First you need to declare. This is purely without foresight and a bit of talent to develop a silly view, only for Web reference systems security.
1. HTTP parameter injection attack
The parameters, which are used as a reference in the backend HTTP request, can cause an HTTP parameter injection.
A rotten self-thought out, for example:
One-to-peer transfer system: money, where to go (from).
A very easy system. Developed in order to reuse the code. An inferred character (check) was added. Of course, this inferred character (check) does not go out of the document system of this peer transfer system today;
2, a typical easy to be injected into the HTTP parameters of the attack source code
httpaddparam.jsp
<%@ page language="java" import="java.util.*,javax.servlet.http.*" pageencoding=" UTF-8 "%><! DOCTYPE HTML PUBLIC "-//w3c//dtd HTML 4.01 transitional//en" ><html> <head> <title>Watch your door,-ah, classmate.</title> </head> <body>Your address:<%= (String)request. GETREMOTEADDR ()%> <br> <%StringFrom = (String)Request. GetParameter ("from");StringMoney = (String)Request. GetParameter ("Money");String to= (String)Request. GetParameter ("to");StringCheck = (String)Request. GetParameter ("Check");if(Check = =NULL) {check ="0"; }if(Check.equals ("1") {Out.write ("Ok,show me the money." "); }Else{Out.write ("Send money to:"+ to); }%> <br> </body></html>
3. A typical case of soap injection attacks
According to the normal input of the document if:
http://127.0.0.1:8080/webStudy/httpAddParam.jsp?from=andson&to=iris&money=10显示:你的地址:127.0.0.1sendto :iris
But the check number was discovered by the attacker. The attacker then added a check to the number of references:
http://127.0.0.1:8080/webStudy/httpAddParam.jsp?from=andson&to=iris&money=10&check=1显示:你的地址:127.0.0.1the money。
HTTP number injection attack complete.
Copyright notice: This article blog original articles, blogs, without consent, may not be reproduced.
Look at your door.-Attack Server (4)-http parameter injection attack