mirror of
https://github.com/owasp-modsecurity/ModSecurity.git
synced 2025-08-15 23:55:03 +03:00
In C++11, string data is always null-terminated[1], and can be freely modified[2]. [1] https://stackoverflow.com/questions/6077189/will-stdstring-always-be-null-terminated-in-c11 [2] https://stackoverflow.com/questions/38875623/is-it-permitted-to-modify-the-internal-stdstring-buffer-returned-by-operator
87 lines
2.0 KiB
C++
87 lines
2.0 KiB
C++
/*
|
|
* ModSecurity, http://www.modsecurity.org/
|
|
* Copyright (c) 2015 - 2020 Trustwave Holdings, Inc. (http://www.trustwave.com/)
|
|
*
|
|
* You may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* If any of the files related to licensing are missing or if you have any
|
|
* other questions related to licensing please contact Trustwave Holdings, Inc.
|
|
* directly using the email address security@modsecurity.org.
|
|
*
|
|
*/
|
|
|
|
|
|
#include "src/actions/transformations/sql_hex_decode.h"
|
|
|
|
#include <string>
|
|
|
|
#include "modsecurity/modsecurity.h"
|
|
#include "modsecurity/transaction.h"
|
|
|
|
#include "src/utils/string.h"
|
|
|
|
|
|
namespace modsecurity {
|
|
namespace actions {
|
|
namespace transformations {
|
|
|
|
|
|
void SqlHexDecode::execute(const Transaction *t,
|
|
const ModSecString &in,
|
|
ModSecString &out) noexcept {
|
|
out.assign(in);
|
|
auto size = inplace(reinterpret_cast<unsigned char*>(&out[0]), out.size());
|
|
out.resize(size);
|
|
}
|
|
|
|
|
|
int SqlHexDecode::inplace(unsigned char *data, int len) {
|
|
unsigned char *d, *begin = data;
|
|
int count = 0;
|
|
|
|
if ((data == NULL) || (len == 0)) {
|
|
return 0;
|
|
}
|
|
|
|
for (d = data; (++count < len) && *data; *d++ = *data++) {
|
|
if (*data != '0') {
|
|
continue;
|
|
}
|
|
++data;
|
|
++count;
|
|
if (mytolower(*data) != 'x') {
|
|
data--;
|
|
count--;
|
|
continue;
|
|
}
|
|
|
|
data++;
|
|
++count;
|
|
|
|
// Do we need to keep "0x" if no hexa after?
|
|
if (!VALID_HEX(data[0]) || !VALID_HEX(data[1])) {
|
|
data -= 2;
|
|
count -= 2;
|
|
continue;
|
|
}
|
|
|
|
while (VALID_HEX(data[0]) && VALID_HEX(data[1])) {
|
|
*d++ = utils::string::x2c(data);
|
|
data += 2;
|
|
count += 2;
|
|
}
|
|
}
|
|
|
|
*d = '\0';
|
|
return strlen(reinterpret_cast<char *>(begin));
|
|
}
|
|
|
|
|
|
|
|
} // namespace transformations
|
|
} // namespace actions
|
|
} // namespace modsecurity
|