评论

收藏

[Discuz] UCenter防止恶意访问(安全加固)

建站程序 建站程序 发布于:2021-07-11 11:37 | 阅读数:211 | 评论:0

功能说明:uc_server/admin.php是ucenter默认的后台地址,正常情况下可以直接访问,为了防止某些恶意访问的情况,可以修改以下内容进行安全性能提升。
适用版本:Discuz!x1-x3.4适用情况:ucenter在论坛根目录下
修改后效果:未登录Discuz论坛或不在指定的管理组,打开uc_server/admin.php提示404
原帖地址:https://www.discuzlab.com/thread-56805-1-1.html转载请注明出处,谢谢!
具体实施方案:
打开uc_server/model/admin.php

搜索:
$this->cookie_status = isset($_COOKIE['sid']) ? 1 : 0;
在下面加入以下代码:
if(!$this->cookie_status){
            include UC_ROOT.'../config/config_global.php';
            $cookiepre = $_config['cookie']['cookiepre'].substr(md5($_config['cookie']['cookiepath'].'|'.$_config['cookie']['cookiedomain']), 0, 4).'_';
            $auth = addslashes($_COOKIE[$cookiepre.'auth']);
            if(empty($_config['cookie']['saltkey'])) {
                $_config['cookie']['saltkey'] = addslashes($_COOKIE[$cookiepre.'saltkey']);
            }
            $authkey = md5($_config['security']['authkey'].$_config['cookie']['saltkey']);
            $auth = daddslashes(explode("\t", $this->dauthcode($auth, 'DECODE',$authkey)));
            list($discuz_pw, $discuz_uid) = empty($auth) || count($auth) < 2 ? array('', '') : $auth;
            $discuz_uid = intval($discuz_uid);
            $groupid = $this->db->result_first("SELECT groupid FROM ".$_config['db'][1]['tablepre']."common_member WHERE uid='$discuz_uid'");
            if(!in_array($groupid,array('1','2'))){
                 header("HTTP/1.1 404 Not Found");header("Status: 404 Not Found");exit;
            }
        }
注意:以上代码中第13行里的 array('1','2') 为你要增加的用户组


搜索:
function __construct() {
        $this->adminbase();
    }

后面加入:
function dauthcode($string, $operation = 'DECODE', $key = '', $expiry = 0) {
        $ckey_length = 4;
        $key = md5($key );
        $keya = md5(substr($key, 0, 16));
        $keyb = md5(substr($key, 16, 16));
        $keyc = $ckey_length ? ($operation == 'DECODE' ? substr($string, 0, $ckey_length): substr(md5(microtime()), -$ckey_length)) : '';

        $cryptkey = $keya.md5($keya.$keyc);
        $key_length = strlen($cryptkey);

        $string = $operation == 'DECODE' ? base64_decode(substr($string, $ckey_length)) : sprintf('%010d', $expiry ? $expiry + time() : 0).substr(md5($string.$keyb), 0, 16).$string;
        $string_length = strlen($string);

        $result = '';
        $box = range(0, 255);

        $rndkey = array();
        for($i = 0; $i <= 255; $i++) {
            $rndkey[$i] = ord($cryptkey[$i % $key_length]);
        }

        for($j = $i = 0; $i < 256; $i++) {
            $j = ($j + $box[$i] + $rndkey[$i]) % 256;
            $tmp = $box[$i];
            $box[$i] = $box[$j];
            $box[$j] = $tmp;
        }

        for($a = $j = $i = 0; $i < $string_length; $i++) {
            $a = ($a + 1) % 256;
            $j = ($j + $box[$a]) % 256;
            $tmp = $box[$a];
            $box[$a] = $box[$j];
            $box[$j] = $tmp;
            $result .= chr(ord($string[$i]) ^ ($box[($box[$a] + $box[$j]) % 256]));
        }

        if($operation == 'DECODE') {
            if((substr($result, 0, 10) == 0 || substr($result, 0, 10) - time() > 0) && substr($result, 10, 16) == substr(md5(substr($result, 26).$keyb), 0, 16)) {
                return substr($result, 26);
            } else {
                return '';
            }
        } else {
            return $keyc.str_replace('=', '', base64_encode($result));
        }

    }
注意:以上方法仅对2019年以前版本的3.4有效!2019以后的版本可以修改/admin.php来代替此方法

admin.php 防止直接恶意访问返回首页:https://www.codeae.com/thread-5424-1-1.html
admin.php 防止直接恶意访问直接返回404:https://www.codeae.com/thread-5421-1-1.html

关注下面的标签,发现更多相似文章