你见过的最糟糕的安全漏洞是什么?为了保护罪犯,限制细节可能是个好主意。

不管怎样,这里有一个关于如果你发现了安全漏洞该怎么办的问题,还有一个关于如果公司(似乎)没有回应该怎么办的问题。


当前回答

在签名代码中:

System.setSecurityManager(null);

(你可以通过谷歌代码搜索。)从进程中运行的所有代码中删除所有Java安全限制。可能没有想清楚。

其他回答

In the 1970's Stanford had IBM 2741 hardcopy terminals spread around campus networked to an IBM 360/67. Account passwords were three characters. During logon, the password prompt would overprint a three-position blob of about nine random uppercase characters, so the subsequently-typed password would supposedly be masked by the blob. However, everyone typed their passwords in lowercase, which were trivial to discern against the uppercase background blob. That meant you could usually walk up to any terminal, peruse the hardcopy typically left behind by the previous user, and easily logon with their account and password.

我所见过的最严重的安全漏洞是在MS SQL Server的早期版本中,7.0或2000版本,记不清了。

当安装此版本的SQL Server时,安装程序默认会给“sa”帐户一个空密码!!(sa帐户是SQL管理员帐户,它可以在服务器上做任何事情)

这基本上让任何人都可以访问没有防火墙保护的SQL服务器。

但还有更糟的。

当时,安装了许多SQL服务器以在“本地系统”身份验证下运行服务,这使SQL server进程对系统有无限的控制。

既然你可以在SQL server中创建COM对象,你就可以完全访问运行SQL server的计算机了。

很多网站都是这样被黑客攻击的。

在我以前的学校,他们把用户密码以明文形式存储在cookie中。

这本身就很可怕,但更糟糕的是,他们把它们储存在饼干里供*.大学。当然,现在所有学生和员工的页面都在university.edu.au/~user这样的网站上。

<?php

var_dump($_COOKIE); // oops.

在我尝试的一个免费网络主机上,用“忘记密码”的方法将密码发送给你时出现了一个逻辑错误——如果你没有输入电子邮件地址(辅助电子邮件是可选的),它会将主地址的密码通过电子邮件发送给每个没有提供辅助电子邮件的用户。

一天,我和其他数百人收到一封电子邮件,里面有数百个用户名和密码,密码都是明文。

About 3 years ago I built a site for a somewhat large non-profit organization in our state. When it came time to deploy the application to their web host server, I noticed an odd file named "cc.txt" or something obvious like that in their public site. It was under their web root, was getting served, and was a csv file of all their donor's names, addresses, credit card numbers, expiration dates, and CVV/CVC codes. I cannot count the number of times I brought the issue up - first to my boss, then our company accountant, the client's IT director, finally the client's President. That was 3 years ago. The file is still being served, it can even be googled. And it's been updated. I tend not to respond to their donation solicitations when I get them.