Class: SitecoreScan
- Inherits:
-
Object
- Object
- SitecoreScan
- Defined in:
- lib/sitecore_scan.rb
Constant Summary collapse
- VERSION =
'0.0.2'.freeze
Class Method Summary collapse
-
.dashboardReporting(url) ⇒ Boolean
Check if Executive Insight Dashboard reporting is accessible (CVE-2021-42237) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776.
-
.detectSitecore(url) ⇒ Boolean
Check if URL is running Sitecore using edit mode.
-
.getVersionFromLogin(url) ⇒ String
Retrieve Sitecore version from Login page.
-
.glimpseDebugging(url) ⇒ Boolean
Check if Glimpse debugging is enabled.
- .insecure ⇒ Object
- .insecure=(insecure) ⇒ Object
- .logger ⇒ Object
- .logger=(logger) ⇒ Object
-
.sendHttpRequest(url) ⇒ Net::HTTPResponse
Fetch URL.
-
.soapApi(url) ⇒ Boolean
Check if SOAP API is accessible.
-
.telerikWebUi(url) ⇒ Boolean
Check if Telerik Web UI is accessible (CVE-2017-9248) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0978654.
Class Method Details
.dashboardReporting(url) ⇒ Boolean
Check if Executive Insight Dashboard reporting is accessible (CVE-2021-42237) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB1000776
115 116 117 118 119 120 121 122 123 124 |
# File 'lib/sitecore_scan.rb', line 115 def self.dashboardReporting(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/shell/ClientBin/Reporting/Report.ashx") return false unless res return false unless res.code.to_i == 200 return false unless res.body.to_s.include? 'Sitecore.Analytics.Reporting' true end |
.detectSitecore(url) ⇒ Boolean
Check if URL is running Sitecore using edit mode
38 39 40 41 42 43 44 45 46 47 48 49 |
# File 'lib/sitecore_scan.rb', line 38 def self.detectSitecore(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}?sc_mode=edit") return false unless res return true if res['sitecore-item'] return true if res['set-cookies'].to_s.include?('sc_mode=edit') return true if res.code.to_i == 302 && (res['location'].to_s.downcase.include?('sitecore/login') || res['location'].to_s.downcase.include?('user=sitecore')) false end |
.getVersionFromLogin(url) ⇒ String
Retrieve Sitecore version from Login page
58 59 60 61 62 63 64 65 66 67 68 69 |
# File 'lib/sitecore_scan.rb', line 58 def self.getVersionFromLogin(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/login") return unless res version = res.body.to_s.scan(%r{(Sitecore\.NET [\d\.]+ \(rev\. \d+\))}).flatten.first return version if version res.body.to_s.scan(%r{<iframe src="https://sdn.sitecore.net/startpage.aspx\?[^"]+v=([\d\.]+)"}).flatten.first end |
.glimpseDebugging(url) ⇒ Boolean
Check if Glimpse debugging is enabled
78 79 80 81 82 83 84 85 86 87 |
# File 'lib/sitecore_scan.rb', line 78 def self.glimpseDebugging(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}Glimpse.axd") return false unless res return false unless res.code.to_i == 200 return false unless (res.body.to_s.include?('Glimpse - Configuration Page') || res.body.to_s.include?('Glimpse.AspNet')) true end |
.insecure ⇒ Object
23 24 25 |
# File 'lib/sitecore_scan.rb', line 23 def self.insecure @insecure ||= false end |
.insecure=(insecure) ⇒ Object
27 28 29 |
# File 'lib/sitecore_scan.rb', line 27 def self.insecure=(insecure) @insecure = insecure end |
.logger ⇒ Object
15 16 17 |
# File 'lib/sitecore_scan.rb', line 15 def self.logger @logger end |
.logger=(logger) ⇒ Object
19 20 21 |
# File 'lib/sitecore_scan.rb', line 19 def self.logger=(logger) @logger = logger end |
.sendHttpRequest(url) ⇒ Net::HTTPResponse
Fetch URL
151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 |
# File 'lib/sitecore_scan.rb', line 151 def self.sendHttpRequest(url) target = URI.parse(url) @logger.info("Fetching #{target}") http = Net::HTTP.new(target.host, target.port) if target.scheme.to_s.eql?('https') http.use_ssl = true http.verify_mode = @insecure ? OpenSSL::SSL::VERIFY_NONE : OpenSSL::SSL::VERIFY_PEER end http.open_timeout = 20 http.read_timeout = 20 headers = {} headers['User-Agent'] = "SitecoreScan/#{VERSION}" headers['Accept-Encoding'] = 'gzip,deflate' begin res = http.request(Net::HTTP::Get.new(target, headers.to_hash)) if res.body && res['Content-Encoding'].eql?('gzip') sio = StringIO.new(res.body) gz = Zlib::GzipReader.new(sio) res.body = gz.read end rescue Timeout::Error, Errno::ETIMEDOUT @logger.error("Could not retrieve URL #{target}: Timeout") return nil rescue => e @logger.error("Could not retrieve URL #{target}: #{e}") return nil end @logger.info("Received reply (#{res.body.length} bytes)") res end |
.soapApi(url) ⇒ Boolean
Check if SOAP API is accessible
96 97 98 99 100 101 102 103 104 105 |
# File 'lib/sitecore_scan.rb', line 96 def self.soapApi(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}sitecore/shell/WebService/Service.asmx") return false unless res return false unless res.code.to_i == 200 return false unless res.body.to_s.include? 'Visual Sitecore Service Web Service' true end |
.telerikWebUi(url) ⇒ Boolean
Check if Telerik Web UI is accessible (CVE-2017-9248) support.sitecore.com/kb?id=kb_article_view&sysparm_article=KB0978654
134 135 136 137 138 139 140 141 142 |
# File 'lib/sitecore_scan.rb', line 134 def self.telerikWebUi(url) url += '/' unless url.to_s.end_with? '/' res = sendHttpRequest("#{url}/Telerik.Web.UI.WebResource.axd") return false unless res return false unless res.code.to_i == 200 true end |