Click my link to access your zhihu account.
Click my link to access your zhihu account.
Zhihu's Weibo login Binding Request is
Http://www.zhihu.com/oauth/redirect/bind/sina? Next =/oauth/callback this request is not protected by csrf. Attackers can forge this request on a third-party webpage to authorize Sina Weibo as follows, if you have been authorized to log on to Weibo, it will be automatically bound. Therefore, we can find a csrf vulnerability on Sina Weibo, allow the user to automatically log on to the attacker's microblog and then allow the user to access the binding request. This completes binding to the attacker's microblog. Attackers can log on to Weibo to access the recorded video of the user's zhihu account http://v.youku.com/v_show/id_xmtqxnzeznjgxng00000000.html :198625
Solution:
Added csrf Protection
Weibo binding forces login using the Weibo user name and password.