Author: sniper article in Nature: Original release date: 2004-04-02 From: www.4ngel.net E-Mail: sniper@77169.com ######## This article has been published in the "Hacker X Files" ############################################################################################ Painting the database to rename the database, plus special symbols to increase security. However, recent security sites have been found and downloaded, which is the very hot "bliss" technology discussed recently. I have also studied this technology in all the friends and the habitant and hacker X archives. Although the research results are not a lot, I hope to have a throwing role. Below I will take two systems to do instance analysis: Power Article system generally tells each site program file (generally conn.asp), of course this file name and path are not fixed, some is In the root directory of the site, some are placed in a special folder, usually this folder is named INC, the file name is conn.asp. If you link this with the branches, people will usually think that by accessing this file, you will get information about the database, and in fact, we will directly access this file, you won't get the information we want, so you need to combine some vulnerabilities. The purpose of reaching the branches. First of all, let's briefly introduce this program, the dynamic article system is divided into commercial SQL version and free Access version, and we are of course Access version here. The program's Conn.ASP file is used to connect the database. In / incapacity, the database file is in the / Database directory. Connecting the database is relative path: DB = "Database / ADSFKLDFOGOWERJNOKFDSLWEJHDFOGOWERJNOKFDSLWEJHDFSJHK.MDB" This database path leak hazard should be caused by programmers, because conn.asp this file itself has hidden dangers, leading to attackers The database path. Vulnerability Discovery: Everyday (ie hacker X "is called SOHU's mm :), participating in researchers: strange dogs, Iceyes, snipeer. (Vulnerability Analysis can be referred to http://www.hackerxfiles.net/bbs/dispbs.asp?boardid=4&id=27293). At the beginning, we thought that editor.asp file lacked enough verification, but later analyzed that we found that it was not editor.asp. The way every day just uses Editor.asp to view the server to return information. Let's demonstrate this attack process. Open this page in IE to see what role can be played (as shown). Figure one is clear that this file is used for editing the content of the article, although there is no other permissions, but we can edit the HTML page. Click "Original Code" to find such a content: