### 简要描述:
rt
### 详细说明:
亿邮邮件系统被广大用户使用,发现在亿邮找回密码处回答问题可暴力破解,如果存在简单问题如:生日?攻击者可通过8为生日字典暴力破解,即可成功重置密码。
[<img src="https://images.seebug.org/upload/201512/2012093462dde7a698a830915244ec67c4740581.jpg" alt="客户.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/2012093462dde7a698a830915244ec67c4740581.jpg)
### 漏洞证明:
1、简单重置问题
[<img src="https://images.seebug.org/upload/201512/201210341747868fe2a50a46a4e1e3cd08b801ca.jpg" alt="重置问题.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/201210341747868fe2a50a46a4e1e3cd08b801ca.jpg)
2、暴力破解
[<img src="https://images.seebug.org/upload/201512/201210516fe77865ce1a76ee0d2bfce18e1073f9.jpg" alt="成功.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/201210516fe77865ce1a76ee0d2bfce18e1073f9.jpg)
3、重置密码
[<img src="https://images.seebug.org/upload/201512/201211079af95b823569e859b50afdb3b4232858.jpg" alt="重置密码.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/201211079af95b823569e859b50afdb3b4232858.jpg)
[<img src="https://images.seebug.org/upload/201512/2012111250018f17b9f544703d5cef0a36689553.jpg" alt="重置成功.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/2012111250018f17b9f544703d5cef0a36689553.jpg)
4、登陆邮箱
[<img src="https://images.seebug.org/upload/201512/2012113453ba520f33b2e65b1d1cc1ec24d8dac7.jpg" alt="登陆邮箱.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/2012113453ba520f33b2e65b1d1cc1ec24d8dac7.jpg)
[<img src="https://images.seebug.org/upload/201512/20121144c5bf5dfa201e9be34fb846bd6d8724dc.jpg" alt="商业秘密.jpg" width="600" onerror="javascript:errimg(this);">](https://images.seebug.org/upload/201512/20121144c5bf5dfa201e9be34fb846bd6d8724dc.jpg)
暂无评论