[Question] Cho e hỏi về Blind SQL/XPath injection for string inputs |
17/07/2006 12:18:12 (+0700) | #1 | 7366 |
p405
Member
|
0 |
|
|
Joined: 26/06/2006 01:12:34
Messages: 7
Offline
|
|
Trong 1 lần nghịch ngợm e quét thử thì thấy xuất hiện thông báo lỗi sau ,nói chung là lỗi nặng :
bị lỗi : Blind SQL/XPath injection for string inputs
Affects /cgi-bin/login1.cgi
Details The script has been tested with these POST variables:
action=login&user=1'+and+'1'='1&pass=1
Severity high
Type Validation
Description This script is possibly vulnerable to SQL/XPath Injection attacks.
Impact An unauthenticated attacker may execute arbitrary SQL/XPath statements on the vulnerable system. This may compromise the integrity of your database and expose sensitive information.
Recommendation Your script should filter metacharacters from user input.
Reported by module MultiRequest parameter manipulation
Ngoài ra còn bị cái này nữa
CRLF injection
Affects /cgi-bin/login1.cgi
Details The script has been tested with these POST variables:
action=login&user=some_url%0d%0aSet-Cookie%3Athis_header%3Dwas_injected_by_wvs&pass=1
Severity medium
Type Validation
Description This script is possibly vulnerable to CRLF injection attacks. Is it possible for a remote attacker to inject custom HTTP headers.
Impact Possible XSS, HTTP header injection.
Recommendation Analyse the source code of this script and solve the problem.
Reported by module Parameter manipulation
References
Mong các anh giải thích rõ hơn và có thể cho e biết cách thâm nhập,xin chân thành cám ơn |
|
|
|
|
[Question] Cho e hỏi về Blind SQL/XPath injection for string inputs |
18/07/2006 06:58:50 (+0700) | #2 | 7585 |
p405
Member
|
0 |
|
|
Joined: 26/06/2006 01:12:34
Messages: 7
Offline
|
|
Chà không ai giúp đc à |
|
|
|