Change MSSQL dns_request.sql to reduce escaping issues#5849
Change MSSQL dns_request.sql to reduce escaping issues#5849missing0x00 wants to merge 1 commit intosqlmapproject:masterfrom
Conversation
Modified the xp_dirtree and xp_cmdshell UNC paths to use forward slashes instead of backslashes, and removed the space between the procedure name and quoted path. These changes help to avoid escaping/encoding issues, for example when using JSON. MSSQL still handles it the same way and will cause a DNS query or SMB authentication attempt.
|
Modified the xp_dirtree and xp_cmdshell UNC paths to use forward slashes instead of backslashes. |
|
It works in nearly all cases, but I found a vulnerability where DNS exfil was failing until I made these changes. The vulnerable parameter was in in a JSON request, so that's my best guess as to why it was failing. Backslashes do work in most cases, but forward slashes are generally less likely to run into escaping issues in the initial request or somewhere on the backend. Maybe ideally it could try both and use the one that works?
Surprisingly I haven't been able to find a reference for this either, but it works consistently in both injection and direct SQL execution context. Not sure why it isn't more widely documented. Example command to test: |
|
Not specific to MSSQL, but here are some references showing that Windows generally can use either file path separator: https://learn.microsoft.com/en-us/dotnet/standard/io/file-path-formats
I'm thinking the best option here may be to attempt both options rather than changing the default since it does work in most cases. Is there any existing logic we could use for that? I see |
Modified the xp_dirtree and xp_cmdshell UNC paths to use forward slashes instead of backslashes, and removed the space between the procedure name and quoted path.
These changes help to avoid escaping/encoding issues, for example when using JSON. MSSQL still handles it the same way and will cause a DNS query or SMB authentication attempt.