当前位置:网站首页>Website vulnerability repair service provider's analysis of unauthorized vulnerability
Website vulnerability repair service provider's analysis of unauthorized vulnerability
2022-07-31 15:49:00 【51CTO】
There are unauthorized loopholes in the website. First of all, let's talk about what are the key controllable parameters, that is to say, like some of our key parameters, for example, use ID order by ID are some key parameters, which must be controlled by a tester like you.If this parameter has been hijacked, or he has a fixed value.At this time, it is not called a controllable parameter.The key is that your changes must be able to cause this overriding effect called a key parameter.We must quickly locate this key and controllable parameter, so that we can find the corresponding unauthorized vulnerability more quickly.
What does the principle of adhering to the same change and control of parameters mentioned later mean, because we may have multiple in a request messagevariables, or in this case of multiple parameters.Then we generally consider changing one parameter first, and the other parameters do not change.Let's take a look at the changes in this response information.Then if the situation you want does not appear, you can consider changing another variable, that is, changing two variables, and then until all variables are changed, or some variables are deleted, which is called our sameChange the same control principle.
Here we can see that other variables are kept unchanged, and key variables are changed or changed at the same time. After listening to me, you may think that these are conceptsSex, you may feel very confused, so let's take a look at an example to explain.Before looking at the example, I almost forgot to mention how we find this key variable, but let's take a look at such a parameter.First of all, I classify it as the ID of the user's identity, a unique identifier given to the user by the main network in it, through which the user's identity can be determined, such as your mobile phone number, ID number, or yourThe ID number and user ID are all unique, because if you think about a website, the user name you registered will definitely not be repeated, because it is written into the database, it will definitely educate you whether this user exists or not,If there is, you don't need to continue to register, so the user ID is also their only such a parameter that identifies his identity. This is used to identify the user identity of our user in the website.called user identity.
The second one is called the user attribute ID, which is the attribute ID generated by the user when using the website, for exampleWhen he places an order, will he have this order number, or if it can modify some of its data when it opens the personal center, there may be changes in the value of some parameters.Also what address ID.Record number ID.These can be understood as such an ID matured by his identity, or its attributes, such as whether our human attributes can think, run, sing, and swim.It is this attribute of our people, and the user attribute ID here is the attribute aid that is generated according to a certain type of operation we are performing.
Let's see, horizontal override is based on identity ID, etc.Seeing this example, we can see that here, we see this key parameter, it is the get method, the get method we will target or focus on its URL, because we all know the parametersThe value is placed on this URL, and our post method is placed in the request body, which must be distinguished.We see that there are only two parameters here. How do we determine which is the key parameter? We can use one of its semantics. Most programmers follow the concept of semantics when writing code, becauseMany programmers only think about how to implement functions and ignore security vulnerabilities when writing code. Therefore, it is recommended that if there are vulnerabilities such as unauthorized access to the website, the website vulnerability repair service provider SINE Security can check it.
边栏推荐
- "Autumn Recruitment Series" MySQL Interview Core 25 Questions (with answers)
- Synchronized and volatile interview brief summary
- TextBlock控件入门基础工具使用用法,取上法入门
- C language "the third is" upgrade (mode selection + AI chess)
- Applicable Scenarios of Multi-Master Replication (1) - Multi-IDC
- Unity 之 图集属性详解和代码示例 -- 拓展一键自动打包图集工具
- After Grafana is installed, the web opens and reports an error
- Word table to Excel
- 第05章 存储引擎【1.MySQL架构篇】【MySQL高级】
- mysql black window ~ build database and build table
猜你喜欢
随机推荐
【7.28】代码源 - 【Fence Painting】【合适数对(数据加强版)】
org.apache.jasperException(could not initialize class org)
org.apache.jasperException(could not initialize class org)
字符指针赋值[通俗易懂]
The new BMW 3 Series is on the market, with safety and comfort
Deployment application life cycle and Pod health check
MySQL多表联合查询
Oracle动态注册非1521端口
mongo enters error
TextBlock控件入门基础工具使用用法,取上法入门
The principle of hough transform detection of straight lines (opencv hough straight line detection)
ASP.NET Core generates continuous Guid
what exactly is json (c# json)
在资源管理类中提供对原始资源的访问——条款15
长得很怪的箱图
11 pinia使用
Why is the field of hacking almost filled with boys?
[Meetup Preview] OpenMLDB+OneFlow: Link feature engineering to model training to accelerate machine learning model development
Replication Latency Case (1) - Eventual Consistency
使用 GraphiQL 可视化 GraphQL 架构









