服务器维护,服务器代维,安全设置,漏洞扫描,入侵检测服务

dirtysea 发表于 2008-4-19 23:10:24

Oblog4.6注入漏洞分析一

Date:2008-2-15<BR>Author:Yamato<BR>Version:Oblog 4.6<BR><BR>漏洞文件AjaxServer.asp:<BR>Sub digglog() //第691行<BR>If Not lcase(Request.ServerVariables("REQUEST_METHOD"))="post" Then Response.End<BR>。。。。。。<BR>If request("ptrue")=1 Then //第703行<BR>&nbsp;&nbsp;pdigg=oblog.checkuserlogined_digg(unescape(Trim(request("puser"))),Trim(request("ppass")))<BR>oblog.checkuserlogined_digg在/inc/ class_sys.asp文件下:<BR>Public Function CheckUserLogined_digg(puser,ppass)<BR>&nbsp;&nbsp;&nbsp;&nbsp;Dim rs <BR>&nbsp;&nbsp;&nbsp;&nbsp;If Not IsObject(conn) Then link_database<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set rs = Server.CreateObject("adodb.recordset")<BR>&nbsp;&nbsp;&nbsp;&nbsp;rs.open "select top 1 userid,username from oblog_user where username='"&amp;puser&amp;"' and truepassword='"&amp;ppass&amp;"'", conn, 1, 1<BR>&nbsp;&nbsp;&nbsp;&nbsp;If Not (rs.eof Or rs.bof) Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CheckUserLogined_digg="1$$"&amp;rs("userid")&amp;"$$"&amp;rs("username")<BR>&nbsp;&nbsp;&nbsp;&nbsp;Else <BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;CheckUserLogined_digg="0$$0$$0"<BR>&nbsp;&nbsp;&nbsp;&nbsp;End If <BR>&nbsp;&nbsp;&nbsp;&nbsp;rs.close<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set rs=Nothing <BR>&nbsp;&nbsp;End Function<BR>变量ppass没有任何过滤放入sql执行语句导致sql注入的产生。利用方法必须使用post提交.

super_tingting 发表于 2006-6-8 21:29:45

re:Oblog4.6注入漏洞分析一

<P>家门,真诚祝福你生日快乐!!!</P>
页: [1]
查看完整版本: Oblog4.6注入漏洞分析一