Why?
Jetson article system 0.9.6 has the SQL Injection Vulnerability
The security of this system is good in general, whether from post, get or Cookies, filtering is good, but there is a small problem in ads. asp, look at the code
Getprice = request. querystring ("priceid ")
If Chkrequest (getprice) then
If getprice = "" or Not Isnumeric (getprice) then
Getprice = 1
End if
End if
Hangnum = 1
Lienum = 1
The value of priceid is assigned to getprice, and a series of filters and judgments are made for getprice. However, the value of priceid is unknown. I have searched the entire document and have not found any processing process for the value of priceid, in this way, we can construct a priceid value by ourselves. Because priceid has no processing process, there is a security risk.
For example:
You can see an image. You can just give the address to Tom or D. (Note that you must manually add the column name, set the Administrator account to A_user, and set the password to A_pass)
Finally, let's talk about the usage method;
Google: Power By JYcms! Or inurl: Skill/Info. asp? Infoid
Default backend: Manage/admin_login.asp
Let's not talk about getting Shell in the background. The vulnerability has been notified to the official website. No patch is available currently.
Reprinted please indicate the source