xml中数据存储 <![CDATA[ … ]]>

在xml中  有些可能是 转义的字符  比如像&lt;等  &符号,  你没发现 在加参数后面要进行转义 写成&#26; 可以是&  但是每处都要 这么写。  在未来不可控的 一些转义字符中 你都要这么做,  但是 用<![CDATA[   …  ]]>  规避了 这种可能性,  把它们都当做数据  而不是 可能存在的一些转义 

html解释器的概念

<![CDATA[   …  ]]> 标示的内容 可以把转义字符当正常字符, 里面的都默认为数据。

在传输时,html解释器看到这个标识,将里面的内容当数据接收过来,词法解析时不对它里面的进行转义 或者它里面有<title>等标签不进行html解释器处理。

转载于:https://www.cnblogs.com/friends-wf/p/4816295.html

curl --digest --compressed -u admin:PASSWORD http://169.254.0.1/import/config -X POST --form-string 'configrecord=<?xml version="1.0" standalone="yes"?> <!-- Automatically generated XML --> <!DOCTYPE configrecord [ <!ELEMENT configrecord (configgroup+)> <!ELEMENT configgroup (configitem+)> <!ELEMENT configitem (value+)> <!ELEMENT value (#PCDATA)> <!ATTLIST configrecord version CDATA #IMPLIED> <!ATTLIST configgroup name CDATA #IMPLIED> <!ATTLIST configgroup instance CDATA #IMPLIED> <!ATTLIST configitem name CDATA #IMPLIED> <!ATTLIST configitem instance CDATA #IMPLIED> <!ATTLIST value name CDATA #IMPLIED> ]> <configrecord version = "0.1.0.1"> <configgroup name = "Radio"> <configitem name = "Mode"> <value>Enabled</value> </configitem> <configitem name = "Band"> <value>5 GHz Only</value> </configitem> <configitem name = "Antenna Selection"> <value>Auto</value> </configitem> <configitem name = "Keep Alive"> <value>Enabled</value> </configitem> <configitem name = "Max Volley Delay"> <value>5 seconds</value> </configitem> <configitem name = "TX Power Maximum"> <value>19 dBm</value> </configitem> <configitem name = "Log"> <value>Disabled</value> </configitem> <configitem name = "Event Log"> <value>Disabled</value> </configitem> <configitem name = "Roaming"> <value name = "State">Disabled</value> <value name = "Scan Period">5 seconds</value> <value name = "Band 2.4GHz Trigger Delta">5 dBm</value> <value name = "Band 2.4GHz RSSI Floor">-65 dBm</value> <value name = "Band 5GHz Trigger Delta">5 dBm</value> <value name = "Band 5GHz RSSI Floor">-65 dBm</value> </configitem> <configitem name = "Scanning"> <value name = "RSSI Floor">-60 dBm</value> </configitem> </configgroup> </configrecord>' 将以上代码载到一个shel脚本中 执行脚本就执行此命令
07-11
<REPORT> <SCANINFO TOOLNAME="XXXX" MAKERS="XXXX" POLICY="XXXX" SCANTASK="" SCANTIME="" FILE_ID=""/> <!-- TOOLNAME="扫描工具名称" MAKERS="工具厂商名称" POLICY="策略版本" SCANTASK="任务名称" SCANTIME="扫描时间" FILE_ID="文件ID(没啥大用处其实)" --> <SCANDATA TYPE="OS"> <HOST IP="192.168.0.100"> <!-- *IP地址: --> <OSTYPE>WINDOWS</OSTYPE> <!-- 操作系统类型:Windows、Linux、.... --> <OSVERSION>Windows Server 2008</OSVERSION> <!-- 操作系统版本:Windows 2008、RedHat 9、.... --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号",没有编号可用NONE标识 --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <!-- 端口: --> <RISK>中</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> > <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.20.20"> <OSTYPE>LINUX</OSTYPE> <OSVERSION>RED HAT 9</OSVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Microsoft Windows Remote Desktop Protocol Server Man-in-the-Middle Weakness ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>缓存区溢出</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="CVE-2005-1794" CNVD="CNVD-2005-1794" MS="MS07-111" OTHER="xxxx"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、中间件漏洞、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <PORT>3389</PORT> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="DB"> <HOST IP="102.168.20.20"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>设置不当</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> <HOST IP="102.168.100.11"> <PORT>1433</PORT> <DBTYPE>Microsoft SQL Server</DBTYPE> <DBVERSION>Microsoft SQL Server 2008 R2</DBVERSION> <DATA> <VULNERABLITY> <NAME> <![CDATA[ Easily-guessed password ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ Terminal Services Encryption Level is Medium or Low ]]> </NAME> <NO CVE="NONE" CNVD="NONE" MS="MS13-112" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>弱口令</VULTYPE> <!-- 漏洞类型:如缓冲区溢出、设置不当、弱口令、其他等等 --> <CVSS>6.4</CVSS> <!-- 通用漏洞评分: --> <RISK>中</RISK> <SYNOPSIS> <![CDATA[ The remote host is using weak cryptography. ]]> </SYNOPSIS> <DESCRIPTION> <![CDATA[ The remote Terminal Services service is not configured to use strong cryptography.xxxxxxxxxxxxxxxxxxxxx ]]> </DESCRIPTION> <SOLUTION> <![CDATA[ - Change RDP encryption level to one of :xxxxxxxxxxxxxxxxxx ]]> </SOLUTION> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ The terminal services encryption level is set to : ]]> </REFERENCE> </VULNERABLITY> </DATA> </HOST> </SCANDATA> <SCANDATA TYPE="WEB"> <HOST WEB="HTTP:\\WWW.TEST.COM"> <WEBSERVERBANNER>Apache tomcat</WEBSERVERBANNER> <!-- Web Server Banner信息, --> <SERVERVERSION>Microsoft Windows 2008 R2</SERVERVERSION> <!-- 服务器信息 --> <TECHNOLOGIES>JSP</TECHNOLOGIES> <!-- 使用语言 --> <DATA> <VULNERABLITY> <NAME> <![CDATA[ SQL注入漏洞 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>注入类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>STRING</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100' AND '1'='1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> <URL URL="HTTP:\\WWW.TEST.COM?id=120"> <!-- *存在漏洞的url --> <TYPE>INT</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ ID=100 AND 1=1 ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> <!-- 接收的request --> </URL> </DETAILS> </VULNERABLITY> <VULNERABLITY> <NAME> <![CDATA[ 跨站脚本 ]]> </NAME> <!-- *漏洞名称: --> <NO CVE="NONE" CNVD="NONE" MS="NONE" OTHER="NONE"/> <!-- CVE="CVE编号" CNVD="CNVD编号" MS="微软编号" OTHER="其他编号" --> <VULTYPE>跨站脚本类</VULTYPE> <!-- 漏洞类型:如注入类、跨站脚本类、信息泄露类、弱口令/默认口令类、系统/服务漏洞类、权限/配置设置不当类、产品漏洞类、其他类 --> <RISK>高</RISK> <!-- *风险情况:高、中、低、信息 --> <SYNOPSIS> <![CDATA[ It may be possible to get access to the remote host ]]> </SYNOPSIS> <!-- 漏洞简述: --> <DESCRIPTION> <![CDATA[ The remote version of the Remote Desktop Protocol Server (TerminalService) is vulnerable to a man-in-the-middle (MiTM) attack. The RDP ]]> </DESCRIPTION> <!-- *漏洞描述 --> <SOLUTION> <![CDATA[ - Force the use of SSL as a transport layer for this service if supported, or/and ]]> </SOLUTION> <!-- *解决方案/整改意见 --> <VALIDATE> <![CDATA[ XXXXX ]]> </VALIDATE> <!-- 证据 --> <REFERENCE> <![CDATA[ http://www.oxid.it/downloads/rdp-gbu.pdf ]]> </REFERENCE> <!-- 参考信息 --> <DETAILS> <URL URL="HTTP:\\WWW.TEST.COM?DETAILS=100"> <!-- *存在漏洞的url --> <TYPE>反射性</TYPE> <!-- 类型(string类型、int类型、search类型、反射性、存储型等等) --> <PARAMETER> <![CDATA[ DETAILS=100%20%3C%73%63%72%69%70%3E%61%6C%65%72%74%28%31%29%3C%2F%73%63%72%69%70%74%3E ]]> </PARAMETER> <!-- 存在漏洞的参数(可带测试脚本) --> <REQUEST> <![CDATA[ GET /preSysApp/global/js/validate/depends/prototype.js HTTP/1.1 Pragma: no-cache Cache-Control: no-cache ]]> </REQUEST> <!-- 测试发送的request --> <RESPONSE> <!-- 接收的request --> <![CDATA[ xxxxxxxxxxxxxxxxxx ]]> </RESPONSE> </URL> </DETAILS> </VULNERABLITY> </DATA> </HOST> </SCANDATA> </REPORT>生成的xml为次格式
最新发布
08-23
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值