系统被奇安信网神进行漏洞扫描时,出现了 Form表单无CSRF保护的漏洞
测试用例:
POST /index.php?m=login&adminmobileyzm=1&adminuser=&logintype=0&rempass=on&adminmobile= HTTP/1.1
Accept: *
Referer: http://xxxxxxxx/index.php?m=login&adminmobileyzm=1&adminuser=&logintype=0&rempass=on&adminmobile=
Content-Length: 62
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
Host: xxxxxx
Connection: Keep-Alive
User-Agent: Mozilla/5.0 compatible; MSIE 9.0; Windows NT 6.1; WOW64; Trident/5.0
Accept-Encoding: gzip,deflate
Cookie: PHPSESSID=b09g0ca9254emrahh62fheo9jg
adminmobileyzm=&adminuser=&logintype=0&rempass=on&adminmobile=
原创文章,禁止转载复制,信呼OA官网保留一切知识产权。