[key], vv.(string))
|
|
}
|
|
case string:
|
|
cloned.Header[key] = []string{v}
|
|
}
|
|
}
|
|
return cloned, nil
|
|
}
|
|
|
|
// A list of headers that are essential to the request and
|
|
// must not be fuzzed.
|
|
var defaultIgnoredHeaderKeys = map[string]struct{}{
|
|
"Accept-Charset": {},
|
|
"Accept-Datetime": {},
|
|
"Accept-Encoding": {},
|
|
"Accept-Language": {},
|
|
"Accept": {},
|
|
"Access-Control-Request-Headers": {},
|
|
"Access-Control-Request-Method": {},
|
|
"Authorization": {},
|
|
"Cache-Control": {},
|
|
"Connection": {},
|
|
"Cookie": {},
|
|
"Content-Length": {},
|
|
"Content-Type": {},
|
|
"Date": {},
|
|
"Dnt": {},
|
|
"Expect": {},
|
|
"Forwarded": {},
|
|
"From": {},
|
|
"Host": {},
|
|
"If-Match": {},
|
|
"If-Modified-Since": {},
|
|
"If-None-Match": {},
|
|
"If-Range": {},
|
|
"If-Unmodified-Since": {},
|
|
"Max-Forwards": {},
|
|
"Pragma": {},
|
|
"Priority": {},
|
|
"Proxy-Authorization": {},
|
|
"Range": {},
|
|
"Sec-Ch-Ua": {},
|
|
"Sec-Ch-Ua-Mobile": {},
|
|
"Sec-Ch-Ua-Platform": {},
|
|
"Sec-Fetch-Dest": {},
|
|
"Sec-Fetch-Mode": {},
|
|
"Sec-Fetch-Site": {},
|
|
"Sec-Fetch-User": {},
|
|
"TE": {},
|
|
"Upgrade": {},
|
|
"Via": {},
|
|
"Warning": {},
|
|
"Upgrade-Insecure-Requests": {},
|
|
"X-CSRF-Token": {},
|
|
"X-Requested-With": {},
|
|
"Strict-Transport-Security": {},
|
|
"Content-Security-Policy": {},
|
|
"X-Content-Type-Options": {},
|
|
"X-Frame-Options": {},
|
|
"X-XSS-Protection": {},
|
|
"Public-Key-Pins": {},
|
|
"Referrer-Policy": {},
|
|
"Access-Control-Allow-Origin": {},
|
|
"Access-Control-Allow-Credentials": {},
|
|
"Access-Control-Expose-Headers": {},
|
|
"Access-Control-Max-Age": {},
|
|
"Access-Control-Allow-Methods": {},
|
|
"Access-Control-Allow-Headers": {},
|
|
"Server": {},
|
|
"X-Powered-By": {},
|
|
"X-AspNet-Version": {},
|
|
"X-AspNetMvc-Version": {},
|
|
"ETag": {},
|
|
"Vary": {},
|
|
"Expires": {},
|
|
"Last-Modified": {},
|
|
"X-Cache": {},
|
|
"X-Proxy-ID": {},
|
|
"CF-Ray": {}, // Cloudflare
|
|
"X-Served-By": {}, // Varnish, etc.
|
|
"X-Cache-Hits": {},
|
|
"Content-Encoding": {},
|
|
"Transfer-Encoding": {},
|
|
"Location": {},
|
|
"WWW-Authenticate": {},
|
|
"Proxy-Authenticate": {},
|
|
"X-Access-Token": {},
|
|
"X-Refresh-Token": {},
|
|
"Link": {},
|
|
"X-Content-Duration": {},
|
|
"X-UA-Compatible": {},
|
|
"X-RateLimit-Limit": {}, // Rate limiting header
|
|
"X-RateLimit-Remaining": {}, // Rate limiting header
|
|
"X-RateLimit-Reset": {}, // Rate limiting header
|
|
}
|