当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-056416

漏洞标题:北京教委邮件系统信息泄露可进入他人邮箱

相关厂商:北京市教委

漏洞作者: w5r2

提交时间:2014-04-11 13:45

修复时间:2014-05-26 13:45

公开时间:2014-05-26 13:45

漏洞类型:应用配置错误

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-04-11: 细节已通知厂商并且等待厂商处理中
2014-04-16: 厂商已经确认,细节仅向厂商公开
2014-04-26: 细节向核心白帽子及相关领域专家公开
2014-05-06: 细节向普通白帽子公开
2014-05-16: 细节向实习白帽子公开
2014-05-26: 细节向公众公开

简要描述:

信息泄露,导致邮箱进入

详细说明:

最近导致的漏洞。不多说。

@SC[r+H9w3f"!98532ED/AI42#; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Host: mail.bjedu.gov.cnConnection: Keep-AliveCache-Control: no-cacheCookie: _gscu_1766238603=945864036zq40h10; _gscbrs_1766238603=1; _gscs_1766238603=t97028637wxccmj10|pv:1; EMPHPSID=cokqfkknt4c4i012irgjskje02bdKh2-$dH=TC$9 }^y;./lD4qoj5rk872hv64auhdrm4user=jxxx&domain_name=bjedu.gov.cn&password=dbxxxxx&go=https%3A%2F%2Fmail.bjedu.gov.cn%2F%3Fq%3Dbase&referer=https%3A%2F%2Fmail.bjedu.gov.cn%2F&sub_mail_1=+7<]^DLu~O=0f"g(1KAR@A<v?,^[GK`1{s#u !$Root EntryFp9S&1TableWordDocument2SummaryInformation(DocumentSummaryInformation8CompObjmFMicrosoft Office Word MSWordDocWord.Document.89q-----------------------------7de2802140980Content-Disposition: form-data; name="upload_type"attach-----------------------------7de2802140980Content-Disposition: form-data; name="rid"1397028103.1384773720-----------------------------7de2802140980Content-Disposition: form-data; name="module_id"compose_1-----------------------------7de2802140980Content-Disposition: form-data; name="emLoginUser"lisht-----------------------------7de2802140980Content-Disposition: form-data; name="_gscu_1766238603"84933728nmo2r319-----------------------------7de2802140980Content-Disposition: form-data; name="_gscbrs_1766238603"1-----------------------------7de2802140980Content-Disposition: form-data; name="EMPHPSID"214qk8lu4738rfenfu7cd5vko5-----------------------------7de2802140980--39xQ!@ ~Q0182P. A!"#$%SR`RHncke$1$a$(CJKHOJQJ_HaJmHnHsHtH$A@$k=W[SOBi@Bnfh<h4l4a k@ eRh @00 I0K0I00I00K00I00$FFF_GoBack  ioq  3  Hn@8kppUnknownGz Times New Roman5Symbol3&z Arial;5N[_GB2312;[SOSimSun7&{ @Calibri hnK$goK$g**!-!),.:;?]}    & 6"00000000000=@\]^([{  0000000;[2@HX(?Hn2NgU^NgU^Oh+'0T(4<DLNormal2Microsoft Office Word@F#@ZS@" S*.+,0X`lt|1o+|B_mmU(`N2Xea?m


.png

漏洞证明:

最近导致的漏洞。不多说。

@SC[r+H9w3f"!98532ED/AI42#; SV1; .NET CLR 1.1.4322; .NET CLR 2.0.50727)Host: mail.bjedu.gov.cnConnection: Keep-AliveCache-Control: no-cacheCookie: _gscu_1766238603=945864036zq40h10; _gscbrs_1766238603=1; _gscs_1766238603=t97028637wxccmj10|pv:1; EMPHPSID=cokqfkknt4c4i012irgjskje02bdKh2-$dH=TC$9 }^y;./lD4qoj5rk872hv64auhdrm4user=jxxx&domain_name=bjedu.gov.cn&password=dbxxxxx&go=https%3A%2F%2Fmail.bjedu.gov.cn%2F%3Fq%3Dbase&referer=https%3A%2F%2Fmail.bjedu.gov.cn%2F&sub_mail_1=+7<]^DLu~O=0f"g(1KAR@A<v?,^[GK`1{s#u !$Root EntryFp9S&1TableWordDocument2SummaryInformation(DocumentSummaryInformation8CompObjmFMicrosoft Office Word MSWordDocWord.Document.89q-----------------------------7de2802140980Content-Disposition: form-data; name="upload_type"attach-----------------------------7de2802140980Content-Disposition: form-data; name="rid"1397028103.1384773720-----------------------------7de2802140980Content-Disposition: form-data; name="module_id"compose_1-----------------------------7de2802140980Content-Disposition: form-data; name="emLoginUser"lisht-----------------------------7de2802140980Content-Disposition: form-data; name="_gscu_1766238603"84933728nmo2r319-----------------------------7de2802140980Content-Disposition: form-data; name="_gscbrs_1766238603"1-----------------------------7de2802140980Content-Disposition: form-data; name="EMPHPSID"214qk8lu4738rfenfu7cd5vko5-----------------------------7de2802140980--39xQ!@ ~Q0182P. A!"#$%SR`RHncke$1$a$(CJKHOJQJ_HaJmHnHsHtH$A@$k=W[SOBi@Bnfh<h4l4a k@ eRh @00 I0K0I00I00K00I00$FFF_GoBack  ioq  3  Hn@8kppUnknownGz Times New Roman5Symbol3&z Arial;5N[_GB2312;[SOSimSun7&{ @Calibri hnK$goK$g**!-!),.:;?]}    & 6"00000000000=@\]^([{  0000000;[2@HX(?Hn2NgU^NgU^Oh+'0T(4<DLNormal2Microsoft Office Word@F#@ZS@" S*.+,0X`lt|1o+|B_mmU(`N2Xea?m


.png

修复方案:

打补丁

版权声明:转载请注明来源 w5r2@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2014-04-16 12:36

厂商回复:

最新状态:

暂无