Files
wpscan/spec/shared_examples/wp_user/brute_forcable.rb
2014-06-02 22:06:49 +02:00

140 lines
4.2 KiB
Ruby

# encoding: UTF-8
shared_examples 'WpUser::BruteForcable' do
let(:fixtures_dir) { MODELS_FIXTURES + '/wp_user/brute_forcable' }
let(:wordlist_iso) { fixtures_dir + '/wordlist-iso-8859-1.txt' }
let(:wordlist_utf8) { fixtures_dir + '/wordlist-utf-8.txt' }
let(:redirect_url) { 'http://www.example.com/asdf/' }
let(:mod) { WpUser::BruteForcable }
before { Browser.instance.max_threads = 1 }
describe '#valid_password?' do
let(:response) { Typhoeus::Response.new(resp_options) }
let(:resp_options) { {} }
after do
expect(wp_user.valid_password?(response, 'password', redirect_url)).to eq @expected
end
context 'when 302 and valid return_to parameter' do
let(:resp_options) { { code: 302, headers: { 'Location' => redirect_url } } }
it 'returns true' do @expected = true end
end
context 'when 302 and invalid return_to parameter' do
let(:resp_options) { { code: 302, headers: { 'Location' => nil } } }
it 'returns false' do @expected = false end
end
context 'when login_error' do
let(:resp_options) { { body: '<div id="login_error">' } }
it 'returns false' do @expected = false end
end
context 'when timeout' do
let(:resp_options) { { return_code: :operation_timedout } }
it 'returns false' do @expected = false end
end
context 'when no response from server (status = 0)' do
let(:resp_options) { { code: 0 } }
it 'returns false' do @expected = false end
end
context 'when error 50x' do
let(:resp_options) { { code: 500 } }
it 'returns false' do @expected = false end
end
context 'when unknown response' do
let(:resp_options) { { code: 202 } }
it 'returns false' do @expected = false end
end
end
# TODO
describe '#login_request' do
end
describe '#brute_force' do
let(:login) { 'someuser' }
let(:login_url) { uri.merge('wp-login.php').to_s }
after do
[wordlist_utf8, wordlist_iso].each do |wordlist|
wp_user.login = login
wp_user.brute_force(wordlist, {}, redirect_url)
expect(wp_user.password).to eq @expected
end
end
context 'when no password is valid' do
before do
stub_request(:get, login_url).to_return(status: 200)
stub_request(:post, wp_user.login_url).
# with(body: { log: login }). # produces an error : undefined method `split' for {:log=>"someuser", :pwd=>"password1"}:Hash
# Fixed in WebMock 1.17.2, TODO: Modify the specs
to_return(body: 'login_error')
end
it 'does not set @password' do
@expected = nil
end
end
context 'when no redirect_url is given' do
let(:redirect_url) { nil }
before do
stub_request(:get, login_url).to_return(status: 200)
stub_request(:post, wp_user.login_url).to_return(status: 302, headers: { 'Location' => 'wrong-location' })
end
it 'does not set the @password' do
@expected = nil
end
end
context 'when a password is valid' do
# Due to the error with .with(body: { log: login }) above
# We can't use it to stub the request for a specific password
# So, the first one will be valid
# Fixed in WebMock 1.17.2, TODO: Modify the specs
before do
stub_request(:get, login_url).to_return(status: 200)
stub_request(:post, wp_user.login_url).to_return(status: 302, headers: { 'Location' => redirect_url })
end
it 'sets the @password' do
@expected = 'password1'
end
end
context 'when the login url is redirected to https' do
let(:https_login_url) { 'https://example.com/wp-login.php' }
before do
stub_request(:any, uri.merge('wp-login.php').to_s).to_return(status: 302, headers: { 'Location' => https_login_url})
stub_request(:get, https_login_url).to_return(status: 200)
stub_request(:post, https_login_url).with(body: hash_including({ log: 'someuser', pwd: 'root'})).to_return(status: 302, headers: { 'Location' => redirect_url })
stub_request(:post, https_login_url).with(body: /pwd=(?!root)/).to_return(body: 'login_error')
end
it 'does not raise any error' do
@expected = 'root'
end
end
end
end