Yilongdai Vulnerability Package (Sensitive Information Leak and Password Reset Vulnerability) https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0124387
Security Risk ăResolvedă:
- Yilongdaiâs password recovery process (http://**.**.**.**/page/findpwdEmail.jsp?email=**@**.com) has two steps: 1. Email verification code to verify identity; 2. Reset login password.
- The attack also has two steps: 1. Use your own email verification code for identity verification; 2. During the password reset process, intercept the request and change your email address to the victimâs email address to reset the victimâs password.
- Actual attacks are more complex: 1. In the second step of resetting the victimâs password, in addition to the victimâs email address, the victimâs account ID is also required. Fortunately, the victimâs account ID can be obtained in the first step of identity verification; 2. In the second step of resetting the victimâs password, before intercepting the request and changing your email address to the victimâs email address, you need to perform the first step of sending the email verification code to the victimâs email address to successfully reset the victimâs password.
Security Recommendations:
- Accounts requiring password resets should be those that have completed identity verification and should not be affected by other user-controllable and modifiable parameters.
Jumei Youpin Arbitrary User Shipping Address Viewing (Including Username, Contact Number, and Detailed Address) https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2014-083201
Security Risk ăResolvedă:
- When shopping on Jumei Youpin, after placing an order, go to the payment page (http://**.**.**.**/i/MobileWap/pay/?batch_trade_number=**&gateway_name=&gateway=AlipayMobileWap&address_id=48218711&logistic_preference=&prefer_delivery_day=) to confirm the information and click to pay. The information to be confirmed includes the shipping address (name, phone number, detailed address), etc.
- The address_id parameter on this payment page can be enumerated to obtain the shipping address information of all users on Jumei Youpin.
Security Recommendations:
- Use user cookies to view information, not user-controllable and modifiable URL parameters.
Wuhan Housing Personal Provident Fund Arbitrary Detail Inquiry https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2013-020375
Security Risk ăResolvedă:
- In the request parameters of the Wuhan Housing Provident Fund page (http://**.**.**.**/4.asp) (bank=XX&wd=XXXX&dwzh=XXXXXXX&xgrzh=XXXXXXXXX&jgrzh=&grzh=XXXXXXXXX&name=XXXXXXXXXXXXXXXXXX&Submit=XXXXXXXXXXXXXXXXXX), modifying the xgrzh parameter can view the provident fund payment details of other people.
Security Recommendations:
- Use user cookies to view information, not user-controllable and modifiable URL parameters.
China Footwear Talent Network 450,000 Resumes Leaked https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0146823
Security Risk ăResolvedă:
- The China Footwear Talent Network has an unauthorized access vulnerability (http://**.**.**.**/manage/talent/cn/infoView.action?talent.id=543095). The id value ranges from 100000, and enumerating the id can download all resumes, including personal details such as name, phone number, date of birth, and home address.
Security Recommendations:
- Use user cookies to view information, not user-controllable and modifiable URL parameters.
Jinyingdao Improper Configuration of a Certain Station Can Leak Internal Information https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0126637
Security Risk ăResolvedă:
- Jinyingdaoâs JIRA (http://**.**.**.**:8888/) allows account registration. After logging in, you can view project progress and division of labor.
Security Recommendations:
- Prohibit account registration for internal corporate systems. Accounts should be created by administrators, or integrated with the companyâs 4A, SSO, domain control, and other account management platforms.
Fanno Enterprise Website Management System Backend Bypass https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2013-043237
Security Risk ăResolvedă:
- The Fanno Enterprise Website Management System backend (http://**.**.**.**/admin/main/site_info.asp) can be accessed without authorization.
Security Recommendations:
- All backend addresses should only be accessible after verifying cookies or other identity credentials.
Jiangnan Keyou Bastion Host Direct Acquisition of Host Account Credentials/IP/Exposure of Physical Path https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2015-0135704
Security Risk ăResolvedă:
- Accessing the Jiangnan Keyou Bastion Host address (http://**.**.**.**/excel/sso_user_export.php) can export a list of cleartext account passwords (user.xls) from the Bastion Host, while these credentials are stored in the database using SHA1 encryption.
Security Recommendations:
- All backend addresses should only be accessible after verifying cookies or other identity credentials.
Bohua Wanglong Firewall Series Product XML Database File Unauthorized Access (Can Log In to Device) https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2016-0207791
Security Risk ăResolvedă:
- Bohua Wanglong Firewall has an unauthorized access vulnerability (http://**.**.**.**/xml/users.xml), allowing download of a cleartext account password list (users.xml) for the firewall, enabling login to the firewall.
Security Recommendations:
- All backend addresses should only be accessible after verifying cookies or other identity credentials.
Unauthorized Access to 263 Communications Service Leading to Direct Shell Access to the Internal Network (Affecting the Security of Hundreds of Hosts) https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2016-0210705
Security Risk ăResolvedă:
- The 263 companyâs Redis service (redis://**.**.**.**:6381) is open to the internet and has an unauthorized access vulnerability, allowing the writing of scheduled tasks to bounce back a shell and gain server control permissions. Using the nmap tool to probe this server (192.168.167.60) reveals 35 servers in the C segment.
Security Recommendations:
- It is recommended to configure the Redis service for local access only. Configure in /etc/redis.conf: bind 127.0.0.1;
- It is recommended to set up access whitelisting in the operating system using the command: iptables -A INPUT -s **.**.**.** -p tcp âdport 6379 -j ACCEPT;
- It is recommended to set password authentication. Configure in /etc/redis.conf: requirepass ****************;
Case Study 10: Anonymous Access to FTP Service + Web Backdoor Upload
ZTE Energy Photovoltaic Power Station Remote Monitoring System Easily Achieves Remote Login https://wy.zone.ci/bug_detail.php?wybug_id=wooyun-2016-0169983
Security Risk ăResolvedă:
- ZTE Energyâs photovoltaic power station remote monitoring system opens FTP service (port 21) and Web service (port 8222). The FTP service allows anonymous access, allowing the upload of Trojans (**.**.**.**/a.aspx) to the Web directory, and access via the Web service (**.**.**.**:8222/a.aspx) to gain server control permissions.
Security Recommendations:
- Prohibit anonymous FTP access;
- Prohibit opening maintenance FTP services to the internet.