当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0107730

漏洞标题:什么值得买 存储型xss盲打后台Cookie

相关厂商:smzdm.com

漏洞作者: Pany自留地

提交时间:2015-04-15 14:54

修复时间:2015-06-03 16:08

公开时间:2015-06-03 16:08

漏洞类型:SQL注射漏洞

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-15: 细节已通知厂商并且等待厂商处理中
2015-04-19: 厂商已经确认,细节仅向厂商公开
2015-04-29: 细节向核心白帽子及相关领域专家公开
2015-05-09: 细节向普通白帽子公开
2015-05-19: 细节向实习白帽子公开
2015-06-03: 细节向公众公开

简要描述:

上次提交的和 http://www.wooyun.org/bugs/wooyun-2010-0106326 重复了,于是又来测试一番。
虽然过滤了一些常见的DOM事件,还是可以绕过。并且已经GET到后台COOKIE。

详细说明:

在晒单分享或者经验投稿处:
http://shaiwu.smzdm.com/detail_preview/198007
插入视频,视频的网址填:

javascript:alert(/wooyun/);//t.swf


保存草稿-预览文章

QQ截图20150413234328.png


储存型xss,已经打到的后台COOKIE:

QQ截图20150413234654.png


后台加了HTTP基本认证,在使用chrome浏览器的情况下无法基础认证钓鱼。
就不深入了,赶紧修补吧,不仅能打管理员cookie还是打用户的cookie。

漏洞证明:

cookie : smzdm_user_source=685C2E53AF8C64F6AC286F4EFE8EF4D6; __gads=ID=afe9ad823bb23cb1:T=1421743990:S=ALNI_MYQRignrStkSH8ipPASbw77IEhcuQ; comment_report=%5B%2250312101%22%5D; smzdm_user_view=C5599E001506CD541EB0A9F0FC7ECD1F; post_permission=postpermission; PHPSESSID=63i5ac9o3op02kteg155euutl5; comment_rating=%5B%5B23744771%2C%221%22%5D%2C%5B23727513%2C%221%22%5D%2C%5B24441471%2C%221%22%5D%2C%5B24444379%2C%221%22%5D%2C%5B50172775%2C%221%22%5D%2C%5B50169954%2C%221%22%5D%2C%5B50175491%2C%221%22%5D%2C%5B50156843%2C%221%22%5D%2C%5B50204207%2C%220%22%5D%2C%5B50204043%2C%220%22%5D%2C%5B50124181%2C%221%22%5D%2C%5B50220062%2C%221%22%5D%2C%5B50235777%2C%221%22%5D%2C%5B50221479%2C%221%22%5D%2C%5B50272536%2C%221%22%5D%2C%5B50266119%2C%221%22%5D%2C%5B50265304%2C%220%22%5D%2C%5B50283462%2C%221%22%5D%2C%5B50261505%2C%221%22%5D%2C%5B50401625%2C%221%22%5D%5D; __utma=123313929.274110035.1421744393.1428651635.1428655590.129; __utmc=123313929; __utmz=123313929.1428655590.129.108.utmcsr=shaiwu.smzdm.com|utmccn=(referral)|utmcmd=referral|utmcct=/p/23879; wt3_eid=%3B999768690672041%7C2142310255800622247%232142890802900818919; wt3_sid=%3B999768690672041; crtg_rta=; _ga=GA1.2.274110035.1421744393; Hm_lvt_9b7ac3d38f30fe89ff0b8a0546904e58=1428041940,1428460742,1428643233,1428655580; Hm_lpvt_9b7ac3d38f30fe89ff0b8a0546904e58=1428908437; ci_session=a%3A5%3A%7Bs%3A10%3A%22session_id%22%3Bs%3A32%3A%22620077f3b22cd154d64f682aceaddf7c%22%3Bs%3A10%3A%22ip_address%22%3Bs%3A13%3A%22172.16.12.250%22%3Bs%3A10%3A%22user_agent%22%3Bs%3A120%3A%22Mozilla%2F5.0 %28Windows NT 6.3%3B WOW64%29 AppleWebKit%2F537.36 %28KHTML%2C like Gecko%29 Chrome%2F35.0.1916.153 Safari%2F537.36 SE 2.X Met%22%3Bs%3A13%3A%22last_activity%22%3Bi%3A1428909975%3Bs%3A9%3A%22user_data%22%3Bs%3A0%3A%22%22%3B%7D59f6f20b92a291ff34fd70b3859c4446

修复方案:

加强xss filter

版权声明:转载请注明来源 Pany自留地@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:4

确认时间:2015-04-19 16:07

厂商回复:

感谢Pany自留地提交的漏洞,什么值得买已完成修复

最新状态:

暂无


漏洞评价:

评论