P2p Financial Security: A system vulnerability in Credit Suisse
List the system problems:
1. The business system is open to the public network
2. weak passwords and no brute-force cracking mechanism
3. The system has an excessive permission vulnerability. You can view and use the high-permission account function.
By accident, I scanned an address and found that it was the background of the trusted credit business system and there was no brute-force cracking machine. Therefore, the system was cracked and a weak password account was found. Background address: http: // 42.96.249.25 weak password account: zhangleizhangyuzhangliang. After logging on to the system, you can find that the system is in the test phase, but it has all the official data before January 29... 1. Account investment details
2. Common User Management (more than 70000 users are identified by ID)
3. You can view the photo of your ID card at the user review.
Click to View Details and find that the account has insufficient permissions... Therefore, the attacker tried to hijack the request data packet and found that the COOKIE contains the rule = 26 parameter. The value is 1.
The ID card image is successfully viewed.
4. You can also use the excessive permission vulnerability to modify account permissions, view other high-Permission functions, and other important sensitive information.
Solution:
1. Disable the Internet interfaces of important business systems
2. strengthen the system's anti-brute force mechanism and modify Weak Password accounts
3. Fix the excessive permission vulnerability and verify user permissions.