赛迪网Cacti弱口令

漏洞详情

披露状态:

2014-05-14: 细节已通知厂商并且等待厂商处理中
2014-05-19: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

赛迪网Cacti弱口令

详细说明:

http://115.182.21.54/

账户名密码admin/admin







Apache Environment
Variable Value
HTTP_HOST 115.182.21.54
HTTP_CONNECTION keep-alive
HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.66 Safari/537.36 LBBROWSER
HTTP_REFERER http://115.182.21.54/utilities.php
HTTP_ACCEPT_ENCODING gzip,deflate,sdch
HTTP_ACCEPT_LANGUAGE zh-CN,zh;q=0.8
HTTP_COOKIE Cacti=cc59ae3aa587fcb59462884f789a7fac; Hm_lvt_3d143f0a07b6487f65609d8411e5464f=1400067930; Hm_lpvt_3d143f0a07b6487f65609d8411e5464f=1400067985
PATH /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/root/bin
LD_LIBRARY_PATH /usr/local/apache/lib
SERVER_SIGNATURE no value
SERVER_SOFTWARE Apache/2.4.6 (Unix)
SERVER_NAME 115.182.21.54
SERVER_ADDR 115.182.21.54
SERVER_PORT 80
REMOTE_ADDR 36.248.194.119
DOCUMENT_ROOT /usr/local/apache/htdocs/cacti
REQUEST_SCHEME http
CONTEXT_PREFIX no value
CONTEXT_DOCUMENT_ROOT /usr/local/apache/htdocs/cacti
SERVER_ADMIN tanglp@ccidnet.com
SCRIPT_FILENAME /usr/local/apache/htdocs/cacti/utilities.php
REMOTE_PORT 1579
GATEWAY_INTERFACE CGI/1.1
SERVER_PROTOCOL HTTP/1.1
REQUEST_METHOD GET
QUERY_STRING action=view_tech
REQUEST_URI /utilities.php?action=view_tech
SCRIPT_NAME /utilities.php

漏洞证明:

222.jpg

修复方案:

版权声明:转载请注明来源 鸟云厂商@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2014-05-14 19:54

厂商回复:

最新状态:

暂无


漏洞评价: