当前位置:网站首页>Website vulnerability repair service provider's analysis of unauthorized vulnerability
Website vulnerability repair service provider's analysis of unauthorized vulnerability
2022-07-31 15:49:00 【51CTO】
There are unauthorized loopholes in the website. First of all, let's talk about what are the key controllable parameters, that is to say, like some of our key parameters, for example, use ID order by ID are some key parameters, which must be controlled by a tester like you.If this parameter has been hijacked, or he has a fixed value.At this time, it is not called a controllable parameter.The key is that your changes must be able to cause this overriding effect called a key parameter.We must quickly locate this key and controllable parameter, so that we can find the corresponding unauthorized vulnerability more quickly.
What does the principle of adhering to the same change and control of parameters mentioned later mean, because we may have multiple in a request messagevariables, or in this case of multiple parameters.Then we generally consider changing one parameter first, and the other parameters do not change.Let's take a look at the changes in this response information.Then if the situation you want does not appear, you can consider changing another variable, that is, changing two variables, and then until all variables are changed, or some variables are deleted, which is called our sameChange the same control principle.
Here we can see that other variables are kept unchanged, and key variables are changed or changed at the same time. After listening to me, you may think that these are conceptsSex, you may feel very confused, so let's take a look at an example to explain.Before looking at the example, I almost forgot to mention how we find this key variable, but let's take a look at such a parameter.First of all, I classify it as the ID of the user's identity, a unique identifier given to the user by the main network in it, through which the user's identity can be determined, such as your mobile phone number, ID number, or yourThe ID number and user ID are all unique, because if you think about a website, the user name you registered will definitely not be repeated, because it is written into the database, it will definitely educate you whether this user exists or not,If there is, you don't need to continue to register, so the user ID is also their only such a parameter that identifies his identity. This is used to identify the user identity of our user in the website.called user identity.
The second one is called the user attribute ID, which is the attribute ID generated by the user when using the website, for exampleWhen he places an order, will he have this order number, or if it can modify some of its data when it opens the personal center, there may be changes in the value of some parameters.Also what address ID.Record number ID.These can be understood as such an ID matured by his identity, or its attributes, such as whether our human attributes can think, run, sing, and swim.It is this attribute of our people, and the user attribute ID here is the attribute aid that is generated according to a certain type of operation we are performing.
Let's see, horizontal override is based on identity ID, etc.Seeing this example, we can see that here, we see this key parameter, it is the get method, the get method we will target or focus on its URL, because we all know the parametersThe value is placed on this URL, and our post method is placed in the request body, which must be distinguished.We see that there are only two parameters here. How do we determine which is the key parameter? We can use one of its semantics. Most programmers follow the concept of semantics when writing code, becauseMany programmers only think about how to implement functions and ignore security vulnerabilities when writing code. Therefore, it is recommended that if there are vulnerabilities such as unauthorized access to the website, the website vulnerability repair service provider SINE Security can check it.
边栏推荐
- AVH Deployment Practice (1) | Deploying the Flying Paddle Model on Arm Virtual Hardware
- 自动化测试如何创造业务价值?
- 【7.28】代码源 - 【Fence Painting】【合适数对(数据加强版)】
- 外媒所言非虚,苹果降价或许是真的在清库存
- The use of button controls
- Unity中实现点选RenderTexture中的3D模型
- Snake Project (Simple)
- Linux check redis version (check mongodb version)
- arm按键控制led灯闪烁(嵌入式按键实验报告)
- The principle of hough transform detection of straight lines (opencv hough straight line detection)
猜你喜欢
随机推荐
ASP.NET Core 产生连续 Guid
百度网盘网页版加速播放(有可用的网站吗)
The use of button controls
腾讯云部署----DevOps
border控件的使用
7. Summary of common interview questions
C语言”三子棋“升级版(模式选择+AI下棋)
SQL、HQL、JPQL 到底有什么区别
ASP.NET Core generates continuous Guid
mongo进入报错
Why is the field of hacking almost filled with boys?
Public Key Retrieval is not allowed error solution when DBeaver connects to MySQL 8.x
Vb how to connect mysql_vb how to connect to the database collection "advice"
浏览器自带的拾色器
工程流体力学复习
【7.28】代码源 - 【Fence Painting】【合适数对(数据加强版)】
多主复制的适用场景(1)-多IDC
多主复制的适用场景(2)-需离线操作的客户端和协作编辑
C language "the third is" upgrade (mode selection + AI chess)
Codeforces Round #796 (Div. 2)(A-D)





![[MySQL] Mysql paradigm and the role of foreign keys](/img/9d/a4295de26683d7bca2b8e9d14f754b.png)



