当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-032537

漏洞标题:顺丰某支付敏感服务器存在命令执行漏洞

相关厂商:顺丰速运

漏洞作者: sc.ivan

提交时间:2013-07-28 10:13

修复时间:2013-09-11 10:14

公开时间:2013-09-11 10:14

漏洞类型:命令执行

危害等级:低

自评Rank:5

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-07-28: 细节已通知厂商并且等待厂商处理中
2013-07-29: 厂商已经确认,细节仅向厂商公开
2013-08-08: 细节向核心白帽子及相关领域专家公开
2013-08-18: 细节向普通白帽子公开
2013-08-28: 细节向实习白帽子公开
2013-09-11: 细节向公众公开

简要描述:

老的struct2不过网站好像没在用了,还是提交一下吧。

详细说明:

老的struct2不过网站好像没在用了,还是提交一下吧。

漏洞证明:

Target: https://www.sf-pay.com/sfp.payment/findpwd/tofindPwd.html
Whoami: root
WebPath: /opt/jboss/jboss-as/server/sfb1/./tmp/deploy/tmp5781527267633045328sfp.payment-exp.war
OS.Name: Linux
OS.Version: 2.6.18-164.el5
Java.Home: /opt/jdk1.5.0_17/jre
Java.Version: 1.5.0_17
OS.arch: amd64
User.Name: root
User.Home: /root
User.Dir: /opt/jboss/jboss-as/logs
Java.Class.Path: /opt/jboss/jboss-as/bin/run.jar
Java.IO.Tmpdir: /tmp
=============================================================================
<connection-url>jdbc:oracle:thin:@(description=(ADDRESS_LIST =(LOAD_BALANCE=OFF)(FAILOVER=ON)(ADDRESS = (PROTOCOL = TCP)(HOST = 10.0.30.153)(PORT = 1527))(ADDRESS = (PROTOCOL = TCP)(HOST = 10.0.30.155)(PORT = 1527)))(CONNECT_DATA =(SERVER = DEDICATED)(SERVICE_NAME = sfpdb)(failover_mode=(type=select)(method=basic))))</connection-url>
<driver-class>oracle.jdbc.driver.OracleDriver</driver-class>
<user-name>sfpay</user-name>
<password>sfp_db2011</password>
<exception-sorter-class-name>org.jboss.resource.adapter.jdbc.vendor.OracleExceptionSorter</exception-sorter-class-name>
<check-valid-connection-sql>select 1 from dual</check-valid-connection-sql>
<metadata>
<type-mapping>Oracle10g</type-mapping>
</metadata>
<min-pool-size>50</min-pool-size>
<max-pool-size>400</max-pool-size>
<blocking-timeout-millis>5000</blocking-timeout-millis>
<idle-timeout-minutes>2</idle-timeout-minutes>
</local-tx-datasource>
------------------------------------

<user-name>sfecp</user-name>
<password>sfecp20091c6c</password>

----------------------------------------

<user-name>sfecp_client</user-name>
<password>client20101y5m</password>
-------------------------------------
# Do not remove the following line, or various programs
# that require network functionality will fail.
127.0.0.1 localhost.localdomain localhost
#::1 localhost6.localdomain6 localhost6
10.0.16.13 sfpay1
10.0.16.14 sfecp1
10.0.16.15 sfecp2
10.0.16.17 sfpay2
10.0.16.18 sfpay3
10.0.16.20 hkecp1
10.0.16.82 www.sf-ec.com
10.0.16.80 www.sf-pay.com
10.0.16.16 hkecp2
10.0.16.25 sfecp3
10.0.15.22 mail.sf-express.com
10.0.16.35 sfb1
10.0.16.36 sfb2

修复方案:

还是升下吧

版权声明:转载请注明来源 sc.ivan@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2013-07-29 09:16

厂商回复:

感谢sc.ivan的提醒,已通知处理中。

最新状态:

暂无