<%
'asp程序,全站防注代码,fxjt111收集,修改
'检查是否有cookies注入漏洞
'1、javascript:alert(document.cookie="id="+escape("2 and 3=3"));回车后刷新
'2、查看的路径是shownews.asp?id=2,输入javascript:alert(document.cookie="id="+escape("2"));回车,不要id刷新网页,正常就有注入
'在输入javascript:alert(document.cookie="id="+escape("2 and 3=3"));刷新页面,如果显示正常,可以再试下一步(如果不正常,就有可能也有过滤了)
'javascript:alert(document.cookie="id="+escape("2 and 3=4"));刷新一下页面如果不正常显示,这就表示可以注入了
'检测非字符
SQL_injdata = "exec|insert|delete|or|and|set|char|asc|cast|declare|<script|script|iframe|3bomb|c.js"
SQL_inj=split(SQL_Injdata,"|")
'检测GET
If Request.QueryString<>"" Then
For Each SQL_Get In Request.QueryString
For SQL_Data=0 To Ubound(SQL_inj)
if instr(lcase(Request.QueryString(SQL_Get)),Sql_Inj(Sql_DATA))>0 Then
response.write "QueryString输入非法,数据库拒绝一些特殊的字符!"
Response.end
end if
next
Next
End If
'检测POST
If Request.Form<>"" Then
For Each Sql_Post In Request.Form
For SQL_Data=0 To Ubound(SQL_inj)
if instr(lcase(Request.Form(Sql_Post)),Sql_Inj(Sql_DATA))>0 Then
response.write "Form输入非法,数据库拒绝一些特殊的字符!"
Response.end
end if
next
next
end if
'检测cookie
If Request.Cookies<>"" Then
For Each Sql_Cookie In Request.Cookies
For SQL_Data=0 To Ubound(SQL_inj)
if instr(lcase(Request.Cookies(Sql_Cookie)),Sql_Inj(Sql_DATA))>0 Then
response.write "Cookies输入非法,数据库拒绝一些特殊的字符!"
Response.end
end if
next
next
end if
%>