1. Vulnerability Analysis
Vulnerability page: newsdisp. asp
Obvious injection vulnerability!
Some websites have been protected against this attack! (Cookie injection is enough)
The common table name is admin field name: username password
For some site tables, the wq_admin field is the same as the preceding one.
There is a more terrible vulnerability (but it is not a vulnerability )!
These sites basically use the user name and password that the network company gave them!
Username: xywanqi
Password: wanqi #029 * (thanks for the password)
Do not inject the user name and md5 password!
2. Search for the background (the process of getting hurt)
I tried several common backend servers and did not find them. I didn't even run it out with a d, a boy, or a leopard!
I used Google search for "technical support: hichina Internet" background management
Google was the first to find it!
I found his background very special:
Www.2cto.com/wq029xxx/login. asp is in this format!
I tried several sites.
The background is found!
3. shell
Back up your website! Upload a pony in the image format! Image path:/photo/20101000000009512.jpg
Some sites do not have backups!
You can upload captured packets. You can use the eweb editor in the background!
Don't laugh!
Www.2cto.com provides the repair solution:
The anti-injection program must be able to prevent cookie injection, change the password in time, and upgrade the editor.