PHP代码审计之函数漏洞(上)

此篇文件属于代码审计篇的一个环节,其意图是为总结php常见函数漏洞分为上下两节,此为上节!此篇与命令注入绕过篇和sql注入回顾篇同属一个系列!欢迎各位斧正!

正文
intval()使用不当导致安全漏洞的分析

intval函数有个特性:“直到遇上数字或正负符号才开始做转换,再遇到非数字或字符串结束时(\0)结束转换”,在某些应用程序里由于对intval函数这个特性认识不够,错误的使用导致绕过一些安全判断导致安全漏洞.此外有些题目还利用intval函数四舍五入的特性来绕过判断!

  • 漏洞代码分析
PHP_FUNCTION(intval)
{
        zval **num, **arg_base;
        int base;
      switch (ZEND_NUM_ARGS()) {
                case 1:
                        if (zend_get_parameters_ex(1, &num) == FAILURE) {
                                WRONG_PARAM_COUNT;
                        }
                        base = 10;
                        break;
                case 2:
                        if (zend_get_parameters_ex(2, &num, &arg_base) == FAILURE) {
                                WRONG_PARAM_COUNT;
                        }
                        convert_to_long_ex(arg_base);
                        base = Z_LVAL_PP(arg_base);
                        break;
                default:
                        WRONG_PARAM_COUNT;
        }
        RETVAL_ZVAL(*num, 1, 0);
        convert_to_long_base(return_value, base);
}
 
 
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
Zend/zend_operators.c->>convert_to_long_base()
……
case IS_STRING:
            strval = Z_STRVAL_P(op);
            Z_LVAL_P(op) = strtol(strval, NULL, base);
            STR_FREE(strval);
            break;
 
 
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

当intval函数接受到字符串型参数是调用convert_to_long_base()处理,接下来调用Z_LVAL_P(op) = strtol(strval, NULL, base);通过strtol函数来处理参数。

函数原型如下:

long int strtol(const char *nptr,char **endptr,int base); 
 
 

    这个函数会将参数nptr字符串根据参数base来转换成长整型数,参数base范围从2至36,或0.参数base代表采用的进制方式,如base值为10则采用10进制,若base值为16则采用16进制等。

    流程为:
    strtol()会扫描参数nptr字符串,跳过前面的空格字符,直到遇上数字或正负符号才开始做转换,再遇到非数字或字符串结束时(\0)结束转换,并将结果返回。

    那么当intval用在if等的判断里面,将会导致这个判断实去意义,从而导致安全漏洞。

    • 代码测试

      var_dump(intval('2'));
      var_dump(intval('3abcd'));
      var_dump(intval('abcd'));
      var_dump(intval('1.121'));
      // 可以使用字符串-0转换,来自于wechall的方法
         
         
      • 1
      • 2
      • 3
      • 4

    在这里插入图片描述

    说明intval()转换的时候,会将从字符串的开始进行转换直到遇到一个非数字的字符。即使出现无法转换的字符串,intval()不会报错而是返回0
    顺便说一下,intval可以被%00截断

    if($req['number']!=strval(intval($req['number']))){
         $info = "number must be equal to it's integer!! ";  
    }
     
     
    • 1
    • 2

    如果当$req[‘number’]=0%00即可绕过

    • CTF中一些绕过

      <?php
      echo intval(42);                      // 42
      echo intval(4.2);                     // 4
      echo intval('42');                    // 42
      echo intval('+42');                   // 42
      echo intval('-42');                   // -42
      echo intval(042);                     // 34
      echo intval('042');                   // 42
      echo intval(1e10);                    // 1410065408
      echo intval('1e10');                  // 1
      echo intval(0x1A);                    // 26
      echo intval(42000000);                // 42000000
      echo intval(420000000000000000000);   // 0
      echo intval('420000000000000000000'); // 2147483647
      echo intval(42, 8);                   // 42
      echo intval('42', 8);                 // 34
      echo intval(array());                 // 0
      echo intval(array('foo', 'bar'));     // 1
      ?>
         
         
      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13
      • 14
      • 15
      • 16
      • 17
      • 18
    switch()

    如果switch是数字类型的case的判断时,switch会将其中的参数转换为int类型,效果相当于intval函数。如下:

    <?php
        $i ="2a";  
        switch ($i) {  
        case 0:  
        case 1:  
        case 2:  
        echo "i is less than 3 but not negative";  
        break;  
        case 3:  
        echo "i is 3";  
        } 
    ?>
     
     
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11

    这个时候程序输出的是i is less than 3 but not negative,是由于switch()函数将$i进行了类型转换,转换结果为2。

    在这里插入图片描述

    • switch没有break 字符与0比较绕过

      代码

      <?php
      

    error_reporting(0);

    if (isset(KaTeX parse error: Expected '}', got 'EOF' at end of input: …oken variable">which = G E T < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > [ < / s p a n > < s p a n c l a s s = " t o k e n s i n g l e − q u o t e d − s t r i n g s t r i n g " > ′ w h i c h ′ < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ] < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > s w i t c h < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > _GET</span><span class="token punctuation">[</span><span class="token single-quoted-string string">'which'</span><span class="token punctuation">]</span><span class="token punctuation">;</span> <span class="token keyword">switch</span> <span class="token punctuation">(</span><span class="token variable"> GET</span><spanclass="tokenpunctuation">[</span><spanclass="tokensinglequotedstringstring">which</span><spanclass="tokenpunctuation">]</span><spanclass="tokenpunctuation">;</span><spanclass="tokenkeyword">switch</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">which)
    {
    case 0:
    case 1:
    case 2:
    require_once w h i c h < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > . < / s p a n > < s p a n c l a s s = " t o k e n s i n g l e − q u o t e d − s t r i n g s t r i n g " > ′ . p h p ′ < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > e c h o < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > which</span><span class="token punctuation">.</span><span class="token single-quoted-string string">'.php'</span><span class="token punctuation">;</span> <span class="token keyword">echo</span> <span class="token variable"> which</span><spanclass="tokenpunctuation">.</span><spanclass="tokensinglequotedstringstring">.php</span><spanclass="tokenpunctuation">;</span><spanclass="tokenkeyword">echo</span><spanclass="tokenvariable">flag;
    break;
    default:
    echo GWF_HTML::error(‘PHP-0817’, ‘Hacker NoNoNo!’, false);
    break;
    }
    }

    ?>

    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21

    题解:

    让我们包含当前目录中的flag.php,给whichflag,这里会发现在case 0case 1的时候,没有break,按照常规思维,应该是0比较不成功,进入比较1,然后比较2,再然后进入default,但是事实却不是这样,事实上,在 case 0的时候,字符串和0比较是相等的,进入了case 0的方法体,但是却没有break,这个时候,默认判断已经比较成功了,而如果匹配成功之后,会继续执行后面的语句,这个时候,是不会再继续进行任何判断的。也就是说,我们which传入flag的时候,case 0比较进入了方法体,但是没有break,默认已经匹配成功,往下执行不再判断,进入2的时候,执行了require_once flag.php

    PHP中非数字开头字符串和数字 0比较==都返回True

    因为通过逻辑运算符让字符串和数字比较时,会自动将字符串转换为数字.而当字符串无法转换为数字时,其结果就为0了,然后再和另一个0比大小,结果自然为ture。注意:如果那个字符串是以数字开头的,如6ldb,它还是可以转为数字6的,然后和0比较就不等了(但是和6比较就相等)
    if($str==0) 判断 和 if( intval($str) == 0 ) 是等价的

    可以验证:
    <?php
    $str="s6s";
    if($str==0){ echo "返回了true.";}
    ?>
    
     
     
    • 1
    • 2
    • 3
    • 4
    • 5

    要字符串与数字判断不转类型方法有:

    • 方法一:
      $str="字符串";if($str===0){ echo "返回了true.";}
    • 方法二:
      $str="字符串";if($str=="0"){ echo "返回了true.";} ,

    此题构造:http://127.0.0.1/php_bug/25.php?which=aa

    资料:

    in_array()
    $array=[0,1,2,'3'];
    var_dump(in_array('abc', $array)); //true
    var_dump(in_array('1bc', $array)); //true 
     
     
    • 1
    • 2

    可以看到上面的情况返回的都是true,因为’abc’会转换为0,’1bc’转换为1。 在所有php认为是int的地方输入string,都会被强制转换

    在这里插入图片描述

    PHP弱类型的特性
    <?php
        var_dump("admin"==0); // true
        var_dump("1admin"==1); // true
        var_dump("admin1"==1); // false
        var_dump("admin1"==0); // true
        var_dump("0e123456"=="0e654321"); // true
        var_dump([]>任何数字); // true
    ?>
     
     
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7

    在这里插入图片描述

    具体漏洞原理参考

    “.“被替换成”_”

    PHP参数中的".“会被替换成”_"

    var_dump("user.id"); // user_id 
     
     
      unset

      unset(bar);用来销毁指定的变量,如果变量bar);用来销毁指定的变量,如果变量bar 包含在请求参数中,可能出现销毁一些变量而实现程序逻辑绕过。

      <?php  
      // http://127.0.0.1/index.php?_CONFIG=123
      $_CONFIG['extraSecure'] = true;
      

      foreach(array(’_GET’,’_POST’) as KaTeX parse error: Expected '}', got 'EOF' at end of input: …oken variable"> m e t h o d < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > a s < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > method</span> <span class="token keyword">as</span> <span class="token variable"> method</span><spanclass="tokenkeyword">as</span><spanclass="tokenvariable">key=>$value) {
      // $key == _CONFIG
      // KaTeX parse error: Can't use function '$' in math mode at position 8: key == $̲_CONFIG</span> …key);
      }
      }

      if ($_CONFIG[‘extraSecure’] == false) {
      echo ‘flag {****}’;
      }

      ?>

      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13
      • 14
      • 15
      • 16
      • 17

      serialize 和 unserialize漏洞
      • 魔术方法

      这里我们先简单介绍一下php中的魔术方法(这里如果对于类、对象、方法不熟的先去学学吧),即Magic方法,php类可能会包含一些特殊的函数叫magic函数,magic函数命名是以符号__开头的,比如 __construct__destruct__toString__sleep__wakeup等等。这些函数都会在某些特殊时候被自动调用。
      例如__construct()方法会在一个对象被创建时自动调用,对应的__destruct则会在一个对象被销毁时调用等等。
      这里有两个比较特别的Magic方法,__sleep 方法会在一个对象被序列化的时候调用。 __wakeup方法会在一个对象被反序列化的时候调用。

      <!-- index.php -->
      <?php 
      	require_once('shield.php');
      	$x = new Shield();
      	isset($_GET['class']) && $g = $_GET['class'];
      	if (!empty($g)) {
      		$x = unserialize($g);
      	}
      	echo $x->readfile();
      ?>
       
       
      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      <!-- shield.php -->
      

      <?php
      //flag is in pctf.php
      class Shield {
      public KaTeX parse error: Expected group after '_' at position 128: …oken function">_̲_construct</spa…filename = ‘’) {
      KaTeX parse error: Expected 'EOF', got '&' at position 79: …oken operator">&̲gt;</span> file…filename;
      }

      	<span class="token keyword">function</span> <span class="token function">readfile</span><span class="token punctuation">(</span><span class="token punctuation">)</span> <span class="token punctuation">{</span>
      		<span class="token keyword">if</span> <span class="token punctuation">(</span><span class="token operator">!</span><span class="token function">empty</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">file</span><span class="token punctuation">)</span> <span class="token operator">&amp;&amp;</span> <span class="token function">stripos</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">file</span><span class="token punctuation">,</span><span class="token single-quoted-string string">'..'</span><span class="token punctuation">)</span><span class="token operator">===</span><span class="token constant">FALSE</span>  
      		<span class="token operator">&amp;&amp;</span> <span class="token function">stripos</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">file</span><span class="token punctuation">,</span><span class="token single-quoted-string string">'/'</span><span class="token punctuation">)</span><span class="token operator">===</span><span class="token constant">FALSE</span> <span class="token operator">&amp;&amp;</span> <span class="token function">stripos</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">file</span><span class="token punctuation">,</span><span class="token single-quoted-string string">'\\'</span><span class="token punctuation">)</span><span class="token operator">==</span><span class="token constant">FALSE</span><span class="token punctuation">)</span> <span class="token punctuation">{</span>
      			<span class="token keyword">return</span> @<span class="token function">file_get_contents</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">file</span><span class="token punctuation">)</span><span class="token punctuation">;</span>
      		<span class="token punctuation">}</span>
      	<span class="token punctuation">}</span>
      <span class="token punctuation">}</span>
      

      ?>

      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13
      • 14
      • 15
      • 16
      • 17
      • 18
      • 19
      • 20
      • 21

      <!-- showimg.php -->
      <?php
      	$f = $_GET['img'];
      	if (!empty($f)) {
      		$f = base64_decode($f);
      		if (stripos($f,'..')===FALSE && stripos($f,'/')===FALSE && stripos($f,'\\')===FALSE
      		//stripos — 查找字符串首次出现的位置(不区分大小写)
      		&& stripos($f,'pctf')===FALSE) {
      			readfile($f);
      		} else {
      			echo "File not found!";
      		}
      	}
      ?>
       
       
      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13

      题解:

      说明flagpctf.php,但showimg.php中不允许直接读取pctf.php,只有在index.php中可以传入变量class
      index.phpShield类的实例$X = unserialize($g)$g = $_GET['class'];$X中不知$filename变量,但需要找的是:$filename = "pctf.php",现$X已知,求传入的class变量值。
      可以进行序列化操作:

      <!-- answer.php -->
      <?php
      

      require_once(‘shield.php’);
      $x = class Shield();
      g = s e r i a l i z e ( g = serialize( g=serialize(x);
      echo $g;

      ?>

      <!-- shield.php -->
      <?php
      //flag is in pctf.php
      class Shield {
      public KaTeX parse error: Expected group after '_' at position 24: … function _̲_construct(filename = ‘pctf.php’) {
      $this -> file = $filename;
      }

          function readfile() {
              if (!empty($this-&gt;file) &amp;&amp; stripos($this-&gt;file,'..')===FALSE  
              &amp;&amp; stripos($this-&gt;file,'/')===FALSE &amp;&amp; stripos($this-&gt;file,'\\')==FALSE) {
                  return @file_get_contents($this-&gt;file);
              }
          }
      }
      

      ?>

      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13
      • 14
      • 15
      • 16
      • 17
      • 18
      • 19
      • 20
      • 21
      • 22
      • 23
      • 24
      • 25
      • 26
      • 27
      • 28

      得到:O:6:"Shield":1:{s:4:"file";s:8:"pctf.php";}
      构造:

      http://web.jarvisoj.com:32768/index.php?class=O:6:"Shield":1:{s:4:"file";s:8:"pctf.php";}
      
       
       
      • 1
      session 反序列化漏洞

      主要原因是

      ini_set(‘session.serialize_handler’, ‘php_serialize’); 
      ini_set(‘session.serialize_handler’, ‘php’); 
       
       
      • 1

      两者处理session的方式不同

      利用下面代码可以生成session值

      <?php
      ini_set('session.serialize_handler', 'php_serialize');//a:1:{s:6:"spoock";s:3:"111";}
      //ini_set('session.serialize_handler', 'php');//a|s:3:"111"
      session_start();
      $_SESSION["spoock"]=$_GET["a"];
      ?>123456
       
       
      • 1
      • 2
      • 3
      • 4
      • 5

      我们来看看生成的session值

      spoock|s:3:"111";    //session键值|内容序列化
      a:1:{s:6:"spoock";s:3:"111";}a:1:{s:N:session键值;内容序列化}ini_set('session.serialize_handler', 'php');中把|之前认为是键值后面的视为序列化
       
       
      • 1
      • 2

      那么就可以利用这一漏洞执行一些恶意代码

      看下面的例子
      1.php

      <?php
      ini_set('session.serialize_handler', 'php_serialize');
      session_start();
      $_SESSION["spoock"]=$_GET["a"];
      ?>12345
       
       
      • 1
      • 2
      • 3
      • 4

      2.php

      <?php
         ini_set('session.serialize_handler', 'php');
      session_start();
      class lemon {
          var $hi;
          function __construct(){
              $this->hi = 'phpinfo();';
          }
      
      <span class="token keyword">function</span> <span class="token function">__destruct</span><span class="token punctuation">(</span><span class="token punctuation">)</span> <span class="token punctuation">{</span>
           <span class="token function">eval</span><span class="token punctuation">(</span><span class="token variable">$this</span><span class="token operator">-</span><span class="token operator">&gt;</span><span class="token property">hi</span><span class="token punctuation">)</span><span class="token punctuation">;</span><span class="token comment">//这里很危险,可以执行用户输入的参数</span>
      <span class="token punctuation">}</span>
      

      }
      ?>

      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11
      • 12
      • 13
      • 14
      • 15
      • 16

      在1.PHP里面输入a参数序列化的值|O:5:”lemon”:1:{s:2:”hi”;s:10:”phpinfo();”;}
      则被序列化为 a:1:{s:6:”spoock”;s:44:”|O:5:”lemon”:1:{s:2:”hi”;s:10:”phpinfo();”;}
      在2.PHP里面打开 就可以执行phpinfo()了

      参考链接

      MD5 compare漏洞

      PHP在处理哈希字符串时,会利用”!=”或”==”来对哈希值进行比较,它把每一个以”0E”开头的哈希值都解释为0,所以如果两个不同的密码经过哈希以后,其哈希值都是以”0E”开头的,那么PHP将会认为他们相同,都是0。
      常见的payload有

      0x01 md5(str)
          QNKCDZO
          240610708
          s878926199a
          s155964671a
          s214587387a
          s214587387a
           sha1(str)
          sha1('aaroZmOk')  
          sha1('aaK1STfY')
          sha1('aaO8zKZF')
          sha1('aa3OFF9m')
       
       
      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      • 11

      同时MD5不能处理数组,若有以下判断则可用数组绕过

      if(@md5($_GET['a']) == @md5($_GET['b']))
      {
          echo "yes";
      }
      

      //http://127.0.0.1/1.php?a[]=1&b[]=2

      • 1
      • 2
      • 3
      • 4
      • 5

      MD5的:

      md5("V5VDSHva7fjyJoJ33IQl") => 0e18bb6e1d5c2e19b63898aeed6b37ea
      md5("0e18bb6e1************") => 0e0a710a092113dd5ec9dd47d4d7b86f
      CbDLytmyGm2xQyaLNhWn
      md5(CbDLytmyGm2xQyaLNhWn) => 0ec20b7c66cafbcc7d8e8481f0653d18
      md5(md5(CbDLytmyGm2xQyaLNhWn)) => 0e3a5f2a80db371d4610b8f940d296af
      770hQgrBOjrcqftrlaZk
      md5(770hQgrBOjrcqftrlaZk) => 0e689b4f703bdc753be7e27b45cb3625
      md5(md5(770hQgrBOjrcqftrlaZk)) => 0e2756da68ef740fd8f5a5c26cc45064
      7r4lGXCH2Ksu2JNT3BYM
      md5(7r4lGXCH2Ksu2JNT3BYM) => 0e269ab12da27d79a6626d91f34ae849
      md5(md5(7r4lGXCH2Ksu2JNT3BYM)) => 0e48d320b2a97ab295f5c4694759889f
       
       
      • 1
      • 2
      • 3
      • 4
      • 5
      • 6
      • 7
      • 8
      • 9
      • 10
      ereg函数漏洞:00截断

      利用ereg()存在NULL截断漏洞,导致了正则过滤被绕过,所以可以使用%00截断正则匹配。

      ereg ("^[a-zA-Z0-9]+$", $_GET['password']) === FALSE
       
       

        字符串对比解析
        在这里如果 $_GET[‘password’]为数组,则返回值为NULL
        如果为123 || asd || 12as || 123%00&&&**,则返回值为true
        其余为false

        参考payload

        http://127.0.0.1/Php_Bug/16.php?nctf=1%00%23biubiubiu`
         
         
          Strcmp()漏洞
          int strcmp ( string $str1 , string $str2)
           
           

            这里的函数返回值:当str1 < str2 时返回 < 0;
            当str1 > str2 时返回 > 0;
            当str1 = str2 时返回 0;
            当我们传入字符串类型的数据的时候,则会返回 0;
            所以我们可以通过传入一个 数组 或者一个 object 来绕过

            ?str1[]=
             
             

              参考payload

              http://127.0.0.1/Php_Bug/06.php?a[]=1
              
               
               
              • 1

              这个函数是用于比较字符串的函数

              int strcmp ( string $str1 , string $str2 )
              // 参数 str1第一个字符串。str2第二个字符串。如果 str1 小于 str2 返回 < 0; 如果 str1 大于 str2 返回 > 0;如果两者相等,返回 0。
              
               
               
              • 1
              • 2

              可知,传入的期望类型是字符串类型的数据,但是如果我们传入非字符串类型的数据的时候,这个函数将会有怎么样的行为呢?实际上,当这个函数接受到了不符合的类型,这个函数将发生错误,但是在5.3之前的php中,显示了报错的警告信息后,将return 0 !!! 也就是虽然报了错,但却判定其相等了。这对于使用这个函数来做选择语句中的判断的代码来说简直是一个致命的漏洞,当然,php官方在后面的版本中修复了这个漏洞,使得报错的时候函数不返回任何值。strcmp只会处理字符串参数,如果给个数组的话呢,就会返回NULL,而判断使用的是==NULL==0是 `bool(true)

              is_numeric函数

              is_numeric()函数来判断变量是否为数字,是数字返回1,不是则返回0。比较范围不局限于十进制数字。

              <?php
              echo is_numeric(233333);       # 1
              echo is_numeric('233333');    # 1
              echo is_numeric(0x233333);    # 1
              echo is_numeric('0x233333');   # 1
              echo is_numeric('233333abc');  # 0
              ?>   
               
               
              • 1
              • 2
              • 3
              • 4
              • 5
              • 6

              栗子

              <?php
              error_reporting(0);
              $flag = "flag{test}";
              

              t e m p < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > temp</span> <span class="token operator">=</span> <span class="token variable"> temp</span><spanclass="tokenoperator">=</span><spanclass="tokenvariable">_GET[‘password’];
              is_numeric( t e m p < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ) < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > ? < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > d i e < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n d o u b l e − q u o t e d − s t r i n g s t r i n g " > " n o n u m e r i c " < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ) < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > : < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > N U L L < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > i f < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > temp</span><span class="token punctuation">)</span><span class="token operator">?</span><span class="token keyword">die</span><span class="token punctuation">(</span><span class="token double-quoted-string string">"no numeric"</span><span class="token punctuation">)</span><span class="token punctuation">:</span><span class="token keyword">NULL</span><span class="token punctuation">;</span> <span class="token keyword">if</span><span class="token punctuation">(</span><span class="token variable"> temp</span><spanclass="tokenpunctuation">)</span><spanclass="tokenoperator">?</span><spanclass="tokenkeyword">die</span><spanclass="tokenpunctuation">(</span><spanclass="tokendoublequotedstringstring">"nonumeric"</span><spanclass="tokenpunctuation">)</span><spanclass="tokenpunctuation">:</span><spanclass="tokenkeyword">NULL</span><spanclass="tokenpunctuation">;</span><spanclass="tokenkeyword">if</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">temp>1336){
              echo $flag;
              }
              ?>

              • 1
              • 2
              • 3
              • 4
              • 5
              • 6
              • 7
              • 8
              • 9

              题解

              is_numeric($temp)?die(“no numeric”):NULL;`
              不能是数字

              if($temp>1336){
                  echo $flag;
              } 
              
               
               
              • 1
              • 2
              • 3

              又要大于1336

              利用PHP弱类型的一个特性,当一个整形和一个其他类型行比较的时候,会先把其他类型intval再比。如果输入一个1337a这样的字符串,在is_numeric中返回true,然后在比较时被转换成数字1337,这样就绕过判断输出flag

              http://127.0.0.1/php_bug/22.php?password=1337a
              
               
               
              • 1
              sha1 和 md5 函数

              md5 和 sha1 无法处理数组,返回 NULL

              if (@sha1([]) ==  false)
              echo 1;
              if (@md5([]) ==  false)
              echo 2;
              echo var_dump(@sha1([]));
              echo var_dump(@md5([]))
               
               
              • 1
              • 2
              • 3
              • 4
              • 5

              在这里插入图片描述

              参考payload

              若为md5($_GET['username']) == md5($_GET['password'])
              则可以构造:

              http://127.0.0.1/Php_Bug/18.php?username=QNKCDZO&password=240610708
               
               

                因为==对比的时候会进行数据转换,0eXXXXXXXXXX 转成0
                也可以使用数组绕过

                http://127.0.0.1/Php_Bug/18.php?username[]=1&password[]=2
                 
                 

                  但此处是===,只能用数组绕过,PHP对数组进行hash计算都会得出null的空值

                  `http://127.0.0.1/Php_Bug/18.php?username[]=1&password[]=2
                   
                   
                    preg_match

                    如果在进行正则表达式匹配的时候,没有限制字符串的开始和结束(^ 和 $),则可以存在绕过的问题

                    <?php
                    $ip = '1.1.1.1 abcd'; // 可以绕过
                    if(!preg_match("/(\d+)\.(\d+)\.(\d+)\.(\d+)/",$ip)) {
                      die('error');
                    } else {
                       echo('key...');
                    }
                    

                    ?>

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8

                    parse_str

                    与 parse_str() 类似的函数还有 mb_parse_str(),parse_str 将字符串解析成多个变量,如果参数str是URL传递入的查询字符串(query string),则将它解析为变量并设置到当前作用域

                    *//var.php?var=new*  
                    $var='init';  
                    parse_str($_SERVER['QUERY_STRING']);  
                    print $var;
                     
                     
                    • 1
                    • 2
                    • 3
                    字符串比较

                    == 是弱类型的比较,以下比较都为 true

                    <?php  
                    echo 0 == 'a' ;// a 转换为数字为 0    重点注意
                    

                    // 0x 开头会被当成16进制54975581388的16进制为 0xccccccccc
                    // 十六进制与整数,被转换为同一进制比较
                    ‘0xccccccccc’ ‘54975581388’ ;
                    // 字符串在与数字比较前会自动转换为数字,如果不能转换为数字会变成0
                    1 ‘1’;
                    1 ‘01’;
                    10 ‘1e1’;
                    ‘100’ == ‘1e2’ ;

                    // 十六进制数与带空格十六进制数,被转换为十六进制整数
                    ‘0xABCdef’ ’ 0xABCdef’;
                    echo ‘0010e2’ ‘1e3’;
                    // 0e 开头会被当成数字,又是等于 0*10^xxx=0
                    // 如果 md5 是以 0e 开头,在做比较的时候,可以用这种方法绕过
                    ‘0e509367213418206700842008763514’ ‘0e481036490867661113260034900752’;
                    ‘0e481036490867661113260034900752’ ‘0’ ;

                    var_dump(md5(‘240610708’) md5(‘QNKCDZO’));
                    var_dump(md5(‘aabg7XSs’) md5(‘aabC9RqS’));
                    var_dump(sha1(‘aaroZmOk’) sha1(‘aaK1STfY’));
                    var_dump(sha1(‘aaO8zKZF’) sha1(‘aa3OFF9m’));

                    ?>

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8
                    • 9
                    • 10
                    • 11
                    • 12
                    • 13
                    • 14
                    • 15
                    • 16
                    • 17
                    • 18
                    • 19
                    • 20
                    • 21
                    • 22
                    • 23
                    • 24
                    • 25

                    变量本身的key

                    说到变量的提交很多人只是看到了GET/POST/COOKIE等提交的变量的值,但是忘记了有的程序把变量本身的key也当变量提取给函数处理。

                     <?php
                    //key.php?aaaa'aaa=1&bb'b=2 
                    

                    //print_R($_GET);

                    foreach ( G E T < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > A S < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > _GET</span> <span class="token keyword">AS</span> <span class="token variable"> GET</span><spanclass="tokenkeyword">AS</span><spanclass="tokenvariable">key => $value)

                    {

                        <span class="token keyword">print</span> <span class="token variable">$key</span><span class="token punctuation">.</span><span class="token double-quoted-string string">"\n"</span><span class="token punctuation">;</span>
                    

                    }

                    ?>

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8
                    • 9
                    • 10
                    • 11
                    • 12
                    • 13

                    extract()变量覆盖

                    extract()这个函数在指定参数为EXTR_OVERWRITE或者没有指定函数可以导致变量覆盖!

                    <?php  
                        $auth = '0';  
                        // 这里可以覆盖$auth的变量值
                        extract($_GET); 
                        if($auth == 1){  
                            echo "private!";  
                        } else{  
                            echo "public!";  
                        }  
                    

                    ?>

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8
                    • 9
                    • 10

                    <?php  
                    $a='hi';
                    foreach($_GET as $key => $value) {
                    echo $key;
                    $$key = $value;
                    }
                    print $a;
                    ?>
                     
                     
                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7

                    参考payload

                    示例代码

                    <?php
                    

                    f l a g < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n s i n g l e − q u o t e d − s t r i n g s t r i n g " > ′ x x x ′ < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > e x t r a c t < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > flag</span><span class="token operator">=</span><span class="token single-quoted-string string">'xxx'</span><span class="token punctuation">;</span> <span class="token function">extract</span><span class="token punctuation">(</span><span class="token variable"> flag</span><spanclass="tokenoperator">=</span><spanclass="tokensinglequotedstringstring">xxx</span><spanclass="tokenpunctuation">;</span><spanclass="tokenfunction">extract</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">_GET);
                    if(isset(KaTeX parse error: Expected '}', got 'EOF' at end of input: …oken variable">content=trim(file_get_contents( f l a g < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ) < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ) < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n k e y w o r d " > i f < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > flag</span><span class="token punctuation">)</span><span class="token punctuation">)</span><span class="token punctuation">;</span> <span class="token keyword">if</span><span class="token punctuation">(</span><span class="token variable"> flag</span><spanclass="tokenpunctuation">)</span><spanclass="tokenpunctuation">)</span><spanclass="tokenpunctuation">;</span><spanclass="tokenkeyword">if</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">shiyan==$content)
                    {
                    echo’ctf{xxx}’;
                    }
                    else
                    {
                    echo’Oh.no’;
                    }
                    }

                    ?>

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8
                    • 9
                    • 10
                    • 11
                    • 12
                    • 13
                    • 14
                    • 15
                    • 16
                    • 17

                    payload:http://127.0.0.1/Php_Bug/extract1.php?shiyan=&flag=1

                    绕过过滤的空白字符
                    <?php
                    

                    i n f o < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n d o u b l e − q u o t e d − s t r i n g s t r i n g " > " " < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > info</span> <span class="token operator">=</span> <span class="token double-quoted-string string">""</span><span class="token punctuation">;</span> <span class="token variable"> info</span><spanclass="tokenoperator">=</span><spanclass="tokendoublequotedstringstring">""</span><spanclass="tokenpunctuation">;</span><spanclass="tokenvariable">req = [];
                    $flag=“xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx”;
                    ini_set(“display_error”, false); //为一个配置选项设置值
                    error_reporting(0); //关闭所有PHP错误报告

                    if(!isset($_GET[‘number’])){
                    header(“hint:26966dc52e85af40f59b4fe73d8c323a.txt”); //HTTP头显示hint 26966dc52e85af40f59b4fe73d8c323a.txt

                    die(“have a fun!!”); //die — 等同于 exit()

                    }
                    foreach([ G E T < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > , < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > _GET</span><span class="token punctuation">,</span> <span class="token variable"> GET</span><spanclass="tokenpunctuation">,</span><spanclass="tokenvariable">_POST] as KaTeX parse error: Expected '}', got 'EOF' at end of input: …oken variable">global_var as KaTeX parse error: Expected 'EOF', got '&' at position 78: …oken operator">&̲gt;</span> <spa…value) {
                    v a l u e < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > t r i m < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > value</span> <span class="token operator">=</span> <span class="token function">trim</span><span class="token punctuation">(</span><span class="token variable"> value</span><spanclass="tokenoperator">=</span><spanclass="tokenfunction">trim</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">value); //trim — 去除字符串首尾处的空白字符(或者其他字符)
                    is_string(KaTeX parse error: Expected 'EOF', got '&' at position 83: …oken operator">&̲amp;&amp;</span…req[ k e y < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ] < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > a d d s l a s h e s < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > key</span><span class="token punctuation">]</span> <span class="token operator">=</span> <span class="token function">addslashes</span><span class="token punctuation">(</span><span class="token variable"> key</span><spanclass="tokenpunctuation">]</span><spanclass="tokenoperator">=</span><spanclass="tokenfunction">addslashes</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">value); // is_string — 检测变量是否是字符串,addslashes — 使用反斜线引用字符串
                    }
                    }
                    function is_palindrome_number(KaTeX parse error: Expected '}', got 'EOF' at end of input: …oken variable">number = strval( n u m b e r < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ) < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n c o m m e n t " > / / s t r v a l — 获 取 变 量 的 字 符 串 值 < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > number</span><span class="token punctuation">)</span><span class="token punctuation">;</span> <span class="token comment">//strval — 获取变量的字符串值</span> <span class="token variable"> number</span><spanclass="tokenpunctuation">)</span><spanclass="tokenpunctuation">;</span><spanclass="tokencomment">//strval</span><spanclass="tokenvariable">i = 0;
                    j < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > = < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > s t r l e n < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > j</span> <span class="token operator">=</span> <span class="token function">strlen</span><span class="token punctuation">(</span><span class="token variable"> j</span><spanclass="tokenoperator">=</span><spanclass="tokenfunction">strlen</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">number) - 1; //strlen — 获取字符串长度
                    while(KaTeX parse error: Expected 'EOF', got '&' at position 39: …oken operator">&̲lt;</span> <spa…j) {
                    if( n u m b e r < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > [ < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > number</span><span class="token punctuation">[</span><span class="token variable"> number</span><spanclass="tokenpunctuation">[</span><spanclass="tokenvariable">i] !== n u m b e r < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > [ < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > number</span><span class="token punctuation">[</span><span class="token variable"> number</span><spanclass="tokenpunctuation">[</span><spanclass="tokenvariable">j]) {
                    return false;
                    }
                    i < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > + + < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ; < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > i</span><span class="token operator">++</span><span class="token punctuation">;</span> <span class="token variable"> i</span><spanclass="tokenoperator">++</span><spanclass="tokenpunctuation">;</span><spanclass="tokenvariable">j;
                    }
                    return true;
                    }

                    if(is_numeric($_REQUEST[‘number’])) //is_numeric — 检测变量是否为数字或数字字符串
                    {

                    $info=“sorry, you cann’t input a number!”;

                    }
                    elseif( r e q < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > [ < / s p a n > < s p a n c l a s s = " t o k e n s i n g l e − q u o t e d − s t r i n g s t r i n g " > ′ n u m b e r ′ < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ] < / s p a n > < s p a n c l a s s = " t o k e n o p e r a t o r " > ! = < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > s t r v a l < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n f u n c t i o n " > i n t v a l < / s p a n > < s p a n c l a s s = " t o k e n p u n c t u a t i o n " > ( < / s p a n > < s p a n c l a s s = " t o k e n v a r i a b l e " > req</span><span class="token punctuation">[</span><span class="token single-quoted-string string">'number'</span><span class="token punctuation">]</span><span class="token operator">!=</span><span class="token function">strval</span><span class="token punctuation">(</span><span class="token function">intval</span><span class="token punctuation">(</span><span class="token variable"> req</span><spanclass="tokenpunctuation">[</span><spanclass="tokensinglequotedstringstring">number</span><spanclass="tokenpunctuation">]</span><spanclass="tokenoperator">!=</span><spanclass="tokenfunction">strval</span><spanclass="tokenpunctuation">(</span><spanclass="tokenfunction">intval</span><spanclass="tokenpunctuation">(</span><spanclass="tokenvariable">req[‘number’]))) //intval — 获取变量的整数值
                    {

                     $info = "number must be equal to it'</span>s integer<span class="token operator">!</span><span class="token operator">!</span> <span class="token double-quoted-string string">";  
                    

                    }
                    else
                    {

                     <span class="token interpolation"><span class="token variable">$value1</span></span> = intval(<span class="token interpolation"><span class="token variable">$req</span></span>["</span>number<span class="token double-quoted-string string">"]);
                     <span class="token interpolation"><span class="token variable">$value2</span></span> = intval(strrev(<span class="token interpolation"><span class="token variable">$req</span></span>["</span>number<span class="token double-quoted-string string">"]));  
                     
                     if(<span class="token interpolation"><span class="token variable">$value1</span></span>!=<span class="token interpolation"><span class="token variable">$value2</span></span>){
                          <span class="token interpolation"><span class="token variable">$info</span></span>="</span>no<span class="token punctuation">,</span> this is not a palindrome number<span class="token operator">!</span><span class="token double-quoted-string string">";
                     }
                     else
                     {
                     
                          if(is_palindrome_number(<span class="token interpolation"><span class="token variable">$req</span></span>["</span>number<span class="token double-quoted-string string">"])){
                              <span class="token interpolation"><span class="token variable">$info</span></span> = "</span>nice<span class="token operator">!</span> <span class="token punctuation">{</span><span class="token variable">$value1</span><span class="token punctuation">}</span> is a palindrome number<span class="token operator">!</span>"<span class="token punctuation">;</span> 
                          <span class="token punctuation">}</span>
                          <span class="token keyword">else</span>
                          <span class="token punctuation">{</span>
                             <span class="token variable">$info</span><span class="token operator">=</span><span class="token variable">$flag</span><span class="token punctuation">;</span>
                          <span class="token punctuation">}</span>
                     <span class="token punctuation">}</span>
                    

                    }

                    echo $info;

                    • 1
                    • 2
                    • 3
                    • 4
                    • 5
                    • 6
                    • 7
                    • 8
                    • 9
                    • 10
                    • 11
                    • 12
                    • 13
                    • 14
                    • 15
                    • 16
                    • 17
                    • 18
                    • 19
                    • 20
                    • 21
                    • 22
                    • 23
                    • 24
                    • 25
                    • 26
                    • 27
                    • 28
                    • 29
                    • 30
                    • 31
                    • 32
                    • 33
                    • 34
                    • 35
                    • 36
                    • 37
                    • 38
                    • 39
                    • 40
                    • 41
                    • 42
                    • 43
                    • 44
                    • 45
                    • 46
                    • 47
                    • 48
                    • 49
                    • 50
                    • 51
                    • 52
                    • 53
                    • 54
                    • 55
                    • 56
                    • 57
                    • 58
                    • 59
                    • 60
                    • 61
                    • 62
                    • 63
                    • 64
                    • 65
                    • 66
                    • 67
                    • 68
                    • 69
                    • 70
                    • 71
                    • 72
                    • 73

                    可以引入\f(也就是%0c)在数字前面,来绕过最后那个is_palindrome_number函数,而对于前面的数字判断,因为intval和is_numeric都会忽略这个字符,所以不会影响。

                    http://127.0.0.1/Php_Bug/02.php?number=%00%0c191

                    资料:

                    后记

                    此篇为PHP函数漏洞审计上篇,总结了一些常见函数漏洞,并结合了CTF题目进行分析!PHP代码审计系列还会继续,希望大家能有所收获!不积硅步,无以至千里!
                    PHP代码审计之函数漏洞(下)

                                                    </div>
                                <link href="https://csdnimg.cn/release/phoenix/mdeditor/markdown_views-095d4a0b23.css" rel="stylesheet">
                                    </div> 	
                    
                    评论
                    添加红包

                    请填写红包祝福语或标题

                    红包个数最小为10个

                    红包金额最低5元

                    当前余额3.43前往充值 >
                    需支付:10.00
                    成就一亿技术人!
                    领取后你会自动成为博主和红包主的粉丝 规则
                    hope_wisdom
                    发出的红包
                    实付
                    使用余额支付
                    点击重新获取
                    扫码支付
                    钱包余额 0

                    抵扣说明:

                    1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
                    2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

                    余额充值