[Bounty] 台灣電力公司 機密資訊洩露 - HITCON ZeroDay

Vulnerability Detail Report

Vulnerability Overview

  • ZDID: ZD-2022-00587
  •  發信 Vendor: 台灣電力公司
  • Title: [Bounty] 台灣電力公司 機密資訊洩露
  • Introduction: 資訊洩露

處理狀態

目前狀態

公開
Last Update : 2022/10/01
  • 新提交
  • 已審核
  • 已通報
  • 已修補
  • 已複測
  • 公開

處理歷程

  • 2022/08/03 10:57:34 : 新提交 (由 K4iBr0 更新此狀態)
  • 2022/08/03 12:34:44 : 新提交 (由 K4iBr0 更新此狀態)
  • 2022/08/03 12:35:44 : 新提交 (由 K4iBr0 更新此狀態)
  • 2022/08/03 12:36:13 : 新提交 (由 K4iBr0 更新此狀態)
  • 2022/08/03 17:20:46 : 審核中 (由 HITCON ZeroDay 服務團隊 更新此狀態)
  • 2022/09/22 17:25:42 : 複測申請中 (由 組織帳號 更新此狀態)
  • 2022/09/27 13:38:41 : 確認已修補 (由 K4iBr0 更新此狀態)
  • 2022/10/01 03:00:15 : 公開 (由 HITCON ZeroDay 平台自動更新)

詳細資料

  • ZDID:ZD-2022-00587
  • 通報者:Kaibro (K4iBr0)
  • 風險:嚴重
  • 類型:資訊洩漏 (Information Leakage)

參考資料

攻擊者可利用洩漏資訊進行下一步攻擊行為。

OWASP 漏洞說明 (Top 10 2017 - A3 Sensitive Data Exposure)
https://www.owasp.org/index.php/Top_10-2017_A3-Sensitive_Data_Exposure

CWE-200 漏洞說明
https://cwe.mitre.org/data/definitions/200.html
(本欄位資訊由系統根據漏洞類別自動產生,做為漏洞參考資料。)

相關網址

https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/calendar
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/Internet/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/

敘述

由於 cloudmail.taipower.com.tw 是使用 Zimbra 系統,故其 Briefcase 功能若權限設定不當,則任何人只要知道員工帳號(email),即可存取公開 Briefcase 下的檔案。

並且員工之 Email 為流水號,故攻擊者可暴力枚舉所有公開 Briefcase 下的檔案內容,以下為列舉出之範例:

https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/calendar
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/
https://cloudmail.taipower.com.tw/home/[email protected]/Briefcase/Internet/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/
https://61.65.236.104/home/[email protected]/Briefcase/

存取權限設定不當之 Briefcase 可直接列出底下所有檔案列表,範例如: 圖片

而其中甚至可以取得部分系統之登入帳號及密碼,例如: 圖片
實測隨機登入一組可成功登入。

由於可透過此方法下載到許多公文、會議報告、行事曆、架構圖、帳密清單等機敏資訊,故將漏洞風險調成嚴重。

修補建議

- 員工應培養資安意識,遵守最小權限原則,並且避免將機敏資料放上雲端
- 阻擋、偵測暴力窮舉攻擊

擷圖

留言討論

聯絡組織

 發送私人訊息
您也可以透過私人訊息的方式與組織聯繫,討論有關於這個漏洞的相關資訊。
;