一条龙奇迹私服WEB系统后门及bug

后门,你懂得web

 

一条龙开服专用WEB系统。sql

 

就是那些给几千元就送个配置好的服务器给你马上当GM的东西,骗了很多无知少年。服务器

 

加密的,很难找到了解密文件。ide

 

看代码。函数

 

LgKj.LocalDevilRank.asp:加密

 

开头省了没用的code

Sc=request.Form("ServerCode")orm

Job=request.Form("Job")server

 

F Sc="" THENit

 

 

    Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM  Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE  (memb_info.servercode = 0 ) AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"

    rs1.open sql,conn,1,1

               

Else 

 if Job="" then

 

    Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM  Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE  (memb_info.servercode = "&Sc&" ) AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"

                rs1.open sql,conn,1,1

 else

     Sql="SELECT Name,cLevel,Class,Money,PkLevel,PkCount,ResetLife,AccountID FROM  Character INNER JOIN memb_info ON AccountID = memb_info.memb___id WHERE  (memb_info.servercode = "&Sc&" ) AND (Class = "&Job&") AND (IsNull(CtlCode,0)<>1) ORDER BY PkCount DESC"

                rs1.open sql,conn,1,1

前台惟一能注入的地方就只有这里

除了没解密的公用函数库 看不到

 

而后就是后台登陆文件 任意一文件

前面代码没用省了

<%

'检查管理员是否登陆

AdminName = ReplaceBadChar(Trim(Request.Cookies(webkey)("AdminName")))

AdminPassword = ReplaceBadChar(Trim(Request.Cookies(webkey)("AdminPassword")))

RndPassword = ReplaceBadChar(Trim(Request.Cookies(webkey)("RndPassword")))

If AdminName = "" Or AdminPassword = "" Or RndPassword = "" Then

        Response.Redirect "default.asp"

End If

%>

这验证方法真好

webkey

默认是BaiWanMuWebServer

新版本好像是BaiWanMU.Com

后台没有任何写文件方法!

 

还有一处漏洞就是COOKIES修改登陆了的会员 不验证密码的 不过没什么做用

相关文章
相关标签/搜索