Nessus漏洞扫描程序是针对遗留代码网站运行的。关于如何使用PHP防止空字节注入攻击有很多建议,但是在使用VBScript的经典ASP中找不到任何关于修复它的建议。
以下是扫描仪对我们公共网站的攻击:
http://www.mortgagedataweb.com/mds/marketshare/ParmsV2.asp?Menu=%00<"kzwezl%20>
我已尝试在QueryString
输入中添加有效性检查,但我的努力没有奏效。关于%00
的某些内容会导致我屏蔽我检查正确值的尝试。以下是一些相关的代码段:
Function getUserInput(input)
Dim newString
If Len(input) = 0 Then
getUserInput = ""
Exit Function
End If
newString = input 'this was omitted in original post but was in fact in the code
newString = Replace(newString, Chr(0), "") 'I thought this would fix it !
newString = Replace(newString, "--", "")
newString = Replace(newString, ";", "")
newString = Replace(newString, Chr(34),"'")
newString = Replace(newString, "'", "")
newString = Replace(newString, "=", "=")
newString = Replace(newString, "(", "[")
newString = Replace(newString, ")", "]")
newString = Replace(newString, "'", "''")
newString = Replace(newString, "<", "[")
newString = Replace(newString, ">", "]")
newString = Replace(newString, "/*", "/")
newString = Replace(newString, "*/", "/")
getUserInput = newString
End Function
implied_Menu = UCase(getUserInput(Request.QueryString("Menu"))) 'store Menu value for Fast-Path link
Select Case implied_Menu
Case "FHA_ZP", "C_ZP", "J_ZP", "F_ZP"
implied_SQLName = MARKETSHAREZip
Case "P_ALL", "P_MA", "P_ST", "P_ZP", "P_CT", "P_NATION"
implied_SQLName = PMIMARKETSHARE
Case "FHA_ALL_D", "FHA_MA_D", "FHA_ST_D", "FHA_CT_D", "FHA_ZP_D", "FHA_NATION_D"
implied_SQLName = FHAMARKETSHAREDETAILS
Case ""
implied_SQLName = MARKETSHARE
Case Else
Response.Write("<h2>Invalid Menu parameter</h2>")
Response.End
End Select
适当的菜单值是:
Menu=
不在QueryString
)Select Case
逻辑在我的开发计算机上,我可以将%00
更改为%0
并将错误标记为Response.Write
消息,然后Response.End
,但有关%00
的信息我试图检查它。
答案 0 :(得分:2)
我建议用一个reqular表达式来处理它:
function getUserInput(sInput)
Dim obj_regex
Set obj_regex = New RegExp
obj_regex.IgnoreCase = true
obj_regex.Global = true
obj_regex.Pattern = "\W"
getUserInput = obj_regex.Replace(sInput, "")
set obj_regex = Nothing
end function
由于所有菜单条目仅为字母数字字符和下划线,因此您可以替换所有其他字符。