IMCAFS

Home

hidden danger of big data information security of famous public figures

Posted by tetley at 2020-04-09
all

2014-07-05: the details have been notified to the manufacturer and are waiting for the manufacturer to handle 2014-07-05: the manufacturer has checked the current vulnerability content, and the details are only disclosed to the manufacturer 2014-07-08: the manufacturer has actively ignored the vulnerability, and the details are disclosed to the public

Vulnerability profile concerns (52) concerns about this vulnerability

Defect No.: wooyun-2014-66551

Vulnerability Title: hidden danger of big data information security of well-known public figures

Related manufacturers: CNCERT

Submitted on: 2014-07-05 12:58

Opening time: 11:05, July 8, 2014

Vulnerability type: successful intrusion event

Hazard level: medium

Self assessment rank: 10

Vulnerability status: it has been handed over to the third party Cooperation Agency (CNCERT National Internet Emergency Center) for handling

Tags: insufficient safety awareness

Vulnerability details

Disclosure status:

2014-07-05: the details have been notified to the manufacturer and are waiting for the manufacturer to handle 2014-07-05: the manufacturer has checked the current vulnerability content, and the details are only disclosed to the manufacturer 2014-07-08: the manufacturer has actively ignored the vulnerability, and the details are disclosed to the public

Brief description:

Using big data [in fact, social worker library] and Alipay's shortcomings. Security risks brought by... In order to protect personal information, the following words are more than pictures. I hope to include more··

detailed description:

Today, when playing lol, I saw a post in the multi play box

The general content is to use the previous Hotel leakage database to query the real information of some beauty commentaries. ID card, home address, email, mobile phone and name····

Then I had such a way of thinking, so I also found a commentary. Use "passerby B" instead.

Then go to the hotel database to search for rooms ~ ~ for example, take Gao Xiaosong's divorce in today's entertainment news··

It can be seen that his Baidu Encyclopedia information says that on November 14, 1969, we can quickly locate Gao Xiaosong's ID card by searching 19691114 in the previously leaked hotel database. Baidu Encyclopedia says that it was born in Beijing. Let's see if the ID card is from Beijing,

It can be seen that it should be his own ID card. There's a cell phone number and an email in the back·····

Well, this is just one of the cases. Continue with our story,

According to the birthday and birthplace of passersby on Baidu Encyclopedia, we quickly excluded other information with the same surname.

Passerby B leaked a lot of information in this database, including mobile phone, email, ID card and name···

Mobile phone mobile phone can be used to search for more information in the social work library. Of course, for me, these two are enough. We go to Alipay to retrieve the account number and enter the email or cell phone number to determine whether to use the email or the mobile phone to account for the account. LOL commentary is all open to Taobao store. I believe you all know that, so they will definitely do it. Alipay account. Sure enough, passers-by registered the account with the mailbox, I guess several passwords, and Alipay hints that the number of landings is excessive. Then I went straight to the password question and found that the answer was, it learned the name····

It doesn't matter. Famous people must have some interview videos or experience.

Sure enough, in its post bar, I found the answer, entered it and changed the password directly into its Alipay.

What is worth mentioning here is. I don't have his password and payment password.

I changed his payment password and login password through the answer to the security question.

Then it has a poor sense of security, no binding of digital certificates, and········

I transferred a piece of money to myself. At this time, one of Alipay's security mechanisms appeared.

Maybe it's because I logged in from another place and asked for the last six digits of my ID card···

Here we use the ID card number in the previously leaked hotel database... We directly input the last six digits

Successfully get 1 yuan of safety inspection fee! I'm not going to pay it back.

I took a look at it. It was bound with a bank card, but it didn't open express payment, but it still leaked the receiving address, that is, the home address.

I don't know if we can use burp suite to blow up the six digit ID number here···

However, we can still see that the Alipay security mechanism is not in place.

·

Proof of loopholes:

It turns out that someone's surname is meat~~

If you are interested, you can make a series···

The idea is to search for a target at random, to query the opening database, to get relevant information, to try to appeal or retrieve the password, to guess the password, to log on to Alipay, to get the home address of the target, to get the sensitive information further, to transfer money laundering to make a big health care.

Repair plan:

In fact, this loophole does not belong to any party. It's just a small case.

To change the payment password, only the answer to the security question is required, and email verification and mobile phone verification are not required, or it is necessary to judge whether to log in from other places. The consignee's address has not been encrypted. It is recommended to automatically block the receiving address in the previous transaction record when logging in from other places... Because if I log in, there is no need to check my receiving address. You don't know where you live?. You can view it only after you can verify it if you need to modify it·

Vulnerability response

Manufacturer response:

Hazard level: no impact ignored by manufacturer

Ignored: 11:05, July 8, 2014

Manufacturer's reply:

It is unable to confirm the main responsible party temporarily, which is not included in the disposal process.

Latest status:

No time

Vulnerability assessment:

Evaluate the loophole information to better feedback the value of information, including information objectivity, whether the content is complete and whether it has learning value

Vulnerability assessment (less than 3 persons):

evaluate

These days, the food makers have made big data. I don't know if you're talking about this. have ulterior motives?

2014-07-03 13:06 Nightmare (ordinary white hat, rank: 1218, number of loopholes: 105. It's said that nightmare is an amazing man, but apart from tahua...)

2014-07-03 13:09 | hero (ordinary white hat | rank: 162 number of holes: 44 | drug chechner, inflatable doll psychedelic)

2014-07-03 13:09 | mad dog (internship white hat | rank: 44 loopholes: 2 | read all loopholes in the world, no code in mind. )

Big data focuses on the privacy of ordinary users. In fact, the impact on the public and stars here is also huge and unimaginable.

2014-07-03 13:38 | chinakid (internship white hat | rank: 48 vulnerability number: 4 | although the road is far, it is necessary to go. )

2014-07-03 13:40 | Li xumin (ordinary white hat | rank: 840 vulnerability number: 92 | ฏ๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎...)

One

2014-07-03 13:50 Nightmare (ordinary white hat, rank: 1218, number of loopholes: 105. It's said that nightmare is an amazing man, but apart from tahua...)

2014-07-03 13:54 | Li xumin (ordinary white hat | rank: 840 vulnerability number: 92 | ฏ๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎...)

2014-07-03 13:56 Nightmare (ordinary white hat, rank: 1218, number of loopholes: 105. It's said that nightmare is an amazing man, but apart from tahua...)

2014-07-03 14:05 | John (ordinary white hat | rank: 222 vulnerability number: 25)

2014-07-03 14:08 | xyang (ordinary white hat | rank: 350 vulnerability number: 35 | stay hungry stay stool)

2014-07-03 15:44 | calm (ordinary white hat | rank: 415 holes: 96 | wow, cheerleading, my baby |)

2014-07-03 16:00 | Li xumin (ordinary white hat | rank: 840 vulnerability number: 92 | ฏ๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎๎...)

2014-07-03 16:01 | zeracker (ordinary white hat | rank: 1077 vulnerability number: 134 | likes eating crayfish. )

2014-07-03 16:35 | b1acken (ordinary white hat | rank: 175 vulnerability number: 29 | slag)

2014-07-03 17:36 | erevus (ordinary white hat | rank: 201 vulnerability number: 31)

2014-07-03 21:00 | ghost lamb (ordinary white hat | rank: 299 vulnerability number: 41 | (`), convex (`), convex (`), convex (`), convex (`)

2014-07-03 21:10 | I am small (ordinary white hat | rank: 366 vulnerability number: 58 | Martin)

2014-07-04 09:27 | love Gail (ordinary white hat | rank: 237 vulnerability number: 38 | love vulnerability, love programming, love tourism, love Gail)

It should be the social work library and the public information associated with some sensitive content, which I always want to do, and when my Hadoop environment is through

2014-07-08 11:29 | chock (ordinary white hat | rank: 156 vulnerability number: 29 | if you like strange people)

2014-07-08 11:47 | noob (internship white hat | rank: 85 loopholes: 14 | learn from and salute the gods)

2014-07-08 11:49 Nightmare (ordinary white hat, rank: 1218, number of loopholes: 105. It's said that nightmare is an amazing man, but apart from tahua...)

2014-07-08 12:29 | meat (ordinary white hat | rank: 112 vulnerability number: 10 | meat in Changting technology, meat in Changting technology, meat in Changting...)

2014-07-09 19:59 | qq852451559 (internship white hat | rank: 79 loopholes: 18 | student party)

2014-07-09 20:05 | hero (ordinary white hat | rank: 162 number of holes: 44 | drug chechner, inflatable doll psychedelic)

2014-07-10 10:43 | love Gail (ordinary white hat | rank: 237 vulnerability number: 38 | love vulnerability, love programming, love tourism, love Gail)

One

2014-07-10 11:11 | Ma Huateng