逐浪CMS某处编码SQL注入漏洞 地址
protected void Page_Load(object sender, EventArgs e) { if (base.Request.QueryString["type"] != null) { this.md.Caddtime = DateTime.Now; this.md.Cadduser = this.user.GetLogin().UserName; string s = base.Request.Form.ToString(); s = base.Server.UrlDecode(s); try { s = BaseClass.FromBase64String(s); //base64转换 } catch (Exception exception) { s = exception.ToString() + s; } if (s.IndexOf("$") > -1) { string[] strArray = s.Split(new char[] { '$' }, StringSplitOptions.RemoveEmptyEntries); //分割 if (base.Request.QueryString["type"].ToString() == "Suser") { DataTable table = this.bduser.Select_Where(" Dutype=1 and DuShow=" + strArray[1], " * ", ""); //数组第二部分没处理 存在注入 if (table.Rows.Count > 0) { this.md.Ctouid = DataConverter.CLng(table.Rows[0]["DUid"].ToString()); } this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", ""); if ((this.dt.Rows.Count > 0) && (this.mduser.Dislogin == 0)) { this.mduser.Dmessage++; } } else { this.md.Ctouid = DataConverter.CLng(strArray[1]); this.dt = this.bduser.Select_Where(" Duid=" + this.md.Ctouid, " * ", ""); this.mduser.Dmessage++; } this.md.Ccontent = BaseClass.Htmlcode(strArray[0]); this.md.ChatType = 0; this.SetUserContext(); } else { this.dt = this.bduser.Select_Where(" Duid=" + this.user.GetLogin().UserID, " * ", ""); this.md.Ccontent = BaseClass.Htmlcode(s); this.md.ChatType = 1; this.SetUserContext(); } this.bd.GetInsert(this.md); } if (this.dt != null) { this.dt.Dispose(); } } 访问
提交
这个是base64的值 原来的值是 a$1 and (select @@version)>0 -- $后面可自己构造 然后整个字符串转换为base64编码 修复方案:对参数进行处理
|
-
上一篇: Discuz3.2后台文件包含漏洞可后台拿shell - 网站安全
下一篇: 另类隐藏保护asp大马地址方法 - 网站安全 - 自学
还没有人抢沙发呢~