CN110489966A - Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment - Google Patents

Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment Download PDF

Info

Publication number
CN110489966A
CN110489966A CN201910741372.2A CN201910741372A CN110489966A CN 110489966 A CN110489966 A CN 110489966A CN 201910741372 A CN201910741372 A CN 201910741372A CN 110489966 A CN110489966 A CN 110489966A
Authority
CN
China
Prior art keywords
response message
commission
parallel
going beyond
content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910741372.2A
Other languages
Chinese (zh)
Inventor
谢金池
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910741372.2A priority Critical patent/CN110489966A/en
Publication of CN110489966A publication Critical patent/CN110489966A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer And Data Communications (AREA)

Abstract

Present disclose provides a kind of leak detection method, device, storage medium and electronic equipments of going beyond one's commission in parallel.This method comprises: obtaining the first access address comprising target component, and first network request is constructed according to first access address;Network communication services are called, according to first response message of first network request;The target component is modified, to form the second access address for including modified target component, and the second network request is constructed according to second access address;The network communication services are called, to obtain the second response message according to second network request;Parallel loophole of going beyond one's commission is judged whether there is with second response message according to first response message.The technical solution of the disclosure can rapidly, accurately detect loophole of going beyond one's commission in parallel, improve the safety of user sensitive information, further increase user experience.

Description

Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment
Technical field
This disclosure relates to which field of computer technology, leak detection method of going beyond one's commission in parallel in particular to one kind are got in parallel Weigh Hole Detection device, computer readable storage medium and electronic equipment.
Background technique
Loophole of going beyond one's commission is a kind of common logical security loophole, compares the conventional securities loopholes such as SQL injection, XSS loophole, attacks The person of hitting is more likely to excavate the application safety problem of Business Logic, and the harm of this kind of safety problem is huge, may cause enterprise User sensitive information leakage and fame loss.
Loophole of going beyond one's commission include go beyond one's commission loophole and vertically to go beyond one's commission loophole in parallel, wherein loophole of going beyond one's commission in parallel be server end to The data operation request that family proposes excessively is trusted, and has ignored the judgement to user's operation permission, ordinary user is caused to have it The additions and deletions of his ordinary user change Cha Gongneng.If there is loophole of going beyond one's commission in parallel in business, so that it may check the quick of other users Feel information, and traditional Web security scan device none have the function of vulnerability scanning of going beyond one's commission in parallel.
In consideration of it, this field needs to develop a kind of new leak detection method of going beyond one's commission in parallel.
It should be noted that information is only used for reinforcing the reason to the background of the disclosure disclosed in above-mentioned background technology part Solution, therefore may include the information not constituted to the prior art known to persons of ordinary skill in the art.
Summary of the invention
Embodiment of the disclosure provides the parallel leak detection method of going beyond one's commission of one kind, go beyond one's commission in parallel Hole Detection device, meter Calculation machine readable storage medium storing program for executing and electronic equipment, and then loophole of going beyond one's commission in parallel can be quickly detected at least to a certain extent, drop The rate of false alarm of low loophole of going beyond one's commission in parallel, and then improve the safety of Business Logic.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
According to the one aspect of the embodiment of the present disclosure, a kind of leak detection method of going beyond one's commission in parallel is provided, comprising: obtain packet The first access address containing target component, and first network request is constructed according to first access address;Call network communication Service, according to first response message of first network request;The target component is modified, to be formed comprising after modification Target component the second access address, and according to second access address construct the second network request;Call the network Communication service, to obtain the second response message according to second network request;According to first response message and described Two response messages judge whether there is loophole of going beyond one's commission in parallel.
According to the one aspect of the embodiment of the present disclosure, a kind of Hole Detection device of going beyond one's commission in parallel is provided, comprising: first asks Building module is sought, for obtaining the first access address comprising target component, and according to first access address building first Network request;The first information obtains module, for calling network communication services, according to the first network request first Response message;Second request building module, for modifying the target component, to form the comprising modified target component Two access address, and the second network request is constructed according to second access address;Second data obtaining module, for calling Network communication services are stated, to obtain the second response message according to second network request;Hole Detection of going beyond one's commission module is used for root Parallel loophole of going beyond one's commission is judged whether there is with second response message according to first response message.
In some embodiments of the present disclosure, aforementioned schemes are based on, the Hole Detection module of going beyond one's commission includes the first detection Unit for calling rule management service and extracts the first judgment rule, according to first response message, second sound Information is answered to judge whether there is the parallel loophole of going beyond one's commission with first judgment rule.
In some embodiments of the present disclosure, first judgment rule includes that content compares and content-length comparison;Base In aforementioned schemes, the first detection unit includes: comparing unit, for by the content of first response message and described the The content of two response messages is compared;First judging unit, for the content and described second in first response message When the content of response message is identical, determine that there is no the loopholes of going beyond one's commission in parallel;Second judging unit, in first sound When answering the content difference of the content of information and second response message, according to the content-length of first response message and institute The content-length for stating the second response message judges whether there is the loophole of going beyond one's commission in parallel.
In some embodiments of the present disclosure, aforementioned schemes are based on, second judging unit is configured that described first The content-length of response message and the content-length of second response message make ratio, to obtain a target ratio;By the mesh Mark ratio is compared with preset threshold;If the target ratio is less than the preset threshold, determine to get in parallel there are described Weigh loophole;If the target ratio is greater than or equal to the preset threshold, determine that there is no the loopholes of going beyond one's commission in parallel.
In some embodiments of the present disclosure, the target component is digital shape parameter;Based on aforementioned schemes, described second Request building module be configured that based on the target component, increase or decrease default value, with to the target component into Row modification.
In some embodiments of the present disclosure, it is based on aforementioned schemes, the Hole Detection device of going beyond one's commission in parallel further include: the Three request building modules, for deleting the user information being locally stored, to form include the modified target component the Three access address, and third network request is constructed according to the third access address;Third data obtaining module, for calling Network communication services are stated, to obtain third response message according to the third network request;It goes beyond one's commission loophole judgment module, is used for root The parallel loophole of going beyond one's commission is judged whether there is with the third response message according to second response message.
In some embodiments of the present disclosure, aforementioned schemes are based on, the loophole judgment module of going beyond one's commission includes: the second detection Unit for calling rule management service and extracts the second judgment rule, to be rung according to second response message, the third Information is answered to judge whether there is the parallel loophole of going beyond one's commission with second judgment rule.
In some embodiments of the present disclosure, second judgment rule includes that content compares;It is described based on aforementioned schemes Second detection unit is configured that, and the content of second response message is compared with the content of the third response message; If the content of second response message is identical as the content of the third response message, determine to go beyond one's commission in parallel there is no described Loophole;If the content of second response message is not identical as the content of the third response message, determine that there are described flat Capable loophole of going beyond one's commission.
In some embodiments of the present disclosure, it is based on aforementioned schemes, the Hole Detection device of going beyond one's commission in parallel further include: the Three detection units for calling rule management service and extract third judgment rule, according to first response message, described Second response message judges whether there is the parallel loophole of going beyond one's commission with the third judgment rule.
In some embodiments of the present disclosure, the third judgment rule includes that target information compares;Based on aforementioned schemes, The third detection unit includes: information extraction unit, for extracting institute according to the preset field in the third judgment rule State the second target information in the first object information and second response message in the first response message;Information comparison list Member, for the first object information and second target information to be compared;Third judging unit, for described the When one target information is identical as second target information, determine that there is no the loopholes of going beyond one's commission in parallel;4th judging unit is used In when the first object information and second target information is not identical, there are the loopholes of going beyond one's commission in parallel for judgement.
In some embodiments of the present disclosure, aforementioned schemes are based on, the information extraction unit is configured that will be described default Field is matched with all fields in first response message, and the preset field and second response are believed All fields in breath are matched;When in first response message exist and the matched aiming field of the preset field When, information corresponding with the aiming field in first response message is extracted, and will letter corresponding with the aiming field Breath is used as the first object information;When in second response message exist and the matched aiming field of the preset field When, information corresponding with the aiming field in second response message is extracted, and will letter corresponding with the aiming field Breath is used as second target information.
In some embodiments of the present disclosure, it is based on aforementioned schemes, the Hole Detection device of going beyond one's commission in parallel further include: protect Storing module, for determine there are it is described go beyond one's commission in parallel loophole when, first access address of loophole of going beyond one's commission in parallel will be present Server is sent to corresponding target component to be saved.
According to the one aspect of the embodiment of the present disclosure, a kind of computer equipment is provided, comprising: processor;And memory, It is stored with computer-readable instruction on the memory, is realized when the computer-readable instruction is executed by the processor as above State leak detection method as described in the examples of going beyond one's commission in parallel.
According to the one aspect of the embodiment of the present disclosure, a kind of electronic equipment is provided, comprising: one or more processors; Storage device, for storing one or more programs, when one or more of programs are held by one or more of processors When row, so that one or more of processors are realized such as above-mentioned leak detection method as described in the examples of going beyond one's commission in parallel.
In the technical solution provided by some embodiments of the present disclosure, according to the first access address comprising target component First network request is constructed, and according to the first response message of first network request;Then modify target component, according to comprising Second access address of modified target component constructs the second network request, and obtains the second response according to the second network request Information;Parallel loophole of going beyond one's commission finally is judged whether there is with the second response message according to the first response message.The technology of the disclosure On the one hand scheme can quickly detect loophole of going beyond one's commission in parallel, improve the safety of Business Logic;On the other hand it can mention The safety of high user sensitive information, further improves user experience.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not The disclosure can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the implementation for meeting the disclosure Example, and together with specification for explaining the principles of this disclosure.It should be evident that the accompanying drawings in the following description is only the disclosure Some embodiments for those of ordinary skill in the art without creative efforts, can also basis These attached drawings obtain other attached drawings.In the accompanying drawings:
Fig. 1 is shown can be using the schematic diagram of the exemplary system architecture of the technical solution of the embodiment of the present disclosure;
Fig. 2 diagrammatically illustrates the flow chart of the leak detection method of going beyond one's commission in parallel of one embodiment according to the disclosure;
Fig. 3 diagrammatically illustrates the flow diagram of the parallel loophole of going beyond one's commission of detection according to one embodiment of the disclosure;
Fig. 4 diagrammatically illustrates the flow diagram of the parallel loophole of going beyond one's commission of detection according to one embodiment of the disclosure;
Fig. 5 diagrammatically illustrates the flow diagram of the parallel loophole of going beyond one's commission of detection according to one embodiment of the disclosure;
Fig. 6 diagrammatically illustrates the flow diagram of the parallel loophole of going beyond one's commission of detection according to one embodiment of the disclosure;
Fig. 7 diagrammatically illustrates the acquisition first object information and the second target information according to one embodiment of the disclosure Flow diagram;
Fig. 8 diagrammatically illustrates the flow diagram of the parallel loophole of going beyond one's commission of detection according to one embodiment of the disclosure;
Fig. 9 diagrammatically illustrates the block diagram of the Hole Detection device of going beyond one's commission in parallel of one embodiment according to the disclosure;
Figure 10 shows the structural schematic diagram for being suitable for the computer system for the electronic equipment for being used to realize the embodiment of the present disclosure.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, thesing embodiments are provided so that the disclosure will more Fully and completely, and by the design of example embodiment comprehensively it is communicated to those skilled in the art.
In addition, described feature, structure or characteristic can be incorporated in one or more implementations in any suitable manner In example.In the following description, many details are provided to provide and fully understand to embodiment of the disclosure.However, It will be appreciated by persons skilled in the art that can with technical solution of the disclosure without one or more in specific detail, Or it can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side Method, device, realization or operation are to avoid fuzzy all aspects of this disclosure.
Block diagram shown in the drawings is only functional entity, not necessarily must be corresponding with physically separate entity. I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit These functional entitys, or these functional entitys are realized in heterogeneous networks and/or processor device and/or microcontroller device.
Flow chart shown in the drawings is merely illustrative, it is not necessary to including all content and operation/step, It is not required to execute by described sequence.For example, some operation/steps can also decompose, and some operation/steps can close And or part merge, therefore the sequence actually executed is possible to change according to the actual situation.
Fig. 1 is shown can be using the schematic diagram of the exemplary system architecture of the technical solution of the embodiment of the present disclosure.
As shown in Figure 1, system architecture 100 may include one of terminal device 101,102,103 or a variety of, network 104 and server 105.Network 104 between terminal device and server 105 to provide the medium of communication link.Network 104 It may include various connection types, such as wired communications links, wireless communication link etc..
It should be understood that the number of terminal device, network and server in Fig. 1 is only schematical.According to practical need It wants, can have any number of terminal device, network and server.For example server 105 can be multiple server compositions Server cluster etc..
User can be used terminal device 101,102,103 and be interacted by network 104 with server 105, to receive or send out It delivers letters breath etc..Terminal device 101,102,103 can be the various electronic equipments with display screen, including but not limited to intelligent hand Machine, tablet computer, portable computer and desktop computer etc..
In one embodiment of the present disclosure, terminal device 101 are also possible to build leakage in terminal device 102,103 Hole scanner, for scanning loophole of going beyond one's commission in parallel, vulnerability scanners can be obtained from the url list stored in terminal device 101 The first access address comprising target component is taken, and first network request, target ginseng therein are constructed according to the first access address Number is digital shape parameter, and all URL comprising digital shape parameter can be used as the first access comprising target component in url list Address;Then network communication module is called, vulnerability scanners can request first network to be sent to network communication module, so that First network request is sent to server 105 by network 104 by network communication module, and receives the of the return of server 105 One response message;After the first response message for receiving network communication module return, vulnerability scanners repair target component Change, and the second network request is constructed according to the second access address comprising modified target component;Then pass through network communication Second network request is sent to server 105 by module, to obtain the second response message of the return of server 105;Last loophole Scanner can judge Business Logic with the presence or absence of parallel loophole of going beyond one's commission according to the first response message with the second response message.This On the one hand disclosed technical solution can quickly detect loophole of going beyond one's commission in parallel, improve the safety of Business Logic;Another party Face can be improved the safety of user's sensitive data, further promote user experience.
It should be noted that leak detection method of going beyond one's commission in parallel provided by the embodiment of the present disclosure is generally held by terminal device Row, correspondingly, Hole Detection of going beyond one's commission in parallel device is generally positioned in terminal device.But in the other embodiments of the disclosure In, the detection scheme for loophole of going beyond one's commission in parallel provided by the embodiment of the present disclosure can also be executed as server.
The embodiment of the present disclosure first proposed a kind of leak detection method of going beyond one's commission in parallel, below to the skill of the embodiment of the present disclosure The realization details of art scheme is described in detail:
Fig. 2 diagrammatically illustrates the flow chart of the leak detection method of going beyond one's commission in parallel of one embodiment according to the disclosure, The leak detection method of going beyond one's commission in parallel can be executed by the vulnerability scanners in terminal device, which can be Fig. 1 Shown in controlling terminal 101.Referring to shown in Fig. 2, the leak detection method of going beyond one's commission in parallel is including at least step S210 to step S250 is described in detail as follows:
In step S210, obtain include target component the first access address, and according to the first access address building the One network request.
It in one embodiment of the present disclosure, can be in terminal device when user obtains Internet resources by terminal device 101 Access trace is left in 101, URL corresponding to the webpage that access trace as accessed, URL is uniform resource locator, is used Come the position where description information and access mode.Can detecte corresponding business according to URL whether there is loophole of going beyond one's commission in parallel, because This can integrate the webpage URL that user accessed, and form url list, then by vulnerability scanners in url list Each URL carry out Hole Detection.The format of each URL is according to access information position and access mode in url list It is different and different, such as parameter in the URL that has only includes textual parameters, and the parameter in some URL is in addition to including text Shape parameter also includes digital shape parameter, and in embodiment of the disclosure, it needs to be changed the digital shape parameter in URL, And it whether there is in the detection Business Logic of the response message according to corresponding to the URL containing different digital shape parameter and go beyond one's commission in parallel Loophole, therefore the URL comprising digital shape parameter can be screened from url list as the first access comprising target component Location.
It in one embodiment of the present disclosure, can after obtaining the first access address comprising target component in url list To construct first network request according to first access address.When constructing first network request, can include according in URL Agreement is constructed, such as first network request can be HTTP request, can be HTTPS request, etc., and the disclosure is implemented Example is not specifically limited in this embodiment.In order to keep the technical solution of the disclosure more clear, hereafter will using HTTP request as network request into Row explanation.
In step S220, network communication services are called, according to the first response message of first network request.
In one embodiment of the present disclosure, the first HTTP request is constructed according to the first access address comprising target component Afterwards, vulnerability scanners can call network communication services, according to the first response message of first network request.The network is logical Telecommunications services correspond to a network communication module, and the first HTTP request can be sent to the network communication module by vulnerability scanners, when After network communication module receives the first HTTP request, the first HTTP request is sent to server, and receive server and return The first response message corresponding with the first HTTP request returned;Then the first response message can be back to by network communication module Vulnerability scanners.
In step S230, target component is modified, to form the second access address for including modified target component, and The second network request is constructed according to the second access address.
In one embodiment of the present disclosure, for loophole of going beyond one's commission in parallel, user can be by changing in access address Parameter obtains the information of other users, therefore in order to judge whether there is loophole of going beyond one's commission in parallel, can be in the first access address Target component modify, to obtain the second access address, and then according to the corresponding response message of the first access address and The corresponding response message of two access address judges whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, can be based on target component when modifying target component, increasing adds deduct Few default value, such as target component are 100, in modification, can on the basis of 100 plus or minus one, add 2 or subtract 2, etc. Deng.In order to detect whether there is loophole of going beyond one's commission in parallel, target component can repeatedly be modified, detecting multiple includes different ginsengs Whether response message acquired in several URL is identical, such as gradually subtracts 1 for target component 100, is respectively to obtain target component 100,99,98 ... 0 when the corresponding response message of access address, and by response message corresponding to original object parameter 100 Response message corresponding with each modified target component is compared, and according to comparison result judge whether there is it is parallel more Weigh loophole.
In step S240, network communication services are called, to obtain the second response message according to the second network request.
In one embodiment of the present disclosure, after having modified target component and obtaining the second access address, vulnerability scanners The second network request can be constructed according to the second access address, since the difference of the second access address and the first access address only exists In the change of target component, protocol type therein is simultaneously had not been changed, therefore the type of the second network request and first network are requested Type it is identical, such as be all HTTP request;Then vulnerability scanners can call network communication services, according to the second network The second response message of request.Specifically, the second HTTP request is sent to network communication module by vulnerability scanners;Then net The second HTTP request received is sent to server by network communication module, and receive server return with the second HTTP request Corresponding second response message;Second response message is back to vulnerability scanners by last network communication module, so that loophole is swept It retouches device and parallel loophole of going beyond one's commission is detected with the second response message according to the first response message.
In step s 250, parallel loophole of going beyond one's commission is judged whether there is with the second response message according to the first response message.
In one embodiment of the present disclosure, a rules administration module can be set in terminal device 101, wherein storing There are the detected rule of one or more corresponding different type loopholes, after obtaining the first response message and the second response message, leakage Hole scanner can extract corresponding judgment rule according to the type of loophole to be detected from rules administration module, and according to judgement Rule handles the first response message and the second response message, and then is judged whether there is according to processing result and gone beyond one's commission in parallel Loophole.It is worth noting that, the detected rule in rules administration module is all the rule set write by tactful personnel, and rule The maintenance and reparation of management module are realized by tactful personnel.
In one embodiment of the present disclosure, judge whether there is in parallel go beyond one's commission loophole when, can be with calling rule management The first judgment rule is serviced and extracts, with parallel with the progress of the first judgment rule according to the first response message, the second response message It goes beyond one's commission the detection of loophole, wherein first judgment rule includes that content compares and content-length compares.Fig. 3 shows a kind of inspection The flow diagram for loophole of going beyond one's commission in parallel is surveyed, the method for loophole includes at least step S301- as shown in figure 3, detection is gone beyond one's commission in parallel S303, specifically:
In step S301, the content of the first response message is compared with the content of the second response message.
In one embodiment of the present disclosure, the content of response message is corresponding with network request, such as when user browses News website and when clicking certain headline, response message is the corresponding news content of the headline;It is purchased when user logs in When object platform inquires order information, response message is the information such as order number, order detail;Etc..In order to determine target component Modification whether have an impact to the content of response message, and then can obtained in judgement business with the presence or absence of going beyond one's commission loophole in parallel After taking the first response message and the second response message, the content of response message is compared, and is sentenced according to comparison result It is disconnected.
In step s 302, if the content of the first response message is identical as the content of the second response message, determine not deposit In loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, it is carried out in the content of content and the second response message to the first response message When comparison, each character in the first response message can be compared with each character in the second response message, if All characters in first response message are identical as all characters in the second response message, then the content of the first response message with The content of second response message is identical.The corresponding access address containing different target parameter, the response message received is identical, says The modification of bright target component does not influence the response message of acquisition, further relates to corresponding the first access comprising target component There is no loopholes of going beyond one's commission in parallel for the business of location.
In step S303, if the content of the first response message is different from the content of the second response message, according to first The content-length of response message judges whether there is parallel loophole of going beyond one's commission with the content-length of the second response message.
In one embodiment of the present disclosure, when the content of the first response message is different from the content of the second response message When, illustrate that the modification of target component has an impact to the response message of acquisition, but can not clearly correspond to the comprising target component There is loophole of going beyond one's commission in parallel in the business of one access address, for example, if user is the in browsing news, comprising target component Corresponding first response message of one access address is the news of first health class, after modifying target component, includes target after modification Corresponding second response message of second access address of parameter is the news of first political situation of the time class, the first response message and the second response Information is entirely different, but news belongs to public information, and any user can browse, there is no in parallel go beyond one's commission the case where, because This, can not be clearly with the presence or absence of leakage of going beyond one's commission in parallel in the content difference of the content and the second response message of the first response message Hole needs further to detect.
Go beyond one's commission loophole in parallel to further detect, can the content-length of information according to response detected, it is specific and Speech, user, which wants to go beyond one's commission, obtains the sensitive information of other users, if going beyond one's commission success, the content-length of response message will not It differs greatly, therefore can be judged according to the content-length of the first response message and the content-length of the second response message. Step S303 further comprises leak detection method shown in Fig. 4 of going beyond one's commission in parallel, as shown in figure 4, the detection method includes at least Step S401-S404, specifically:
In step S401, the content-length of the content-length of the first response message and the second response message is made into ratio, with Obtain a target ratio.
In one embodiment of the present disclosure, if going beyond one's commission success, user will obtain the same type information of other users, example If user gets its order number in shopping platform according to the first access address, after modifying target component, visited according to second Ask that address gets order number of the other users in the shopping platform, then the length of the two order numbers may be equal, It may differ by one two, but according only to the parallel loophole of going beyond one's commission of the whether equal detection of content-length, may there is the feelings of missing inspection Condition, so in order to improve the precision of Hole Detection and comprehensive, it can be by the content-length of the first response message and the second sound It answers the content-length of information to make ratio, to obtain target ratio, and loophole of going beyond one's commission in parallel is judged whether there is according to target ratio.
In step S402, target ratio is compared with preset threshold.
In one embodiment of the present disclosure, if going beyond one's commission success, the content-length of the first response message and second The equal length of response message or close to equal, that is to say, that, will not be very big even if there is difference, therefore can be set one compared with Small preset threshold, by the way that the preset threshold compared with target ratio, to be judged whether there is to loophole of going beyond one's commission in parallel.Specifically, The preset threshold can be set to 1.5,2 etc., naturally it is also possible to be set as other values, the embodiment of the present disclosure is not done this specifically It limits.
In step S403, if target ratio is less than the preset threshold, determine there is loophole of going beyond one's commission in parallel.
In step s 404, if target ratio is greater than or equal to the preset threshold, determine that there is no leakages of going beyond one's commission in parallel Hole.
In one embodiment of the present disclosure, target ratio is compared with preset threshold, if target ratio is less than in advance If threshold value, illustrate that the content-length of the first response message is close with the content-length of the second response message, based on the first response letter The content of breath is different from the content of the second response message, can determine that the corresponding business of the first access address has leakage of going beyond one's commission in parallel Hole;If target ratio is greater than or equal to preset threshold, illustrate the interior of the content-length of the first response message and the second response message It is larger to hold length difference, thus may determine that there is no loopholes of going beyond one's commission in parallel for the corresponding business of the first access address.For example, Party A-subscriber is according to its available original order number for buying commodity on shopping website of the first access address, first access Include target component in location: sub-id=8, party A-subscriber modify the target component in the first access address, after obtaining modification Target component are as follows: then sub-id=10 re-starts visit according to the second access address comprising modified target component It asks, obtains a new order number, original order number and new order number are compared, if the content of the two is different, still The content-length of the two is identical, illustrates that the second access address has been directed toward order number of another user on the shopping website, party A-subscriber The sensitive information of other users is obtained by modifying target component, and then can be determined in the Business Logic of the shopping website In the presence of loophole of going beyond one's commission in parallel;If the content of the two is different, and the content-length of the two also differs greatly, and illustrates that party A-subscriber is logical It crosses modification target component and the sensitive information of other users has not been obtained, and then can determine the Business Logic of the shopping website not In the presence of loophole of going beyond one's commission in parallel, in the case of content-length differs larger, corresponding second response message of the second access address is logical It is often the prompt informations such as " no access authority " or " mistake ".
In one embodiment of the present disclosure, when user carries out network resource accession, each website, browser can be in users User data, i.e. cookie are stored in terminal, for distinguishing user identity, carrying out session tracking, when user logs in next time When, so that it may the user information in cookie is called, improves and logs in efficiency.Usually obtain user sensitive information the page must be Under user's logging state, if being stored with cookie in terminal device 101, even if user log off, but in weight When new opening Website page, terminal device 101 may call cookie automatically, so that user is still with the state of login user It accesses to website, is difficult to detect whether there is loophole of going beyond one's commission in parallel in this way, therefore in order to reduce rate of false alarm, Ke Yixian The cookie being locally stored is deleted, the target component in the first access address is then modified, includes modified target to be formed The third access address of parameter, then calls network communication services, obtains third response message according to third access address.Its In, the target component in third access address is identical as the target component in the second access address, is obtaining third response message Afterwards, the second response message can be compared with third response message, judges whether there is loophole of going beyond one's commission in parallel.
When the second response message to be compared with third response message, can be compared according to default judgment rule Compared with, specifically, can with calling rule management service and extract the second judgment rule, with according to the second response message, third response Information loophole of going beyond one's commission parallel with the detection of the second judgment rule.Second judgment rule includes that content compares, and it is flat that Fig. 5 shows detection The flow diagram of capable loophole of going beyond one's commission, as shown in figure 5, responding the content of the second response message and third in step S501 The content of information is compared;In step S502, if the content of the second response message is identical as the content of third response message, Then determine that there is no loopholes of going beyond one's commission in parallel;In step S503, if the content of the second response message and third response message is interior Appearance is not identical, then determines there is loophole of going beyond one's commission in parallel.Wherein method and content comparison method phase shown in Fig. 3 that content compares Together, details are not described herein for the embodiment of the present disclosure.
Deleting cookie can guarantee that third response message is obtained under no logging state, if the second response message Content it is identical as the content of third response message, illustrate there is no going beyond one's commission loophole in parallel, such as news/bulletin page class Public information also can normally be accessed under no logging state;If the content of the second response message is interior with third response message Appearance is not identical, and illustrating Business Logic, there may be loopholes of going beyond one's commission in parallel.
In one embodiment of the present disclosure, in order to further determine whether to have loophole of going beyond one's commission in parallel, so that user can It, can be according to default judgment rule to the first response message and the second response message with the sensitive information for obtaining other users of going beyond one's commission In sensitive information be compared.Specifically, third judgment rule, the third can therefrom be extracted with calling rule management service It include the corresponding preset field of sensitive information, such as cell-phone number, identification card number, QQ number, mailbox, address, name in judgment rule Etc., then according to the first response message, the detection of the second response message loophole of going beyond one's commission parallel with the progress of third judgment rule.
Fig. 6 shows the flow diagram of the parallel loophole of going beyond one's commission of detection, the side of loophole as shown in fig. 6, detection is gone beyond one's commission in parallel Method includes at least step S601- step S604, specifically:
In step s 601, the first object in the first response message is extracted according to the preset field in third judgment rule The second target information in information and the second response message.
In an exemplary embodiment of the disclosure, in order to the sensitive information and the second response message in the first response message In sensitive information be compared, need to extract required sensitive information from the first response message and the second response message, lead to The all corresponding specifically title of normal sensitive information, such as: cell-phone number 134XXXX5678, it is desirable to obtain specific cell-phone number and just need Matched and searched is carried out according to this title of cell-phone number.
Fig. 7 shows the flow diagram for obtaining first object information and the second target information, as shown in fig. 7, in step In S701, preset field is matched with all fields in the first response message, and preset field is responded with second All fields in information are matched;In step S702, when in the first response message exist and the matched mesh of preset field When marking-up section, information corresponding with aiming field in the first response message is extracted, and will information conduct corresponding with aiming field First object information;In step S703, when there is aiming field matched with preset field in the second response message, extract Information corresponding with aiming field in second response message, and will information corresponding with aiming field as the second target information.
In step S602, first object information and the second target information are compared;
In one embodiment of the present disclosure, after obtaining first object information and the second target information, can by the two into Row compares, and determines whether there is loophole of going beyond one's commission in parallel according to comparison result.
In step S603, if first object information is identical as the second target information, determine that there is no leakages of going beyond one's commission in parallel Hole;
In step s 604, if first object information and the second target information be not identical, determine there is leakage of going beyond one's commission in parallel Hole.
In one embodiment of the present disclosure, when first object information is identical as the second target information, illustrate user simultaneously It does not go beyond one's commission and obtains the sensitive information of other users, such as the user of corresponding user-id=100, sensitive information are as follows: cell-phone number 13456789012, the user of user-id=101, sensitive information or cell-phone number 13456789012 are corresponded to, illustrates to modify mesh Mark parameter does not influence the content of response message, and user will not be obtained the sensitive of other users by modification target component and be believed Breath, because loophole of going beyond one's commission in parallel may be not present;When first object information and when the second target information difference, illustrate that user goes beyond one's commission acquisition The sensitive information of other users, such as the user of corresponding user-id=100, sensitive information are as follows: cell-phone number 13456789012, The user of corresponding user-id=101, sensitive information are as follows: cell-phone number 15678901234 illustrates that modifying target component believes response The content of breath has an impact, and user can obtain the sensitive information of other users by modification target component, thus there is parallel get over Weigh loophole.
In one embodiment of the present disclosure, when in URL there are when multiple digital shape parameters, can be one by one to each number It include customer parameter in go beyond one's commission in parallel leak detection method, such as an order URL in the shape parameter application embodiment of the present disclosure User-id, parameter shipping-id is sent, then first can repeatedly be modified user-id, according to original user parameter Judge the URL with the presence or absence of parallel loophole of going beyond one's commission with the corresponding returned content of modified parameter every time, if it is decided that it is not present, It can continue repeatedly to modify shipping-id, and be sent corresponding to parameter and each modified parameter according to original Returned content judge the URL with the presence or absence of going beyond one's commission loophole in parallel.
In one embodiment of the present disclosure, determine there is leakage of going beyond one's commission in parallel in Business Logic according to the embodiment of the present disclosure It, can be by vulnerability scanners by vulnerability information, as there is the first access address of loophole of going beyond one's commission in parallel, corresponding target behind hole Parameter etc. is sent to server and is saved, in case targetedly being repaired when later maintenance.
In one embodiment of the present disclosure, loophole of going beyond one's commission in parallel can be detected by multiple contrast judgement processes, improved The detection efficiency and precision of parallel loophole of going beyond one's commission, Fig. 8 shows the flow diagram of the parallel loophole of going beyond one's commission of detection, such as Fig. 8 institute Show: in step S801, according to the first access address building first network request comprising target component, and according to first network The first response message of request;In step S802, target component is modified, according to second comprising modified target component Access address constructs the second network request, and obtains the second response message according to the second network request;In step S803, removal Cookie constructs third network request according to the third access address comprising modified target component, and according to third network Request third response message;In step S804, the content of the first response message and the content of the second response message are judged It is whether identical;In step S805, when the content of the first response message is identical as the content of the second response message, judgement is not deposited In loophole of going beyond one's commission in parallel;In step S806, when the content of the content of the first response message and the second response message is not identical, Judge whether content-length/second response message content-length of the first response message is less than preset threshold;In step S807 In, when the content-length of the first response message/second response message content-length is greater than or equal to preset threshold, determine not In the presence of loophole of going beyond one's commission in parallel;In step S808, when content-length/second response message content-length of the first response message When less than preset threshold, whether the content of the content and third response message that judge the second response message is identical;In step S809 In, when the content of the second response message is identical with the content of third response message, determine that there is no loopholes of going beyond one's commission in parallel;In step In rapid S810, when the content of the content of the second response message and third response message is not identical, judge in the first response message Sensitive information and the sensitive information in the second response message it is whether identical;In step S811, when in the first response message When sensitive information is identical as the sensitive information in the second response message, determine that there is no loopholes of going beyond one's commission in parallel;In step S812, When the sensitive information in the sensitive information and the second response message in the first response message is not identical, determines to exist and go beyond one's commission in parallel Loophole.
It is worth noting that being responded in the process that above-mentioned detection goes beyond one's commission loophole in parallel to the second response message and third The step of content of information is compared can compare with to the first response message and the sensitive information in the second response message Pair step exchange, i.e., when the content-length of the first response message/second response message content-length is less than default threshold When value, judge whether the sensitive information in the first response message and the sensitive information in the second response message are identical;When the first sound When answering the sensitive information in information identical as the sensitive information in the second response message, determine that there is no loopholes of going beyond one's commission in parallel;When When the sensitive information in sensitive information and the second response message in first response message is not identical, the second response message is judged Whether the content of content and third response message is identical;When the content of the second response message is identical with the content of third response message When, determine that there is no loopholes of going beyond one's commission in parallel;When the content of the content of the second response message and third response message is not identical, sentence It is fixed to there is loophole of going beyond one's commission in parallel.
In the embodiment of the present disclosure in parallel go beyond one's commission leak detection method can by modification access address in target component, According to the parallel loophole of going beyond one's commission of the detection of response message corresponding to the access address comprising different target parameter, and gone by comparison Fall cookie and do not remove the content of the response message of cookie and compare the content of sensitive information in response message, compensates for Vulnerability scanners reduce rate of false alarm to the shortcoming on the inspection policies for loophole of going beyond one's commission in parallel, improve loophole of going beyond one's commission in parallel Detection efficiency and accuracy rate improve the safety of user sensitive information, and further the user experience is improved.
The Installation practice of the disclosure introduced below can be used for executing the leakage of going beyond one's commission in parallel in disclosure above-described embodiment Hole detection method.For those undisclosed details in the apparatus embodiments, the above-mentioned loophole of going beyond one's commission in parallel of the disclosure is please referred to The embodiment of detection method.
Fig. 9 diagrammatically illustrates the block diagram of the Hole Detection device of going beyond one's commission in parallel of one embodiment according to the disclosure.
Referring to shown in Fig. 9, according to the Hole Detection device 900 of going beyond one's commission in parallel of one embodiment of the disclosure, comprising: first Request building module 901, the first information obtain module 902, second request building module 903,904 and of the second data obtaining module Hole Detection of going beyond one's commission module 905.
Specifically, the first request building module 901, for obtaining the first access address comprising target component, and according to The first access address building first network request;The first information obtains module 902, for calling network communication services, with According to first response message of first network request;Second request building module 903, for modifying the target ginseng Number to form the second access address for including modified target component, and constructs the second net according to second access address Network request;Second data obtaining module 904, for calling the network communication services, to be obtained according to second network request Take the second response message;Hole Detection of going beyond one's commission module 905, for according to first response message and second response message Judge whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, Hole Detection of going beyond one's commission module 905 includes first detection unit, for calling rule Then management service to extract the first judgment rule, and is sentenced according to the first response message, the second response message and the first judgment rule It is disconnected to whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, the first judgment rule includes that content compares and content-length comparison;Before being based on Scheme is stated, first detection unit includes: comparing unit, for by the content of the content of the first response message and the second response message It is compared;First judging unit when identical as the content of the second response message for the content in the first response message, determines There is no loopholes of going beyond one's commission in parallel;Second judging unit, the content for content and the second response message in the first response message When different, parallel go beyond one's commission is judged whether there is with the content-length of the second response message according to the content-length of the first response message Loophole.
In one embodiment of the present disclosure, the second judging unit be configured that by the content-length of the first response message with The content-length of second response message makees ratio, to obtain a target ratio;Target ratio is compared with preset threshold;If mesh It marks ratio and is less than preset threshold, then determine there is loophole of going beyond one's commission in parallel;If target ratio is greater than or equal to preset threshold, determine There is no loopholes of going beyond one's commission in parallel.
In one embodiment of the present disclosure, target component is digital shape parameter;Second request building module 903 configures Are as follows: based on target component, default value is increased or decreased, to modify to target component.
In one embodiment of the present disclosure, it goes beyond one's commission in parallel Hole Detection device 900 further include: third request building mould Block includes the third access address of modified target component with formation for deleting the user information being locally stored, and according to Third access address constructs third network request;Third data obtaining module, for calling network communication services, according to third Network request obtains third response message;It goes beyond one's commission loophole judgment module, for according to the second response message and third response message Judge whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, loophole judgment module 905 of going beyond one's commission includes: second detection unit, for calling Regulation management service, to extract the second judgment rule, and according to the second response message, third response message and the second judgment rule Judge whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, the second judgment rule includes that content compares;Second detection unit be configured that by The content of second response message is compared with the content of third response message;If the content of the second response message and third respond The content of information is identical, then determines that there is no loopholes of going beyond one's commission in parallel;If the content of the second response message and third response message Content is not identical, then determines there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, it goes beyond one's commission in parallel Hole Detection device 900 further include: third detection unit is used In calling rule management service, to extract third judgment rule, to be sentenced according to the first response message, the second response message and third Disconnected rule judges whether there is loophole of going beyond one's commission in parallel.
In one embodiment of the present disclosure, third judgment rule includes that target information compares;Third detection unit includes: Information extraction unit, for extracting the first object information in the first response message according to the preset field in third judgment rule With the second target information in the second response message;Information comparison unit is used for first object information and the second target information It is compared;Third judging unit is got over for determining when first object information is identical as the second target information there is no parallel Weigh loophole;4th judging unit is gone beyond one's commission in parallel for determining to exist when first object information and the second target information is not identical Loophole.
In one embodiment of the present disclosure, be configured that will be in preset field and the first response message for information extraction unit All fields matched, and preset field is matched with all fields in the second response message;When the first sound When answering in information in the presence of aiming field matched with preset field, letter corresponding with aiming field in the first response message is extracted Breath, and will information corresponding with aiming field as first object information;When in the second response message exist and preset field When the aiming field matched, information corresponding with aiming field in the second response message is extracted, and will letter corresponding with aiming field Breath is used as the second target information.
In one embodiment of the present disclosure, go beyond one's commission in parallel Hole Detection device 900 further include: preserving module, for It determines and exists when going beyond one's commission loophole in parallel, will be present and go beyond one's commission the first access address of loophole in parallel and corresponding target component is sent to Server is saved.
Figure 10 shows the structural schematic diagram for being suitable for the computer system for the electronic equipment for being used to realize the embodiment of the present disclosure.
It should be noted that the computer system 1000 of the electronic equipment shown in Figure 10 is only an example, it should not be to this The function and use scope of open embodiment bring any restrictions.
As shown in Figure 10, computer system 1000 include central processing unit (Central Processing Unit, CPU) 1001, it can be according to the program being stored in read-only memory (Read-Only Memory, ROM) 1002 or from depositing It stores up the program that part 1008 is loaded into random access storage device (Random Access Memory, RAM) 1003 and executes each Kind movement appropriate and processing, realize method for processing video frequency described in above-described embodiment.In RAM 1003, also it is stored with and is Various programs and data needed for system operation.CPU 1001, ROM 1002 and RAM 1003 are connected with each other by bus 1004. Input/output (Input/Output, I/O) interface 1005 is also connected to bus 1004.
I/O interface 1005 is connected to lower component: the importation 1006 including keyboard, mouse etc.;Including such as cathode Ray tube (Cathode Ray Tube, CRT), liquid crystal display (Liquid Crystal Display, LCD) etc. and loudspeaking The output par, c 1007 of device etc.;Storage section 1008 including hard disk etc.;And including such as LAN (Local Area Network, local area network) card, modem etc. network interface card communications portion 1009.Communications portion 1009 is via such as The network of internet executes communication process.Driver 1010 is also connected to I/O interface 1005 as needed.Detachable media 1011, such as disk, CD, magneto-optic disk, semiconductor memory etc., are mounted on as needed on driver 1010, in order to It is mounted into storage section 1008 as needed from the computer program read thereon.
Particularly, in accordance with an embodiment of the present disclosure, it may be implemented as computer below with reference to the process of flow chart description Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be carried on computer-readable medium On computer program, which includes the program code for method shown in execution flow chart.In such reality It applies in example, which can be downloaded and installed from network by communications portion 1009, and/or from detachable media 1011 are mounted.When the computer program is executed by central processing unit (CPU) 1001, executes in the system of the disclosure and limit Various functions.
It should be noted that computer-readable medium shown in the embodiment of the present disclosure can be computer-readable signal media Or computer readable storage medium either the two any combination.Computer readable storage medium for example can be with System, device or the device of --- but being not limited to --- electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, or it is any more than Combination.The more specific example of computer readable storage medium can include but is not limited to: have one or more conducting wires Electrical connection, portable computer diskette, hard disk, random access storage device (RAM), read-only memory (ROM), erasable type are programmable Read-only memory (Erasable Programmable Read Only Memory, EPROM), flash memory, optical fiber, Portable, compact Disk read-only memory (Compact Disc Read-Only Memory, CD-ROM), light storage device, magnetic memory device or The above-mentioned any appropriate combination of person.In the disclosure, computer readable storage medium can be it is any include or storage program Tangible medium, which can be commanded execution system, device or device use or in connection.And in this public affairs In opening, computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry computer-readable program code.The data-signal of this propagation can take various forms, including but not limited to Electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be computer-readable Any computer-readable medium other than storage medium, the computer-readable medium can send, propagate or transmit for by Instruction execution system, device or device use or program in connection.The journey for including on computer-readable medium Sequence code can transmit with any suitable medium, including but not limited to: wireless, wired etc. or above-mentioned is any appropriate Combination.
Flow chart and block diagram in attached drawing are illustrated according to the system of the various embodiments of the disclosure, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of above-mentioned module, program segment or code include one or more Executable instruction for implementing the specified logical function.It should also be noted that in some implementations as replacements, institute in box The function of mark can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are practical On can be basically executed in parallel, they can also be executed in the opposite order sometimes, and this depends on the function involved.Also it wants It is noted that the combination of each box in block diagram or flow chart and the box in block diagram or flow chart, can use and execute rule The dedicated hardware based systems of fixed functions or operations is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
Being described in unit involved in the embodiment of the present disclosure can be realized by way of software, can also be by hard The mode of part realizes that described unit also can be set in the processor.Wherein, the title of these units is in certain situation Under do not constitute restriction to the unit itself.
As on the other hand, the disclosure additionally provides a kind of computer-readable medium, which can be Included in electronic equipment described in above-described embodiment;It is also possible to individualism, and without in the supplying electronic equipment. Above-mentioned computer-readable medium carries one or more program, when the electronics is set by one for said one or multiple programs When standby execution, so that the electronic equipment realizes method described in above-described embodiment.
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, touch control terminal or network equipment etc.) is executed according to disclosure embodiment Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.

Claims (15)

1. a kind of leak detection method of going beyond one's commission in parallel characterized by comprising
The first access address comprising target component is obtained, and first network request is constructed according to first access address;
Network communication services are called, according to first response message of first network request;
The target component is modified, to form the second access address for including modified target component, and according to described second Access address constructs the second network request;
The network communication services are called, to obtain the second response message according to second network request;
Parallel loophole of going beyond one's commission is judged whether there is with second response message according to first response message.
2. leak detection method according to claim 1 of going beyond one's commission in parallel, according to first response message and described second Response message judges whether there is loophole of going beyond one's commission in parallel, comprising:
Calling rule management service simultaneously extracts the first judgment rule, and is believed according to first response message, second response Breath judges whether there is the parallel loophole of going beyond one's commission with first judgment rule.
3. according to claim 2 go beyond one's commission leak detection method in parallel, which is characterized in that first judgment rule includes Content compares and content-length compares;
It is described that institute is judged whether there is according to first response message, second response message and first judgment rule State loophole of going beyond one's commission in parallel, comprising:
The content of first response message is compared with the content of second response message;
If the content of first response message is identical as the content of second response message, determine that there is no described parallel It goes beyond one's commission loophole;
If the content of first response message is different from the content of second response message, believed according to first response The content-length of breath judges whether there is the parallel loophole of going beyond one's commission with the content-length of second response message.
4. leak detection method according to claim 3 of going beyond one's commission in parallel, which is characterized in that described according to first response The content-length of information judges whether there is the parallel loophole of going beyond one's commission with the content-length of second response message, comprising:
The content-length of the content-length of first response message and second response message is made into ratio, to obtain a target Ratio;
The target ratio is compared with preset threshold;
If the target ratio is less than the preset threshold, determine that there are the loopholes of going beyond one's commission in parallel;
If the target ratio is greater than or equal to the preset threshold, determine that there is no the loopholes of going beyond one's commission in parallel.
5. leak detection method according to claim 1 of going beyond one's commission in parallel, which is characterized in that the target component is numeric type Parameter;
The modification target component, comprising:
Based on the target component, default value is increased or decreased, to modify to the target component.
6. leak detection method according to claim 1 of going beyond one's commission in parallel is obtaining the second response according to the second network request After information, the method also includes:
The user information being locally stored is deleted, to form the third access address for including the modified target component, and root Third network request is constructed according to the third access address;
The network communication services are called, to obtain third response message according to the third network request;
The parallel loophole of going beyond one's commission is judged whether there is with the third response message according to second response message.
7. leak detection method according to claim 6 of going beyond one's commission in parallel, described according to second response message and described Third response message judges whether there is the loophole of going beyond one's commission in parallel, comprising:
Calling rule management service simultaneously extracts the second judgment rule, and according to second response message, third response letter Breath judges whether there is the parallel loophole of going beyond one's commission with second judgment rule.
8. according to claim 7 go beyond one's commission leak detection method in parallel, which is characterized in that second judgment rule includes Content compares;
It is described that institute is judged whether there is according to second response message, the third response message and second judgment rule State loophole of going beyond one's commission in parallel, comprising:
The content of second response message is compared with the content of the third response message;
If the content of second response message is identical as the content of the third response message, determine that there is no described parallel It goes beyond one's commission loophole;
If the content of second response message is not identical as the content of the third response message, determine that there are described parallel It goes beyond one's commission loophole.
9. leak detection method according to claim 1 of going beyond one's commission in parallel, which is characterized in that the method also includes:
Calling rule management service simultaneously extracts third judgment rule, to be believed according to first response message, second response Breath judges whether there is the parallel loophole of going beyond one's commission with the third judgment rule.
10. leak detection method according to claim 9 of going beyond one's commission in parallel, which is characterized in that the third judgment rule packet Include target information comparison;
It is described that institute is judged whether there is according to first response message, second response message and the third judgment rule State loophole of going beyond one's commission in parallel, comprising:
First object information and the institute in first response message are extracted according to the preset field in the third judgment rule State the second target information in the second response message;
The first object information and second target information are compared;
If the first object information is identical as second target information, determine that there is no the loopholes of going beyond one's commission in parallel;
If the first object information and second target information be not identical, determine that there are the loopholes of going beyond one's commission in parallel.
11. leak detection method according to claim 10 of going beyond one's commission in parallel, which is characterized in that described to be sentenced according to the third Preset field in disconnected rule is extracted in first object information and second response message in first response message Second target information, comprising:
The preset field is matched with all fields in first response message, and by the preset field with All fields in second response message are matched;
When there is aiming field matched with the preset field in first response message, the first response letter is extracted Information corresponding with the aiming field in breath, and information corresponding with the aiming field is believed as the first object Breath;
When there is aiming field matched with the preset field in second response message, the second response letter is extracted Information corresponding with the aiming field in breath, and information corresponding with the aiming field is believed as second target Breath.
12. leak detection method according to claim 1 of going beyond one's commission in parallel, which is characterized in that the method also includes:
Determine there are it is described go beyond one's commission in parallel loophole when, first access address of loophole and corresponding of going beyond one's commission in parallel will be present Target component is sent to server and is saved.
13. a kind of Hole Detection device of going beyond one's commission in parallel characterized by comprising
First request building module, for obtaining the first access address comprising target component, and according to first access Location constructs first network request;
The first information obtains module, for calling network communication services, to be responded according to the first network request first Information;
Second request building module, for modifying the target component, to form the second visit comprising modified target component It asks address, and the second network request is constructed according to second access address;
Second data obtaining module, for calling the network communication services, to obtain second according to second network request Response message;
Hole Detection of going beyond one's commission module, it is flat for being judged whether there is according to first response message and second response message Capable loophole of going beyond one's commission.
14. a kind of computer equipment characterized by comprising
Processor;And
Memory is stored with computer-readable instruction on the memory, and the computer-readable instruction is held by the processor The leak detection method of going beyond one's commission in parallel as described in any one of claims 1 to 12 is realized when row.
15. a kind of electronic equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs, when one or more of programs are by one or more of processing When device executes, so that one or more of processors realize the leakage of going beyond one's commission in parallel as described in any one of claims 1 to 12 Hole detection method.
CN201910741372.2A 2019-08-12 2019-08-12 Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment Pending CN110489966A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910741372.2A CN110489966A (en) 2019-08-12 2019-08-12 Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910741372.2A CN110489966A (en) 2019-08-12 2019-08-12 Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110489966A true CN110489966A (en) 2019-11-22

Family

ID=68550583

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910741372.2A Pending CN110489966A (en) 2019-08-12 2019-08-12 Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110489966A (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995684A (en) * 2019-11-26 2020-04-10 西安四叶草信息技术有限公司 Vulnerability detection method and device
CN111125718A (en) * 2019-12-24 2020-05-08 北京三快在线科技有限公司 Unauthorized vulnerability detection method, device, equipment and storage medium
CN111209565A (en) * 2020-01-08 2020-05-29 招商银行股份有限公司 Horizontal override vulnerability detection method, equipment and computer readable storage medium
CN111274585A (en) * 2020-01-19 2020-06-12 福建省农村信用社联合社 Method, device, equipment and medium for detecting unauthorized vulnerability of Web application
CN111416811A (en) * 2020-03-16 2020-07-14 携程旅游信息技术(上海)有限公司 Unauthorized vulnerability detection method, system, equipment and storage medium
CN111427774A (en) * 2020-03-09 2020-07-17 深圳开源互联网安全技术有限公司 Request parameter modification method and system for application program test case
CN111756771A (en) * 2020-07-21 2020-10-09 腾讯科技(深圳)有限公司 Detection method and device for cross-site scripting attack
CN112464250A (en) * 2020-12-15 2021-03-09 光通天下网络科技股份有限公司 Method, device and medium for automatically detecting unauthorized vulnerability
CN113411333A (en) * 2021-06-18 2021-09-17 杭州安恒信息技术股份有限公司 Unauthorized access vulnerability detection method, device, system and storage medium
CN113779585A (en) * 2021-01-04 2021-12-10 北京沃东天骏信息技术有限公司 Unauthorized vulnerability detection method and device
US11429510B2 (en) 2020-12-21 2022-08-30 Coupang Corp. Electronic apparatus for verifying code and method thereof
CN115348117A (en) * 2022-10-20 2022-11-15 闪捷信息科技有限公司 User level unauthorized behavior determination method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241292A (en) * 2016-03-28 2017-10-10 阿里巴巴集团控股有限公司 Leak detection method and device
CN107294919A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of detection method and device of horizontal authority leak
CN107577949A (en) * 2017-09-05 2018-01-12 郑州云海信息技术有限公司 A kind of Web goes beyond one's commission leak detection method and system
CN108769070A (en) * 2018-06-30 2018-11-06 平安科技(深圳)有限公司 One kind is gone beyond one's commission leak detection method and device
CN109446819A (en) * 2018-10-30 2019-03-08 北京知道创宇信息技术有限公司 It goes beyond one's commission leak detection method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107241292A (en) * 2016-03-28 2017-10-10 阿里巴巴集团控股有限公司 Leak detection method and device
CN107294919A (en) * 2016-03-31 2017-10-24 阿里巴巴集团控股有限公司 A kind of detection method and device of horizontal authority leak
CN107577949A (en) * 2017-09-05 2018-01-12 郑州云海信息技术有限公司 A kind of Web goes beyond one's commission leak detection method and system
CN108769070A (en) * 2018-06-30 2018-11-06 平安科技(深圳)有限公司 One kind is gone beyond one's commission leak detection method and device
CN109446819A (en) * 2018-10-30 2019-03-08 北京知道创宇信息技术有限公司 It goes beyond one's commission leak detection method and device

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110995684B (en) * 2019-11-26 2022-06-28 西安四叶草信息技术有限公司 Vulnerability detection method and device
CN110995684A (en) * 2019-11-26 2020-04-10 西安四叶草信息技术有限公司 Vulnerability detection method and device
CN111125718A (en) * 2019-12-24 2020-05-08 北京三快在线科技有限公司 Unauthorized vulnerability detection method, device, equipment and storage medium
CN111209565A (en) * 2020-01-08 2020-05-29 招商银行股份有限公司 Horizontal override vulnerability detection method, equipment and computer readable storage medium
CN111209565B (en) * 2020-01-08 2022-12-23 招商银行股份有限公司 Horizontal override vulnerability detection method, equipment and computer readable storage medium
CN111274585A (en) * 2020-01-19 2020-06-12 福建省农村信用社联合社 Method, device, equipment and medium for detecting unauthorized vulnerability of Web application
CN111274585B (en) * 2020-01-19 2022-08-16 福建省农村信用社联合社 Method, device, equipment and medium for detecting unauthorized vulnerability of Web application
CN111427774A (en) * 2020-03-09 2020-07-17 深圳开源互联网安全技术有限公司 Request parameter modification method and system for application program test case
CN111416811A (en) * 2020-03-16 2020-07-14 携程旅游信息技术(上海)有限公司 Unauthorized vulnerability detection method, system, equipment and storage medium
CN111416811B (en) * 2020-03-16 2022-07-22 携程旅游信息技术(上海)有限公司 Unauthorized vulnerability detection method, system, equipment and storage medium
CN111756771A (en) * 2020-07-21 2020-10-09 腾讯科技(深圳)有限公司 Detection method and device for cross-site scripting attack
CN111756771B (en) * 2020-07-21 2023-04-18 腾讯科技(深圳)有限公司 Detection method and device for cross-site scripting attack
CN112464250A (en) * 2020-12-15 2021-03-09 光通天下网络科技股份有限公司 Method, device and medium for automatically detecting unauthorized vulnerability
US11429510B2 (en) 2020-12-21 2022-08-30 Coupang Corp. Electronic apparatus for verifying code and method thereof
CN113779585A (en) * 2021-01-04 2021-12-10 北京沃东天骏信息技术有限公司 Unauthorized vulnerability detection method and device
CN113411333A (en) * 2021-06-18 2021-09-17 杭州安恒信息技术股份有限公司 Unauthorized access vulnerability detection method, device, system and storage medium
CN115348117A (en) * 2022-10-20 2022-11-15 闪捷信息科技有限公司 User level unauthorized behavior determination method and device

Similar Documents

Publication Publication Date Title
CN110489966A (en) Parallel go beyond one's commission leak detection method, device, storage medium and electronic equipment
US10257199B2 (en) Online privacy management system with enhanced automatic information detection
AU2021229246B2 (en) Dynamic code management
US10834130B2 (en) Detection of malicious attempts to access a decoy database object based on connection type
KR102355973B1 (en) Apparatus and method for detecting smishing message
CN107634947A (en) Limitation malice logs in or the method and apparatus of registration
CN110113315A (en) A kind of processing method and equipment of business datum
US20110252150A1 (en) System and Method for Processing User Information
WO2014151539A1 (en) Online privacy management
US11916946B2 (en) Systems and methods for network traffic analysis
CN113904828B (en) Method, apparatus, device, medium and program product for detecting sensitive information of interface
US11134062B1 (en) Isolating and disabling unauthorized applications
US9967217B2 (en) Method and device for displaying instant messaging messages
US9674160B2 (en) Methods for anti-fraud masking of a universal resource indentifier (“URI”)
CN115460059A (en) Risk early warning method and device
KR20240057538A (en) System and method for rewarding to user based on message detection
CN114640494A (en) Fraud identification method, device, storage medium and gateway equipment
CN114928532A (en) Method, device, equipment and storage medium for generating alarm message
CN115835214A (en) Processing method, device, equipment and medium for 5G network user plane communication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination