Author: jshe
References:/Article/200905/38025 .html
A friend who opened an online store asked me to help you develop a website to introduce this article.
According to this system, the overall security is good, and the passed variables are strictly filtered.
I forgot a place in showgbook. asp.
<% Dim messid
Fkid = Request ("id ")
Set rs = server. CreateObject ("adodb. recordset ")
Rs. open "select * from BJX_fk where fkid =" & fkid & "", conn, 1, 3
%>
The author may have neglected such a typical injection vulnerability:
In addition, there is no authentication during the upload, and the vulnerability similar to that of a hacker can modify the uppath value at will.
You can use the following methods to fix these two vulnerabilities:
Fkid = Request ("id") is followed by a judgment
If not isnumeric (request ("id") then
Response. end
For that upload Identity Authentication
<% If session ("bjxadmin") = "" then
Response. Write ""
Response. End
End if
%>
The author's program is free, which is rare in online shopping systems to avoid some sb attacks to others.
This article only writes vulnerability analysis, and does not write or exploit it. It will never joke with noble people.