Sensitive information leakage caused by mischat client login verification and Address Book transmission Defects

Source: Internet
Author: User

In theory, this may not be a vulnerability. It should be considered that Mi chat is not rigorous enough to handle this issue. After all, the wifi phishing trend is a bit hot now, so we should pay attention to it.
 
Login authentication and Address Book transmission are all MD5 encryption at a time, which can be captured and used in public WIFI Environments
Detailed description:
As we all know, MD5 and plain text have almost been allocated an equal sign, and Mi chat is verifying this part, and even the address book transmission uses simple md5 encryption for Transmission security is not enough. The attacker can capture packets in the WIFI environment to obtain the logon id pwd and the corresponding address book;
 
In this regard, we have done a good job.
Proof of vulnerability:
 
 
 


 
 
Solution:
1. Log On either through SSL or by changing the encryption algorithm.
2. Address Book, you know.
 
For more information, see
 
Author ReJeCt

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.