当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-032075

漏洞标题:爱丽网可以暴力破解他人账号造成用户敏感信息泄漏(有成功破解证明)

相关厂商:aili.com

漏洞作者: niliu

提交时间:2013-07-24 11:34

修复时间:2013-09-07 11:34

公开时间:2013-09-07 11:34

漏洞类型:设计缺陷/逻辑错误

危害等级:中

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-07-24: 细节已通知厂商并且等待厂商处理中
2013-07-24: 厂商已经确认,细节仅向厂商公开
2013-08-03: 细节向核心白帽子及相关领域专家公开
2013-08-13: 细节向普通白帽子公开
2013-08-23: 细节向实习白帽子公开
2013-09-07: 细节向公众公开

简要描述:

好久没收到厂商的礼物了,有点小骚动~

详细说明:

我总感觉爱丽网的这种漏洞都修完了...
无聊就检测一下...
具体过程如下:
登陆是随便填写一个用户名(test)吧,然后密码最好输入一个弱口令,这里我就填(******)吧...

222.png


然后登陆时抓包,抓包如下:

111.png


从抓包数据中可以看到,密码是md5加密后的,这里可以对弱口令******的用户进行用户名破解,也可以对某个特定账号进行md5密码破解(这个效率有点慢),也可以撞库...
这里我对用户名进行破解,除了一个基本的用户名字典,又找一小部分某网站的用户名来进行测试,如图:

123.png


根据包的大小来判断是否成功,破解成功的返回包比失败的大很多,如下
失败:

HTTP/1.1 200 OK
Date: Wed, 24 Jul 2013 02:53:00 GMT
Server: nginx/0.8.39
Content-Type: text/html; charset=gbk
X-Powered-By: PHP/5.2.10
Set-Cookie: 4xkw_2132_sid=98Qqqh; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/
Set-Cookie: 4xkw_2132_lastact=1374634453%09member.php%09logging; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
X-Via: 1.1 hnly26:88 (Cdn Cache Server V2.0), 1.1 sddy32:6060 (Cdn Cache Server V2.0)
Connection: close
Content-Length: 33
jsonp1374633212385([{"msg":"3"}])


成功:

HTTP/1.1 200 OK
Date: Wed, 24 Jul 2013 02:53:02 GMT
Server: nginx/0.8.39
Content-Type: text/html; charset=gbk
X-Powered-By: PHP/5.2.10
Set-Cookie: 4xkw_2132_sid=obJaj5; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/
Set-Cookie: 4xkw_2132_lastact=1374634453%09member.php%09logging; expires=Thu, 25-Jul-2013 02:54:13 GMT; path=/
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Set-Cookie: auth=ee28sKW0sdbZkVFkA9Y3tzgGbVjIAdxsFx8PCSuGAN23frIyYUduR7ZaWxrHlcMi6LzxxH6kiirpCpaCFtWm3BmO%2F0QoV%2B2mIKawjnE%2FMUsUtUYRCaNrFSlWQuj%2B5rlC; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: username=%26%23122%3B%26%23104%3B%26%2397%3B%26%23111%3B; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: asffd=zhao; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: uid=15187; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: lastvisit=1340650305; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: avatar=http%3A%2F%2Fspace.aili.com%2Fuc_server%2Favatar.php%3Fuid%3D15187%26size%3Dmiddle%26r%3D73851; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: integration=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: reportnum=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: report=0; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
Set-Cookie: 15187email=zhao123%40163.com; expires=Thu, 25-Jul-2013 02:54:15 GMT; path=/; domain=.aili.com
X-Via: 1.1 hnly26:88 (Cdn Cache Server V2.0), 1.1 sddy32:6060 (Cdn Cache Server V2.0)
Connection: close
Content-Length: 828
jsonp1374633212385([{"uid":"15187","username":"zhao","email":"zhao123@163.com","a_uid":"000015187","avatar":"http:\/\/space.aili.com\/uc_server\/avatar.php?uid=15187&size=middle&r=73851","realname":"","birthyear":"0","birthmonth":"0","birthday":"0","constellation":"","zodiac":"","telephone":"","mobile":"","idcardtype":"","idcard":"","address":"","zipcode":"","nationality":"","birthprovince":"","birthcity":"","resideprovince":"","residecity":"","residedist":"","residecommunity":"","residesuite":"","graduateschool":"","company":"","education":"","occupation":"","position":"","revenue":"","affectivestatus":"","lookingfor":"","bloodtype":"","height":"","weight":"","alipay":"","icq":"","qq":"","yahoo":"","msn":"","taobao":"","site":"","bio":"","interest":"","lastvisit":"1340650305","integration":0,"reportnum":0,"num":0}])


因为这里面包含了用户的一些个人信息(用户名,邮箱等等...)
再贴一些证明图:

333.png


<img src="/upload/201307/241129151864aa2f98b3ecdfabbbfc7bfe7b6223.png" alt="zhao.png"

444.png


555.png


漏洞证明:

综上所述,就不一一列举了...

修复方案:

登陆验证码,错误次数限制等等.. :D
少年,礼物求给力!

版权声明:转载请注明来源 niliu@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2013-07-24 14:51

厂商回复:

@niliu 很久没看到你骚动了 多骚动几次.

最新状态:

暂无