当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-037312

漏洞标题:知乎某中间件配置不当 导致httponly保护的COOKIE泄露

相关厂商:知乎

漏洞作者: 猪猪侠

提交时间:2013-09-16 18:25

修复时间:2013-10-31 18:26

公开时间:2013-10-31 18:26

漏洞类型:敏感信息泄露

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-09-16: 细节已通知厂商并且等待厂商处理中
2013-09-16: 厂商已经确认,细节仅向厂商公开
2013-09-26: 细节向核心白帽子及相关领域专家公开
2013-10-06: 细节向普通白帽子公开
2013-10-16: 细节向实习白帽子公开
2013-10-31: 细节向公众公开

简要描述:

知乎现在的版本启用了httponly保护机制,使普通的xss跨站攻击无法获取到用户的COOKIE,进而阻止了信息安全风险的扩散。
但由于某处配置不当,直接泄露了httponly保护的COOKIE。

详细说明:

# 问题出处
由于知乎的dailyproxy配置不当,直接输出400错误的调试信息!
# 漏洞地址
http://parse.at.zhihu.com:8567/wooyun
# 漏洞利用方法
WooYun: 利用squid轻松获取经http only保护的cookie内容

漏洞证明:

# 漏洞证明

ERROR
The requested URL could not be retrieved
Invalid Request error was encountered while trying to process the request:
GET /wooyun HTTP/1.1
Host: parse.at.zhihu.com:8567
Connection: keep-alive
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.66 Safari/537.36
Accept-Encoding: gzip,deflate,sdch
Accept-Language: en,en-US;q=0.8,zh-CN;q=0.6,zh;q=0.4
Cookie: q_c2=46a110b9f**********4b37b3|1364395429000|1364395429000; q_c1=398d72731d***********68822c98ba|1379323430000|1379323430000; q_c0="MWNjMGMxZ******************************COWp1WQ==|1379324039|071958d9af413bcd4928b50654c9aab783e32eaf"; _ga=GA1.2.1916379174.1365957109; __utma=51854390.1916379174.1365957109.1379323695.1379323695.1; __utmc=51854390; __utmz=51854390.1379323695.1.1.utmcsr=(direct)|utmccn=(direct)|utmcmd=(none); __utmv=51854390.100-1|2=registration_date=20121116=1^3=entry_date=20121116=1
Some possible problems are:
Missing or unknown request method.
Missing URL.
Request is too large.
Content-Length missing for POST or PUT requests.
Illegal character in hostname; underscores are not allowed.
HTTP/1.1 Expect: feature is being asked from an HTTP/1.0 software.


zhihu_httponly.jpg

修复方案:

# 配置出错信息屏蔽
# 调试信息关闭

版权声明:转载请注明来源 猪猪侠@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2013-09-16 19:02

厂商回复:

多谢反馈,我们立刻修复。

最新状态:

暂无