当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0107913

漏洞标题:东莞某公共资源交易网可getshell

相关厂商:东莞某公共资源交易网

漏洞作者: 路人甲

提交时间:2015-04-16 16:25

修复时间:2015-06-01 16:34

公开时间:2015-06-01 16:34

漏洞类型:命令执行

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(广东省信息安全测评中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-16: 细节已通知厂商并且等待厂商处理中
2015-04-17: 厂商已经确认,细节仅向厂商公开
2015-04-27: 细节向核心白帽子及相关领域专家公开
2015-05-07: 细节向普通白帽子公开
2015-05-17: 细节向实习白帽子公开
2015-06-01: 细节向公众公开

简要描述:

东莞某公共资源交易网可getshell

详细说明:

网站:http://120.86.191.171/system/homeset/homeset!displayOtherById.action

1.png

漏洞证明:

Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:5432 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN
tcp 0 0 0.0.0.0:10086 0.0.0.0:* LISTEN
tcp 0 0 127.0.0.1:5432 127.0.0.1:34425 ESTABLISHED
tcp 0 0 127.0.0.1:5432 127.0.0.1:34426 ESTABLISHED
tcp 0 0 127.0.0.1:5432 127.0.0.1:34427 ESTABLISHED
tcp 0 0 10.145.195.171:56211 10.0.3.1:10086 ESTABLISHED
tcp 0 0 127.0.0.1:5432 127.0.0.1:34428 ESTABLISHED
tcp 0 0 127.0.0.1:5432 127.0.0.1:34424 ESTABLISHED
tcp 0 0 :::80 :::* LISTEN
tcp 0 0 :::22 :::* LISTEN
tcp 0 0 :::5432 :::* LISTEN
tcp 0 0 ::1:25 :::* LISTEN
tcp 0 0 ::ffff:127.0.0.1:8005 :::* LISTEN
tcp 0 0 :::8009 :::* LISTEN
tcp 0 0 ::ffff:127.0.0.1:34427 ::ffff:127.0.0.1:5432 ESTABLISHED
tcp 0 0 ::ffff:10.145.195.171:80 ::ffff:111.20.19.178:42682 FIN_WAIT2
tcp 0 0 ::ffff:127.0.0.1:34425 ::ffff:127.0.0.1:5432 ESTABLISHED
tcp 0 0 ::ffff:127.0.0.1:34426 ::ffff:127.0.0.1:5432 ESTABLISHED
tcp 0 0 ::ffff:127.0.0.1:34428 ::ffff:127.0.0.1:5432 ESTABLISHED
tcp 0 0 ::ffff:127.0.0.1:34424 ::ffff:127.0.0.1:5432 ESTABLISHED
tcp 0 0 ::ffff:10.145.195.171:80 ::ffff:111.20.19.178:42511 ESTABLISHED
tcp 0 0 ::ffff:10.145.195.171:80 ::ffff:66.249.64.163:48907 TIME_WAIT
udp 0 0 ::1:51133 ::1:51133 ESTABLISHED
Active UNIX domain sockets (servers and established)
Proto RefCnt Flags Type State I-Node Path
unix 2 [ ACC ] STREAM LISTENING 2109187418 /tmp/.s.PGSQL.5432
unix 2 [ ACC ] SEQPACKET LISTENING 12390 /var/run/gTunnel/LB-MONITORIMPL_i-CC537B6A
unix 2 [ ACC ] SEQPACKET LISTENING 24623 /var/run/gTunnel/LB-MONITORIMPL_i-CC537B6A
unix 9 [ ] DGRAM 11056 /dev/log
unix 2 [ ACC ] STREAM LISTENING 8790 @/com/ubuntu/upstart
unix 2 [ ACC ] STREAM LISTENING 11135 /var/run/acpid.socket
unix 2 [ ACC ] STREAM LISTENING 11675 public/cleanup
unix 2 [ ACC ] STREAM LISTENING 11682 private/tlsmgr
unix 2 [ ACC ] STREAM LISTENING 11686 private/rewrite
unix 2 [ ACC ] STREAM LISTENING 11690 private/bounce
unix 2 [ ACC ] STREAM LISTENING 11694 private/defer
unix 2 [ ACC ] STREAM LISTENING 11698 private/trace
unix 2 [ ACC ] STREAM LISTENING 11702 private/verify
unix 2 [ ACC ] STREAM LISTENING 11706 public/flush
unix 2 [ ACC ] STREAM LISTENING 11710 private/proxymap
unix 2 [ ACC ] STREAM LISTENING 11714 private/proxywrite
unix 2 [ ACC ] STREAM LISTENING 11718 private/smtp
unix 2 [ ACC ] STREAM LISTENING 11722 private/relay
unix 2 [ ACC ] STREAM LISTENING 11726 public/showq
unix 2 [ ACC ] STREAM LISTENING 11730 private/error
unix 2 [ ACC ] STREAM LISTENING 11734 private/retry

修复方案:

补丁

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-04-17 16:32

厂商回复:

非常感谢您的报告。
报告中的问题已确认并复现.
影响的数据:高
攻击成本:低
造成影响:高
综合评级为:高,rank:10
正在联系相关网站管理单位处置。

最新状态:

暂无