遨游某服务器配置问题导致部分数据库备份文件泄漏主站可shell

漏洞详情

披露状态:

2014-03-31: 细节已通知厂商并且等待厂商处理中
2014-04-01: 厂商已经确认,细节仅向厂商公开
2014-04-11: 细节向核心白帽子及相关领域专家公开
2014-04-21: 细节向普通白帽子公开
2014-05-01: 细节向实习白帽子公开
2014-05-15: 细节向公众公开

简要描述:

已经SHELL

详细说明:

RSYNC配置失误导致主站被入侵,

20140328094715.png

漏洞证明:

www_maxthon_20140324.sql

INSERT INTO `members` VALUES (1,'admin_gwgl','9cae13b21cbd63f81c260aab781d7e98',1,'1303894759'),(7,'hr','4b34ed23315eab10d631151aef01a1cf',3,'1306907985'),(8,'cg','8dc7b8c3e82b13455f3baf10753cb9a3',2,'1307521429'),(9,'sc','e3197eaebd2fa12a44ac67b97e6cd000',2,'1309158387'),(10,'sxf','fb58c61b5c9085c94b2918aa672e0486',1,'1309158387'),(11,'hanxuewei','d8000a69edd5c994befdaa4fcc42b28b',2,'1328063671'),(12,'tianzhongjia','4ea058f906a445140ae2ac0c3dc97a76',2,'1328063922'),(13,'maliyan','ebeefba483b88bc67dfc8e87b9316af3',4,'1331800765'),(14,'mengjian','76419c58730d9f35de7ac538c2fd6737',2,'1345533116'),(15,'lihuiwu','1bbd886460827015e5d605ed44252251',2,'1345533116'),(16,'mx4_admin','1bbd886460827015e5d605ed44252251',1,'1303894759'),(17,'cuikai','8ebf5258068fcdf41b05a0aa4d2ca3cf',2,'1357538251'),(18,'zhangning','31a9dc40a9b19272bd53a06756b6603c',2,'1357605982'),(19,'cuiwei','101bc02983933249f93b3018499dc9ad',2,'1357608211'),(20,'liangshuang','74651f3a84b996b5999b95bea62342c6',3,'1372136136'),(21,'test','098f6bcd4621d373cade4e832627b4f6',2,'1376629844'),(22,'sunjing','0be7e1c39b786883260dc7b82fe64c76',2,'1378798419'),(23,'zhoujianguang','e5f0d7818d1b09c11cc3d7d53d667a46',2,'1393397505');



后台地址admin/login.php

内网RSYNC数据库备份

rsync 10.0.8.71::10.0.8.171/

测试下载部分数据,经过验证确为13年备份数据,测试结束下载数据已经删除

修复方案:

版权声明:转载请注明来源 孩子他爸@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2014-04-01 13:21

厂商回复:

早期配置错误, 一段时间前就修了的.

最新状态:

2014-04-01:早就修了的.


漏洞评价: