2013-07-24: 细节已通知厂商并且等待厂商处理中 2013-07-24: 厂商已经确认,细节仅向厂商公开 2013-08-03: 细节向核心白帽子及相关领域专家公开 2013-08-13: 细节向普通白帽子公开 2013-08-23: 细节向实习白帽子公开 2013-09-07: 细节向公众公开
好久没收到厂商的礼物了,有点小骚动~
我总感觉爱丽网的这种漏洞都修完了...无聊就检测一下...具体过程如下:登陆是随便填写一个用户名(test)吧,然后密码最好输入一个弱口令,这里我就填(******)吧...
然后登陆时抓包,抓包如下:
从抓包数据中可以看到,密码是md5加密后的,这里可以对弱口令******的用户进行用户名破解,也可以对某个特定账号进行md5密码破解(这个效率有点慢),也可以撞库...这里我对用户名进行破解,除了一个基本的用户名字典,又找一小部分某网站的用户名来进行测试,如图:
根据包的大小来判断是否成功,破解成功的返回包比失败的大很多,如下失败:
HTTP/1.1 200 OKDate: Wed, 24 Jul 2013 02:53:00 GMTServer: nginx/0.8.39Content-Type: text/html; charset=gbkX-Powered-By: PHP/5.2.10Set-Cookie: 4xkw_2132_sid=98Qqqh; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/Set-Cookie: 4xkw_2132_lastact=1374634453%09member.php%09logging; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0Pragma: no-cacheX-Via: 1.1 hnly26:88 (Cdn Cache Server V2.0), 1.1 sddy32:6060 (Cdn Cache Server V2.0)Connection: closeContent-Length: 33jsonp1374633212385([{"msg":"3"}])
成功:
HTTP/1.1 200 OKDate: Wed, 24 Jul 2013 02:53:02 GMTServer: nginx/0.8.39Content-Type: text/html; charset=gbkX-Powered-By: PHP/5.2.10Set-Cookie: 4xkw_2132_sid=obJaj5; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/Set-Cookie: 4xkw_2132_lastact=1374634453%09member.php%09logging; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/Expires: Thu, 19 Nov 1981 08:52:00 GMTCache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0Pragma: no-cacheSet-Cookie: auth=ee28sKW0sdbZkVFkA9Y3tzgGbVjIAdxsFx8PCSuGAN23frIyYUduR7ZaWxrHlcMi6LzxxH6kiirpCpaCFtWm3BmO%2F0QoV%2B2mIKawjnE%2FMUsUtUYRCaNrFSlWQuj%2B5rlC; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: username=%26%23122%3B%26%23104%3B%26%2397%3B%26%23111%3B; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: asffd=zhao; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: uid=15187; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: lastvisit=1340650305; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: avatar=http%3A%2F%2Fspace.aili.com%2Fuc_server%2Favatar.php%3Fuid%3D15187%26size%3Dmiddle%26r%3D73851; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: integration=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: reportnum=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: report=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comSet-Cookie: 15187email=zhao123%40163.com; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.comX-Via: 1.1 hnly26:88 (Cdn Cache Server V2.0), 1.1 sddy32:6060 (Cdn Cache Server V2.0)Connection: closeContent-Length: 828jsonp1374633212385([{"uid":"15187","username":"zhao","email":"zhao123@163.com","a_uid":"000015187","avatar":"http:\/\/space.aili.com\/uc_server\/avatar.php?uid=15187&size=middle&r=73851","realname":"","birthyear":"0","birthmonth":"0","birthday":"0","constellation":"","zodiac":"","telephone":"","mobile":"","idcardtype":"","idcard":"","address":"","zipcode":"","nationality":"","birthprovince":"","birthcity":"","resideprovince":"","residecity":"","residedist":"","residecommunity":"","residesuite":"","graduateschool":"","company":"","education":"","occupation":"","position":"","revenue":"","affectivestatus":"","lookingfor":"","bloodtype":"","height":"","weight":"","alipay":"","icq":"","qq":"","yahoo":"","msn":"","taobao":"","site":"","bio":"","interest":"","lastvisit":"1340650305","integration":0,"reportnum":0,"num":0}])
因为这里面包含了用户的一些个人信息(用户名,邮箱等等...)再贴一些证明图:
<img src="https://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/201307/241129151864aa2f98b3ecdfabbbfc7bfe7b6223.png" alt="zhao.png"
综上所述,就不一一列举了...
登陆验证码,错误次数限制等等.. :D少年,礼物求给力!
危害等级:高
漏洞Rank:15
确认时间:2013-07-24 14:51
@niliu 很久没看到你骚动了 多骚动几次.
暂无
这标题给我改这老长,太霸道了。。。。
尽搞二流厂商
@xsser 对,使'尽'搞二流厂商 :0
@爱丽网 骚动起来~
厂商回复霸气