Recommended: parse vulnerabilities related to eWebEditor web editor First, some default characteristics of the editor are introduced: default login admin_login.asp default database db/ewewebeditor.mdb default account admin password admin or admin888 search inurl:ewebeditor at least thousands of sites with default characteristics. So try the default background http://www.xxx.com.cn/admin/eweb
At present, many websites use the method of generating static pages, because the access speed will be improved (the server-side CPU utilization rate is very low), and it is also easy to be included by search engines. However, one problem this brings is that you need enough space to store these static pages. If your space is not very rich and you want to be included by search engines, you can actually use a pseudostatic method. For example, the path of showarticle.asp?id1=1&id2=2 can be converted to showarticle/?1-2.htm (of course it can be converted to other forms). The specific method is as follows:
Preparation: Create file index.asp, folder showarticle, and create file index.asp (/index.asp, /showarticle, /showarticle/index.asp) in folder showarticle.
<html><head>
<title>==========index.asp==========Show article list file</title>
</head>
<body>
<%
'Database call code, omitted here
%>
<li><a href=showarticle/?<%=rs(id1)%>-<%=rs(id2)%>.htm><%=rs(title)%></a></li>
</body>
</html>
<html><head>
<title>======= showarticle/index.asp==========Showarticle/index.asp======Show article content file</title>
</head>
<body>
<%
Dim value1, value2, id1, id2
value1=replace(Request.ServerVariables(QUERY_STRING),.htm,) 'Get the following parameters
value2=split(value1,-) 'Filter the parameters to obtain the values of id1 and id2
id1=value2(0)
id2=value2(1)
'Next call the database and display the content, just like dynamic ASP
%>
</body>
</html>
Principle analysis: First, use Request.ServerVariables(QUERY_STRING) to obtain the parameters after ?, such as showarticle/?1-2.htm to receive 1-2.htm, and then filter 1-2.htm. The parameters we need to obtain are 1 and 2. Next, search 1 and 2 in the database, just like dynamic ASP.
Share: Interpreting the universal anti-SQL injection attack code in ASP programs SQL injection general http requests are nothing more than get and post, so as long as we filter illegal characters in the parameter information of all post or get requests in the file, we can prevent SQL injection attacks. The get request passed to asp.dll by IIS is in the form of a string. When it is passed to Request.QueryString data, the asp parser will analyze the Request.QueryString