服务器维护,服务器代维,安全设置,漏洞扫描,入侵检测服务

dirtysea 发表于 2008-1-9 19:12:53

Dvbbs8.1最新漏洞通杀Access和mssql版(注入文件Userpay.asp本)[

看代码UserPay.asp行12-64<BR>
<P class=code>If&nbsp;Request("raction")="alipay_return"&nbsp;Then<BR>&nbsp;&nbsp;AliPay_Return()<BR>&nbsp;&nbsp;Dvbbs.Footer()<BR>&nbsp;&nbsp;Response.End<BR>ElseIf&nbsp;Request("action")="alipay_return"&nbsp;Then<BR>&nbsp;&nbsp;AliPay_Return()<BR>&nbsp;&nbsp;Dvbbs.Footer()<BR>&nbsp;&nbsp;Response.End<BR>'ElseIf&nbsp;Request("action")="Re_inmoney"&nbsp;Then<BR>'&nbsp;&nbsp;Re_inmoney()<BR>'&nbsp;&nbsp;Dvbbs.Footer()<BR>'&nbsp;&nbsp;Response.End<BR>End&nbsp;If</P>无论用户提交的raction为alipay_return还是action为alipay_return都调用了AliPay_Return()过程。AliPay_Return()的代码原型在行329-351,代码如下:<BR>
<P class=code>Sub&nbsp;AliPay_Return()<BR>&nbsp;&nbsp;If&nbsp;Dvbbs.Forum_ChanSetting(5)&nbsp;&lt;&gt;&nbsp;"0"&nbsp;Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;AliPay_Return_Old()<BR>&nbsp;&nbsp;&nbsp;&nbsp;Exit&nbsp;sub<BR>&nbsp;&nbsp;Else<BR>&nbsp;&nbsp;&nbsp;&nbsp;Dim&nbsp;Rs,Order_No,EnCodeStr,UserInMoney<BR>&nbsp;&nbsp;&nbsp;&nbsp;Order_No=Request("out_trade_no")<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set&nbsp;Rs&nbsp;=&nbsp;Dvbbs.Execute("Select&nbsp;*&nbsp;From&nbsp;&nbsp;Where&nbsp;O_IsSuc=3&nbsp;And&nbsp;O_PayCode='"&amp;Order_No&amp;"'")<BR>&nbsp;&nbsp;&nbsp;&nbsp;If&nbsp;not(Rs.Eof&nbsp;And&nbsp;Rs.Bof)&nbsp;Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;AliPay_Return_Old()<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Exit&nbsp;sub<BR>&nbsp;&nbsp;&nbsp;&nbsp;End&nbsp;if<BR>&nbsp;&nbsp;&nbsp;&nbsp;Response.Clear<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set&nbsp;Rs&nbsp;=&nbsp;Dvbbs.Execute("Select&nbsp;*&nbsp;From&nbsp;&nbsp;Where&nbsp;O_IsSuc=0&nbsp;And&nbsp;O_PayCode='"&amp;Order_No&amp;"'")<BR>&nbsp;&nbsp;&nbsp;&nbsp;If&nbsp;Rs.Eof&nbsp;And&nbsp;Rs.Bof&nbsp;Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Response.Write&nbsp;"N"<BR>&nbsp;&nbsp;&nbsp;&nbsp;Else<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Response.Write&nbsp;"Y"<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dvbbs.Execute("Update&nbsp;Dv_ChanOrders&nbsp;Set&nbsp;O_IsSuc=3&nbsp;Where&nbsp;O_ID&nbsp;=&nbsp;"&nbsp;&amp;&nbsp;Rs("O_ID"))<BR>&nbsp;&nbsp;&nbsp;&nbsp;End&nbsp;If<BR>&nbsp;&nbsp;&nbsp;&nbsp;Response.End<BR>&nbsp;&nbsp;End&nbsp;If<BR>End&nbsp;Sub</P><BR>如果Dvbbs.Forum_ChanSetting(5) &lt;&gt; "0" 就执行下面的sql语句,我们来看看数据库里默认的Forum_ChanSetting吧。<BR>
<P class=code>1,1,0,0,pay@aspsky.net,0,b63uvb8nsvsmbsaxszgvdr6svyus0l4t,1,1,1,1,1,1,1,100,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1</P>Forum_ChanSetting(5)缺省为0,好了你接着看就会笑了<BR>
<P class=code>Order_No=Request("out_trade_no")<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set&nbsp;Rs&nbsp;=&nbsp;Dvbbs.Execute("Select&nbsp;*&nbsp;From&nbsp;&nbsp;Where&nbsp;O_IsSuc=3&nbsp;And&nbsp;O_PayCode='"&amp;Order_No&amp;"'")</P>直接把获取的Order_No放到sql里面去了。<BR>回顾一下DVbbs8.0的Userpay.asp同样一个函数看代码<BR>
<P class=code>Sub&nbsp;AliPay_Return()<BR>&nbsp;&nbsp;If&nbsp;Dvbbs.Forum_ChanSetting(5)&nbsp;&lt;&gt;&nbsp;"0"&nbsp;Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;AliPay_Return_Old()<BR>&nbsp;&nbsp;Else<BR>&nbsp;&nbsp;&nbsp;&nbsp;Response.Clear<BR>&nbsp;&nbsp;&nbsp;&nbsp;Dim&nbsp;Rs,Order_No,EnCodeStr,UserInMoney<BR>&nbsp;&nbsp;&nbsp;&nbsp;Order_No&nbsp;=&nbsp;Dvbbs.CheckStr(Request("order_no"))<BR>&nbsp;&nbsp;&nbsp;&nbsp;Set&nbsp;Rs&nbsp;=&nbsp;Dvbbs.Execute("Select&nbsp;*&nbsp;From&nbsp;Dv_ChanOrders&nbsp;Where&nbsp;O_IsSuc=0&nbsp;And&nbsp;O_PayCode&nbsp;=&nbsp;'"&amp;Order_No&amp;"'")<BR>&nbsp;&nbsp;&nbsp;&nbsp;If&nbsp;Rs.Eof&nbsp;And&nbsp;Rs.Bof&nbsp;Then<BR>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Response.Write&nbsp;"N"</P>可以看出Order_No用CheckStr处理了,不存在sql注入漏洞,为什么到了新版本反而就直接放行了呢?莫非是笔误?<BR>如果你和我一样懒,并不想精心构造语句去搞破坏,只是试图去说明这个地方不安全,用下面的链接验证下看看<BR>吧(需要登录)<BR>
<P class=code>http://www.tr4c3.com/UserPay.asp?raction=alipay_return&amp;out_trade_no=1'</P>本地测试返回图示<BR><IMG title="" alt="" src="http://www.tr4c3.com/upload/200801080915484626.jpg" width=520 onload=ResizeImage(this,520)><BR><IMG title="" alt="" src="http://www.tr4c3.com/upload/200801080916034474.jpg" width=520 onload=ResizeImage(this,520)><BR><BR>如果想再深入点,看看动画吧,懒得打字了。:-)<BR>由于本人没下载到dvbb8.1的sql版本,也懒得去网上找,所以无法判断其版本也存在该漏洞,有条件的朋友看看反馈<BR>下。<BR><A href="http://www.tr4c3.com/upload/200801080917104654.rar" target=_blank>动画下载</A><BR>经过群里的淫棍樱木花盗测试官方确认mssql版本也受此漏洞影响<BR><IMG title="" alt="" src="http://www.tr4c3.com/upload/200801081003115487.jpg" width=520 onload=ResizeImage(this,520)><BR><IMG title="" alt="" src="http://www.tr4c3.com/upload/200801081102150778.jpg" width=520 onload=ResizeImage(this,520)>
<DIV class=commentbox id=comment1>
<DIV class=commentbox-title>&nbsp;</DIV></DIV>

aill 发表于 2006-6-8 19:21:27

re:Dvbbs8.1最新漏洞通杀Access和mssql版(注入文件Userpay.asp本)[

<P>小刀:QQ58173096</P>
<P>东青,猪,你生日快乐~!!!</P>
页: [1]
查看完整版本: Dvbbs8.1最新漏洞通杀Access和mssql版(注入文件Userpay.asp本)[