Class: SitecoreScan
- Inherits:
-
Object
- Object
- SitecoreScan
- Defined in:
- lib/sitecore_scan.rb
Constant Summary collapse
- VERSION =
'0.0.3'.freeze
Class Method Summary collapse
-
.dashboardReporting(url) ⇒ Boolean
Check if Executive Insight Dashboard reporting is accessible (CVE-2021-42237) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776.
-
.detectSitecore(url) ⇒ Boolean
Check if URL is running Sitecore using edit mode.
-
.getVersionFromLogin(url) ⇒ String
Retrieve Sitecore version from Login page.
-
.glimpseDebugging(url) ⇒ Boolean
Check if Glimpse debugging is enabled.
- .insecure ⇒ Object
- .insecure=(insecure) ⇒ Object
- .logger ⇒ Object
- .logger=(logger) ⇒ Object
-
.sendHttpRequest(url) ⇒ Net::HTTPResponse
Fetch URL.
-
.soapApi(url) ⇒ Boolean
Check if SOAP API is accessible.
-
.telerikWebUi(url) ⇒ Boolean
Check if Telerik Web UI is accessible (CVE-2017-9248) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0978654.
Class Method Details
.dashboardReporting(url) ⇒ Boolean
Check if Executive Insight Dashboard reporting is accessible (CVE-2021-42237) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776
120 121 122 123 124 125 126 127 128 129 |
# File 'lib/sitecore_scan.rb', line 120 def self.dashboardReporting(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/shell/ClientBin/Reporting/Report.ashx") return false unless res return false unless res.code.to_i == 200 return false unless res.body.to_s.include? 'Sitecore.Analytics.Reporting' true end |
.detectSitecore(url) ⇒ Boolean
Check if URL is running Sitecore using edit mode
39 40 41 42 43 44 45 46 47 48 49 50 |
# File 'lib/sitecore_scan.rb', line 39 def self.detectSitecore(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}?sc_mode=edit") return false unless res return true if res['sitecore-item'] return true if res['set-cookies'].to_s.include?('sc_mode=edit') return true if res.code.to_i == 302 && (res['location'].to_s.downcase.include?('sitecore/login') || res['location'].to_s.downcase.include?('user=sitecore')) false end |
.getVersionFromLogin(url) ⇒ String
Retrieve Sitecore version from Login page
59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 |
# File 'lib/sitecore_scan.rb', line 59 def self.getVersionFromLogin(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/login") return unless res version = res.body.to_s.scan(%r{(Sitecore\.NET [\d\.]+ \(rev\. \d+\))}).flatten.first return version if version version = res.body.to_s.scan(%r{<iframe src="https://sdn.sitecore.net/startpage.aspx\?[^"]+v=([\d.]+)"}).flatten.first return version if version nil end |
.glimpseDebugging(url) ⇒ Boolean
Check if Glimpse debugging is enabled
83 84 85 86 87 88 89 90 91 92 |
# File 'lib/sitecore_scan.rb', line 83 def self.glimpseDebugging(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}Glimpse.axd") return false unless res return false unless res.code.to_i == 200 return false unless (res.body.to_s.include?('Glimpse - Configuration Page') || res.body.to_s.include?('Glimpse.AspNet')) true end |
.insecure ⇒ Object
24 25 26 |
# File 'lib/sitecore_scan.rb', line 24 def self.insecure @insecure ||= false end |
.insecure=(insecure) ⇒ Object
28 29 30 |
# File 'lib/sitecore_scan.rb', line 28 def self.insecure=(insecure) @insecure = insecure end |
.logger ⇒ Object
16 17 18 |
# File 'lib/sitecore_scan.rb', line 16 def self.logger @logger end |
.logger=(logger) ⇒ Object
20 21 22 |
# File 'lib/sitecore_scan.rb', line 20 def self.logger=(logger) @logger = logger end |
.sendHttpRequest(url) ⇒ Net::HTTPResponse
Fetch URL
156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 |
# File 'lib/sitecore_scan.rb', line 156 def self.sendHttpRequest(url) target = URI.parse(url) @logger.info("Fetching #{target}") http = Net::HTTP.new(target.host, target.port) if target.scheme.to_s.eql?('https') http.use_ssl = true http.verify_mode = @insecure ? OpenSSL::SSL::VERIFY_NONE : OpenSSL::SSL::VERIFY_PEER end http.open_timeout = 20 http.read_timeout = 20 headers = {} headers['User-Agent'] = "SitecoreScan/#{VERSION}" headers['Accept-Encoding'] = 'gzip,deflate' begin res = http.request(Net::HTTP::Get.new(target, headers.to_hash)) if res.body && res['Content-Encoding'].eql?('gzip') sio = StringIO.new(res.body) gz = Zlib::GzipReader.new(sio) res.body = gz.read end rescue Timeout::Error, Errno::ETIMEDOUT @logger.error("Could not retrieve URL #{target}: Timeout") return nil rescue => e @logger.error("Could not retrieve URL #{target}: #{e}") return nil end @logger.info("Received reply (#{res.body.length} bytes)") res end |
.soapApi(url) ⇒ Boolean
Check if SOAP API is accessible
101 102 103 104 105 106 107 108 109 110 |
# File 'lib/sitecore_scan.rb', line 101 def self.soapApi(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/shell/WebService/Service.asmx") return false unless res return false unless res.code.to_i == 200 return false unless res.body.to_s.include?('Visual Sitecore Service Web Service') true end |
.telerikWebUi(url) ⇒ Boolean
Check if Telerik Web UI is accessible (CVE-2017-9248) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0978654
139 140 141 142 143 144 145 146 147 |
# File 'lib/sitecore_scan.rb', line 139 def self.telerikWebUi(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}/Telerik.Web.UI.WebResource.axd") return false unless res return false unless res.code.to_i == 200 true end |