mirror of
https://github.com/projectdiscovery/nuclei.git
synced 2026-01-31 15:53:10 +08:00
* fix(lib): segfault when init engine with `EnableHeadlessWithOpts` The panic was caused by attempting to log a sandbox warning before the logger was initialized. RCA: * SDK option funcs were exec'd before logger init. * `EnableHeadlessWithOpts()` attempted to create browser instance & log warnings during the config phase. * `Logger` was only init'd later in `init()` phase. * This caused nil pointer dereference when `MustDisableSandbox()` returned true (root on Linux/Unix or Windows). Changes: * Init `Logger` in `types.DefaultOptions()` to ensure it's always available before any option functions execute. * Init `Logger` field in both `NewNucleiEngineCtx()` and `NewThreadSafeNucleiEngineCtx()` from `defaultOptions.Logger`. * Move browser instance creation from `EnableHeadlessWithOpts()` to the `init()` phase where `Logger` is guaranteed to be available. * Simplify logger sync logic in `init()` to only update if changed by `WithLogger` option. * Add test case to verify headless initialization works without panic. The fix maintains backward compatibility while make sure the logger is always available when needed by any SDK option function. Fixes #6601. Signed-off-by: Dwi Siswanto <git@dw1.io> * build(make): adds `-timeout 30m -count 1` GOFLAGS in `test` cmd Signed-off-by: Dwi Siswanto <git@dw1.io> * Revert "fix(lib): segfault when init engine with `EnableHeadlessWithOpts`" let see if this pass flaky test. This reverts commit 63fcb6a1cbe7a4db7a78be766affc70eb237e57e. * test(engine): let see if this pass flaky test Signed-off-by: Dwi Siswanto <git@dw1.io> * Revert "Revert "fix(lib): segfault when init engine with `EnableHeadlessWithOpts`"" This reverts commit 62b4223803ccb1e93593e2e08e39923d76aa20b1. * test(engine): increase `TestActionNavigate` timeout Signed-off-by: Dwi Siswanto <git@dw1.io> * Revert "test(engine): let see if this pass flaky test" This reverts commit d27cd985cff1b06aa1965ea11f8aa32f00778ab5. --------- Signed-off-by: Dwi Siswanto <git@dw1.io>
312 lines
9.2 KiB
Go
312 lines
9.2 KiB
Go
package nuclei
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"os"
|
|
"strings"
|
|
"sync"
|
|
"time"
|
|
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/input"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/reporting"
|
|
|
|
"github.com/logrusorgru/aurora"
|
|
"github.com/pkg/errors"
|
|
"github.com/projectdiscovery/gologger/levels"
|
|
"github.com/projectdiscovery/httpx/common/httpx"
|
|
"github.com/projectdiscovery/nuclei/v3/internal/runner"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/authprovider"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/config"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/catalog/disk"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/core"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/input/provider"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/installer"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/output"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/progress"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/hosterrorscache"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/interactsh"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/protocolinit"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/common/protocolstate"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/headless/engine"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/protocols/http/httpclientpool"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/templates"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/testutils"
|
|
"github.com/projectdiscovery/nuclei/v3/pkg/types"
|
|
nucleiUtils "github.com/projectdiscovery/nuclei/v3/pkg/utils"
|
|
"github.com/projectdiscovery/ratelimit"
|
|
)
|
|
|
|
// applyRequiredDefaults to options
|
|
func (e *NucleiEngine) applyRequiredDefaults(ctx context.Context) {
|
|
mockoutput := testutils.NewMockOutputWriter(e.opts.OmitTemplate)
|
|
mockoutput.WriteCallback = func(event *output.ResultEvent) {
|
|
if len(e.resultCallbacks) > 0 {
|
|
for _, callback := range e.resultCallbacks {
|
|
if callback != nil {
|
|
callback(event)
|
|
}
|
|
}
|
|
return
|
|
}
|
|
sb := strings.Builder{}
|
|
sb.WriteString(fmt.Sprintf("[%v] ", event.TemplateID))
|
|
if event.Matched != "" {
|
|
sb.WriteString(event.Matched)
|
|
} else {
|
|
sb.WriteString(event.Host)
|
|
}
|
|
fmt.Println(sb.String())
|
|
}
|
|
if e.onFailureCallback != nil {
|
|
mockoutput.FailureCallback = e.onFailureCallback
|
|
}
|
|
|
|
if e.customWriter != nil {
|
|
e.customWriter = output.NewMultiWriter(e.customWriter, mockoutput)
|
|
} else {
|
|
e.customWriter = mockoutput
|
|
}
|
|
|
|
if e.customProgress == nil {
|
|
e.customProgress = &testutils.MockProgressClient{}
|
|
}
|
|
if e.hostErrCache == nil && e.opts.ShouldUseHostError() {
|
|
e.hostErrCache = hosterrorscache.New(30, hosterrorscache.DefaultMaxHostsCount, nil)
|
|
}
|
|
// setup interactsh
|
|
if e.interactshOpts != nil {
|
|
e.interactshOpts.Output = e.customWriter
|
|
e.interactshOpts.Progress = e.customProgress
|
|
} else {
|
|
e.interactshOpts = interactsh.DefaultOptions(e.customWriter, e.rc, e.customProgress)
|
|
}
|
|
if e.rateLimiter == nil {
|
|
e.rateLimiter = ratelimit.New(ctx, 150, time.Second)
|
|
}
|
|
if e.opts.ExcludeTags == nil {
|
|
e.opts.ExcludeTags = []string{}
|
|
}
|
|
// these templates are known to have weak matchers
|
|
// and idea is to disable them to avoid false positives
|
|
e.opts.ExcludeTags = append(e.opts.ExcludeTags, config.ReadIgnoreFile().Tags...)
|
|
|
|
e.inputProvider = provider.NewSimpleInputProvider()
|
|
}
|
|
|
|
// init
|
|
func (e *NucleiEngine) init(ctx context.Context) error {
|
|
// Update logger ref (if it was changed by [WithLogger])
|
|
// (Logger is already initialized)
|
|
if e.opts.Logger != e.Logger {
|
|
e.Logger = e.opts.Logger
|
|
}
|
|
|
|
if e.opts.Verbose {
|
|
e.Logger.SetMaxLevel(levels.LevelVerbose)
|
|
} else if e.opts.Debug {
|
|
e.Logger.SetMaxLevel(levels.LevelDebug)
|
|
} else if e.opts.Silent {
|
|
e.Logger.SetMaxLevel(levels.LevelSilent)
|
|
}
|
|
|
|
if err := runner.ValidateOptions(e.opts); err != nil {
|
|
return err
|
|
}
|
|
|
|
if e.opts.Parser != nil {
|
|
if op, ok := e.opts.Parser.(*templates.Parser); ok {
|
|
e.parser = op
|
|
}
|
|
}
|
|
|
|
if e.parser == nil {
|
|
e.parser = templates.NewParser()
|
|
}
|
|
|
|
if protocolstate.ShouldInit(e.opts.ExecutionId) {
|
|
_ = protocolinit.Init(e.opts)
|
|
}
|
|
|
|
if e.opts.ProxyInternal && e.opts.AliveHttpProxy != "" || e.opts.AliveSocksProxy != "" {
|
|
httpclient, err := httpclientpool.Get(e.opts, &httpclientpool.Configuration{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
e.httpClient = httpclient
|
|
}
|
|
|
|
e.applyRequiredDefaults(ctx)
|
|
var err error
|
|
|
|
// setup progressbar
|
|
if e.enableStats {
|
|
progressInstance, progressErr := progress.NewStatsTicker(e.opts.StatsInterval, e.enableStats, e.opts.StatsJSON, false, e.opts.MetricsPort)
|
|
if progressErr != nil {
|
|
return err
|
|
}
|
|
e.customProgress = progressInstance
|
|
e.interactshOpts.Progress = progressInstance
|
|
}
|
|
|
|
if err := reporting.CreateConfigIfNotExists(); err != nil {
|
|
return err
|
|
}
|
|
// we don't support reporting config in sdk mode
|
|
if e.rc, err = reporting.New(&reporting.Options{}, "", false); err != nil {
|
|
return err
|
|
}
|
|
e.interactshOpts.IssuesClient = e.rc
|
|
if e.httpClient != nil {
|
|
e.interactshOpts.HTTPClient = e.httpClient
|
|
}
|
|
if e.interactshClient, err = interactsh.New(e.interactshOpts); err != nil {
|
|
return err
|
|
}
|
|
|
|
if e.opts.Headless {
|
|
if engine.MustDisableSandbox() {
|
|
e.Logger.Warning().Msgf("The current platform and privileged user will run the browser without sandbox")
|
|
}
|
|
browser, err := engine.New(e.opts)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
e.browserInstance = browser
|
|
}
|
|
|
|
if e.catalog == nil {
|
|
e.catalog = disk.NewCatalog(config.DefaultConfig.TemplatesDirectory)
|
|
}
|
|
|
|
if e.tmpDir == "" {
|
|
tmpDir, err := os.MkdirTemp("", "nuclei-tmp-*")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
e.tmpDir = tmpDir
|
|
}
|
|
|
|
e.executerOpts = &protocols.ExecutorOptions{
|
|
Output: e.customWriter,
|
|
Options: e.opts,
|
|
Progress: e.customProgress,
|
|
Catalog: e.catalog,
|
|
IssuesClient: e.rc,
|
|
RateLimiter: e.rateLimiter,
|
|
Interactsh: e.interactshClient,
|
|
Colorizer: aurora.NewAurora(true),
|
|
ResumeCfg: types.NewResumeCfg(),
|
|
Browser: e.browserInstance,
|
|
Parser: e.parser,
|
|
InputHelper: input.NewHelper(),
|
|
TemporaryDirectory: e.tmpDir,
|
|
Logger: e.opts.Logger,
|
|
}
|
|
if e.opts.ShouldUseHostError() && e.hostErrCache != nil {
|
|
e.executerOpts.HostErrorsCache = e.hostErrCache
|
|
}
|
|
if len(e.opts.SecretsFile) > 0 {
|
|
authTmplStore, err := runner.GetAuthTmplStore(e.opts, e.catalog, e.executerOpts)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to load dynamic auth templates")
|
|
}
|
|
authOpts := &authprovider.AuthProviderOptions{SecretsFiles: e.opts.SecretsFile}
|
|
authOpts.LazyFetchSecret = runner.GetLazyAuthFetchCallback(&runner.AuthLazyFetchOptions{
|
|
TemplateStore: authTmplStore,
|
|
ExecOpts: e.executerOpts,
|
|
})
|
|
// initialize auth provider
|
|
provider, err := authprovider.NewAuthProvider(authOpts)
|
|
if err != nil {
|
|
return errors.Wrap(err, "could not create auth provider")
|
|
}
|
|
e.executerOpts.AuthProvider = provider
|
|
}
|
|
if e.authprovider != nil {
|
|
e.executerOpts.AuthProvider = e.authprovider
|
|
}
|
|
|
|
// prefetch secrets
|
|
if e.executerOpts.AuthProvider != nil && e.opts.PreFetchSecrets {
|
|
if err := e.executerOpts.AuthProvider.PreFetchSecrets(); err != nil {
|
|
return errors.Wrap(err, "could not prefetch secrets")
|
|
}
|
|
}
|
|
|
|
if e.executerOpts.RateLimiter == nil {
|
|
if e.opts.RateLimitMinute > 0 {
|
|
e.opts.RateLimit = e.opts.RateLimitMinute
|
|
e.opts.RateLimitDuration = time.Minute
|
|
}
|
|
if e.opts.RateLimit > 0 && e.opts.RateLimitDuration == 0 {
|
|
e.opts.RateLimitDuration = time.Second
|
|
}
|
|
if e.opts.RateLimit == 0 && e.opts.RateLimitDuration == 0 {
|
|
e.executerOpts.RateLimiter = ratelimit.NewUnlimited(ctx)
|
|
} else {
|
|
e.executerOpts.RateLimiter = ratelimit.New(ctx, uint(e.opts.RateLimit), e.opts.RateLimitDuration)
|
|
}
|
|
}
|
|
|
|
// Handle the case where the user passed an existing parser that we can use as a cache
|
|
if e.opts.Parser != nil {
|
|
if cachedParser, ok := e.opts.Parser.(*templates.Parser); ok {
|
|
e.parser = cachedParser
|
|
e.opts.Parser = cachedParser
|
|
e.executerOpts.Parser = cachedParser
|
|
e.executerOpts.Options.Parser = cachedParser
|
|
}
|
|
}
|
|
|
|
// Create a new parser if necessary
|
|
if e.parser == nil {
|
|
op := templates.NewParser()
|
|
e.parser = op
|
|
e.opts.Parser = op
|
|
e.executerOpts.Parser = op
|
|
e.executerOpts.Options.Parser = op
|
|
}
|
|
|
|
e.engine = core.New(e.opts)
|
|
e.engine.SetExecuterOptions(e.executerOpts)
|
|
|
|
httpxOptions := httpx.DefaultOptions
|
|
httpxOptions.Timeout = 5 * time.Second
|
|
if client, err := httpx.New(&httpxOptions); err != nil {
|
|
return err
|
|
} else {
|
|
e.httpxClient = nucleiUtils.GetInputLivenessChecker(client)
|
|
}
|
|
|
|
// Only Happens once regardless how many times this function is called
|
|
// This will update ignore file to filter out templates with weak matchers to avoid false positives
|
|
// and also upgrade templates to latest version if available
|
|
installer.NucleiSDKVersionCheck()
|
|
|
|
if DefaultConfig.CanCheckForUpdates() {
|
|
return e.processUpdateCheckResults()
|
|
}
|
|
return nil
|
|
}
|
|
|
|
type syncOnce struct {
|
|
sync.Once
|
|
}
|
|
|
|
var updateCheckInstance = &syncOnce{}
|
|
|
|
// processUpdateCheckResults processes update check results
|
|
func (e *NucleiEngine) processUpdateCheckResults() error {
|
|
var err error
|
|
updateCheckInstance.Do(func() {
|
|
if e.onUpdateAvailableCallback != nil {
|
|
e.onUpdateAvailableCallback(config.DefaultConfig.LatestNucleiTemplatesVersion)
|
|
}
|
|
tm := installer.TemplateManager{}
|
|
err = tm.UpdateIfOutdated()
|
|
})
|
|
return err
|
|
}
|