当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-039331

漏洞标题:百度某处鸡肋储存型XSS

相关厂商:百度

漏洞作者: 李白

提交时间:2013-10-11 11:15

修复时间:2013-11-25 11:16

公开时间:2013-11-25 11:16

漏洞类型:xss跨站脚本攻击

危害等级:低

自评Rank:1

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-10-11: 细节已通知厂商并且等待厂商处理中
2013-10-11: 厂商已经确认,细节仅向厂商公开
2013-10-21: 细节向核心白帽子及相关领域专家公开
2013-10-31: 细节向普通白帽子公开
2013-11-10: 细节向实习白帽子公开
2013-11-25: 细节向公众公开

简要描述:

百度某处鸡肋储存型XSS

详细说明:

出现在“我的日历”处

baiduwooyun2.PNG


如图填入XSS代码保存
即可弹窗

漏洞证明:

wooyunbaidu.PNG


利用方法的话基本上就是越权吧,可惜小弟此处不太精通,看了下貌似不可以...
把截获数据贴出来吧,或许能找到越权那就更好了
账号1:

POST /calendars/events/create HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: zh-cn
Referer: http://i.baidu.com/my/cal
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Alexa Toolbar)
Host: i.baidu.com
Content-Length: 104
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: BAIDUID=9394F552CFBFF05032CD3E26C12E7498:FG=1; Hm_lvt_1ae9a937a87d1c46cd8eed1d4d2a95f0=1377156377; BAIDU_WISE_UID=34890176BAB5A6D8774C27A2F03E1B66; BDUSS=DB0ZGtRRDBZTjFJQ1VGeEkzR1JUdmdpcjJ6Rk5NS29YeXk3WGV1YTQyTE9SWDVTQVFBQUFBJCQAAAAAAAAAAAEAAADGTBEJd29zaGljYW9jYW8wMDcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAM64VlLOuFZSZ; H_PS_PSSID=3407_3429_1465_2980_3091; Hm_lvt_4010fd5075fcfe46a16ec4cb65e02f04=1381415156,1381415646; PHPSESSID=2m9c3s5rpr5n42ri0jqjf3pi05; Hm_lpvt_4010fd5075fcfe46a16ec4cb65e02f04=1381415646
event%5Bstart%5D=1381766400&event%5Bend%5D=1381852800&event%5Bsummary%5D=111222&event%5Bisallday%5D=true


账号2:

POST /calendars/events/create HTTP/1.1
x-requested-with: XMLHttpRequest
Accept-Language: zh-cn
Referer: http://i.baidu.com/my/cal
Accept: */*
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Accept-Encoding: gzip, deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.1; WOW64; Trident/5.0; SLCC2; .NET CLR 2.0.50727; .NET CLR 3.5.30729; .NET CLR 3.0.30729; .NET4.0C; .NET4.0E; InfoPath.3; Alexa Toolbar)
Host: i.baidu.com
Content-Length: 104
Proxy-Connection: Keep-Alive
Pragma: no-cache
Cookie: BAIDUID=9394F552CFBFF05032CD3E26C12E7498:FG=1; Hm_lvt_1ae9a937a87d1c46cd8eed1d4d2a95f0=1377156377; BAIDU_WISE_UID=34890176BAB5A6D8774C27A2F03E1B66; H_PS_PSSID=3407_3429_1465_2980_3091; BDUSS=VSaDBucTZZbENaOFZCc3FmdEJYUEdKWGFjNFVzUklhcEo1cHFUczF2RVpTbjVTQUFBQUFBJCQAAAAAAAAAAAEAAAACNj05wO6w18rHztLRvQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABm9VlIZvVZSVF; Hm_lvt_4010fd5075fcfe46a16ec4cb65e02f04=1381415156,1381415646,1381416223; PHPSESSID=2m9c3s5rpr5n42ri0jqjf3pi05; Hm_lpvt_4010fd5075fcfe46a16ec4cb65e02f04=1381416223
event%5Bstart%5D=1381766400&event%5Bend%5D=1381852800&event%5Bsummary%5D=111222&event%5Bisallday%5D=true

修复方案:

过滤

版权声明:转载请注明来源 李白@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:1

确认时间:2013-10-11 17:00

厂商回复:

感谢对百度安全的关注,百度已接收到关于此漏洞的报告。
--“百度,因你更安全”

最新状态:

暂无