An important business application system involves the normal operation of multiple business information systems, which harms the interests of skype users.
Tom Online Advertising Management System back-end address (http://yd.ad.tom.com/) Directory through the scan tool after brute force cracking to get a http://yd.ad.tom.com/index.html and so on many involved background business application module.
On index.html, the Administrator puts important sensitive information such as the database, data architecture, data structure, and open document information of the entire advertising management business system. You can even access phpmyadmin anonymously, so that the database can extract the account password, email, and contact information of the customer, such as the advertising administrator and advertising region management.
The code for an advertisement (http://ad.tom.com/tomad/page/skype/home_button.html) embedded in this information system in a skype software advertisement is as follows:
<Script type = "text/javascript" src = "http://ad.tom.com/TomFlash.js"> </script>
<Script type = "text/javascript" src = "http://ad.tom.com/tomad/page/skype/SkypeAppS.js"> </script>
<! -- <Script type = "text/javascript" src = "http://js.pub.tom.com/skype/skype-main-bt.js"> </script> -->
<Script type = "text/javascript">
Document. write ('<script language = "javascript" type = "text/javascript" src = "http://js.pub.tom.com/skype/skype-main-bt.js? '+ Math. random () +' "> <\/script> ');
</Script>
Attackers can mount trojans on the ad management platform pages and pop-up windows to gain considerable benefits. Such Trojan pages can steal sensitive information such as skype user account passwords.
Proof of vulnerability: code annotation specification: http://phpdoc.org/docs/HTMLSmartyConverter/default/phpDocumentor/tutorial_manual.pkg.html
Program API: http://yd.ad.tom.com/docs/apidoc/
Design UML: http://yd.ad.tom.com/docs/UML/
Database: http://yd.ad.tom.com/phpAdmin/
Data Dictionary: http://yd.ad.tom.com/phpAdmin/db_datadict.php? Lang = zh & server = 1 & db = manage_ad & goto = db_details_structure.php
Advertising reporting system: http://yd.ad.tom.com/index.php
Solution:
Perform strict authentication.
Author Bincker