Skip to content

Commit

Permalink
Port ScanZip improvements to ScanRar, fixes target#441, port password…
Browse files Browse the repository at this point in the history
… caching to ScanZip
  • Loading branch information
ryanohoro committed Mar 7, 2024
1 parent 227f7b6 commit 6381b67
Show file tree
Hide file tree
Showing 7 changed files with 681 additions and 61 deletions.
5 changes: 5 additions & 0 deletions configs/python/backend/backend.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -503,6 +503,11 @@ scanners:
priority: 5
options:
limit: 1000
limit_metadata: True
size_limit: 250000000
crack_pws: False
log_pws: True
password_file: '/etc/strelka/passwords.dat'
'ScanRpm':
- positive:
flavors:
Expand Down
6 changes: 3 additions & 3 deletions docs/README.md

Large diffs are not rendered by default.

179 changes: 131 additions & 48 deletions src/python/strelka/scanners/scan_rar.py
Original file line number Diff line number Diff line change
Expand Up @@ -35,103 +35,186 @@ def init(self):
self.passwords = []

def scan(self, data, file, options, expire_at):
file_limit = options.get("limit", 1000)
file_limit = options.get("limit", 100)
size_limit = options.get("size_limit", 250000000)
limit_metadata = options.get("limit_metadata", True)
crack_pws = options.get("crack_pws", False)
log_pws = options.get("log_pws", True)
password_file = options.get("password_file", "/etc/strelka/passwords.dat")

# Gather count and list of files to be extracted
self.event["total"] = {"files": 0, "extracted": 0}

if not self.passwords:
if os.path.isfile(password_file):
with open(password_file, "rb") as f:
for line in f:
self.passwords.append(line.strip())
self.event["files"] = []

# Temporary top level compression metrics
compress_size_total = 0
file_size_total = 0

if crack_pws:
if not self.passwords:
if os.path.isfile(password_file):
with open(password_file, "rb") as f:
for line in f:
self.passwords.append(line.strip())

if (
len(self.passwords) == 0
and "no_passwords_loaded" not in self.flags
):
self.flags.append("no_passwords_loaded")
else:
if "password_file_missing" not in self.flags:
self.flags.append("password_file_missing")

self.passwords.insert(0, None)

with io.BytesIO(data) as rar_io:
try:
with rarfile.RarFile(rar_io) as rar_obj:
rf_info_list = rar_obj.infolist()
for info in rf_info_list:
if info.is_file():
self.event["total"]["files"] += 1
filelist = rar_obj.infolist()

# Count the file entries, in case the function encounters an unhandled exception
for compressed_file in filelist:
if compressed_file.is_dir():
continue
self.event["total"]["files"] += 1

password = ""
for i, name in enumerate(rf_info_list):
# For each file in rar, gather metadata and pass extracted file back to Strelka
for i, name in enumerate(filelist):
if not name.isdir():
if self.event["total"]["extracted"] >= file_limit:
break

extract = True
extracted = False
compression_rate = 0

try:
extract_data = b""
file_info = rar_obj.getinfo(name)
compressed_file = rar_obj.getinfo(name)

if compressed_file.file_size > size_limit:
extract = False
if "file_size_limit" not in self.flags:
self.flags.append("file_size_limit")

if self.event["total"]["extracted"] >= file_limit:
extract = False
if "file_count_limit" not in self.flags:
self.flags.append("file_count_limit")

if (
compressed_file.file_size > 0
and compressed_file.compress_size > 0
):
compress_size_total += compressed_file.compress_size
file_size_total += compressed_file.file_size

size_difference = (
compressed_file.file_size
- compressed_file.compress_size
)
compression_rate = (
size_difference * 100.0
) / compressed_file.file_size

self.event["host_os"] = HOST_OS_MAPPING[
file_info.host_os
compressed_file.host_os
]

if not file_info.needs_password():
if not compressed_file.needs_password():
extract_data = rar_obj.read(name)
else:
if i == 0:
if "password_protected" not in self.flags:
self.flags.append("password_protected")

if not password and i == 0:
for pw in self.passwords:
try:
data = rar_obj.open(
name,
mode="r",
psw=pw.decode("utf-8"),
)
if data.readable():
extract_data = data.readall()
password = pw.decode("utf-8")
self.event["password"] = pw.decode(
"utf-8"
)
break
except (
RuntimeError,
rarfile.BadRarFile,
rarfile.RarCRCError,
rarfile.RarWrongPassword,
):
pass
elif not password and i > 0:
break
else:
for password in self.passwords:
try:
data = rar_obj.open(
name, mode="r", psw=password
name,
mode="r",
pwd=password.decode("utf-8")
if password
else None,
)
if data.readable():
extract_data = data.readall()
self.passwords.insert(
0,
self.passwords.pop(
self.passwords.index(password)
),
)
if password and log_pws:
self.event[
"password"
] = password.decode("utf-8")
break
except (
RuntimeError,
rarfile.BadRarFile,
rarfile.RarCRCError,
rarfile.RarWrongPassword,
):
raise
except (
rarfile.BadRarFile,
rarfile.PasswordRequired,
):
pass

if (
not extract_data
and "no_password_match_found" not in self.flags
and not crack_pws
):
self.flags.append("no_password_match_found")

if extract_data:
# If there's data in it, and no limits have been met, emit the file
if extract_data and extract:
# Send extracted file back to Strelka
self.emit_file(
extract_data, name=f"{file_info.filename}"
extract_data, name=f"{compressed_file.filename}"
)

extracted = True

if not (
limit_metadata
and self.event["total"]["extracted"] >= file_limit
):
self.event["files"].append(
{
"file_name": compressed_file.filename,
"file_size": compressed_file.file_size,
"compression_size": compressed_file.compress_size,
"compression_rate": round(
compression_rate, 2
),
"extracted": extracted,
"encrypted": compressed_file.needs_password(),
}
)

if extracted:
self.event["total"]["extracted"] += 1

except NotImplementedError:
self.flags.append("unsupport_compression")
raise
except RuntimeError:
self.flags.append("runtime_error")
raise
except ValueError:
self.flags.append("value_error")
raise

except rarfile.BadRarFile:
raise
self.flags.append("bad_rar")

# Top level compression metric
if file_size_total > 0 and compress_size_total > 0:
size_difference_total = file_size_total - compress_size_total
self.event["compression_rate"] = round(
(size_difference_total * 100.0) / file_size_total, 2
)
else:
self.event["compression_rate"] = 0.00
34 changes: 24 additions & 10 deletions src/python/strelka/scanners/scan_zip.py
Original file line number Diff line number Diff line change
Expand Up @@ -20,6 +20,9 @@ class ScanZip(strelka.Scanner):
Defaults to /etc/strelka/passwords.dat.
"""

def init(self):
self.passwords = []

def scan(self, data, file, options, expire_at):
file_limit = options.get("limit", 100)
size_limit = options.get("size_limit", 250000000)
Expand All @@ -28,8 +31,6 @@ def scan(self, data, file, options, expire_at):
log_pws = options.get("log_pws", True)
password_file = options.get("password_file", "/etc/strelka/passwords.dat")

passwords = [None]

# Gather count and list of files to be extracted
self.event["total"] = {"files": 0, "extracted": 0}
self.event["files"] = []
Expand All @@ -38,10 +39,23 @@ def scan(self, data, file, options, expire_at):
compress_size_total = 0
file_size_total = 0

if crack_pws and os.path.isfile(password_file):
with open(password_file, "rb") as f:
for line in f:
passwords.append(line.strip())
if crack_pws:
if not self.passwords:
if os.path.isfile(password_file):
with open(password_file, "rb") as f:
for line in f:
self.passwords.append(line.strip())

if (
len(self.passwords) == 0
and "no_passwords_loaded" not in self.flags
):
self.flags.append("no_passwords_loaded")
else:
if "password_file_missing" not in self.flags:
self.flags.append("password_file_missing")

self.passwords.insert(0, None)

with io.BytesIO(data) as zip_io:
try:
Expand Down Expand Up @@ -96,17 +110,17 @@ def scan(self, data, file, options, expire_at):
if "encrypted" not in self.flags:
self.flags.append("encrypted")

for password in passwords:
for password in self.passwords:
try:
if extract:
extract_data = zip_obj.read(
compressed_file.filename, password
)
if extract_data:
passwords.insert(
self.passwords.insert(
0,
passwords.pop(
passwords.index(password)
self.passwords.pop(
self.passwords.index(password)
),
)
if password and crack_pws and log_pws:
Expand Down
Binary file added src/python/strelka/tests/fixtures/test_big.rar
Binary file not shown.
Binary file not shown.
Loading

0 comments on commit 6381b67

Please sign in to comment.