IE9中的Mangled URL参数 [英] Mangled URL Parameters in IE9

查看:193
本文介绍了IE9中的Mangled URL参数的处理方法,对大家解决问题具有一定的参考价值,需要的朋友们下面随着小编来一起学习吧!

问题描述

我看到来自IE9桌面客户端的错误的URL参数。这些链接是通过电子邮件发送的,所有的被破坏的URL都来自电子邮件的纯文本版本。

I'm seeing mangled URL parameters coming from IE9 desktop clients. The links are sent via email, and all of the mangled URLs come from the plain-text version of the email.

我几乎确定它与我的堆栈无关(django,nginx,mandrill)参数的值具有精确转置的字符。原来的角色是被破坏的一个减去13个地方(例如 rznvy_cynva = email_plain ubgryfpbz = hotelscom )。

I'm almost sure that it has nothing to do with my stack (django, nginx, mandrill) The values for the parameters have characters exactly transposed. The original character is the mangled one minus 13 places (eg. rznvy_cynva = email_plain, ubgryfpbz = hotelscom).

以下是一个被破坏的请求的例子:

Here is one example of a mangled request that came through:

GET /book/48465?sid=rznvy_cynva&order=q09362qs55-741722-442521-98n2-n88s4nnr87192n&checkOut=07-17-15&affiliate=ubgryfpbz&checkIn=07-16-15 HTTP/1.1" 302 5 "-" "Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0)" 




  • 所有带有破解网址的请求都具有与示例相同的用户代理。 / li>
  • 与被破坏的URL相关联的IP地址不限于任何位置。

  • 查看用户代理,这似乎限于桌面Windows 7,IE9用户。

  • 推荐答案

    电脑,它得到链接和扫描y我们的网页有任何可能的漏洞。它使用rot13模糊处理来确保它不会采取任何不需要的操作(现在购买等)。

    It is anti-malware software on your recipients' computers. It gets the links and scans your pages for any possible vulnerabilities. It uses rot13 obfuscation to ensure that it doesn't take any unwanted actions ("buy now", etc.).

    https://security.stackexchange.com/questions/48684/help-investigating-potential-website-attack-url-rewriting-and-rot-13-obfuscatio

    解决方案是跟踪反恶意软件/公司正在执行的扫描,并尽可能将您的网站列入白名单。

    The solution is to track down what anti-malware software / company is performing the scans, and get your site whitelisted if possible.

    这篇关于IE9中的Mangled URL参数的文章就介绍到这了,希望我们推荐的答案对大家有所帮助,也希望大家多多支持IT屋!

查看全文
登录 关闭
扫码关注1秒登录
发送“验证码”获取 | 15天全站免登陆