当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0131579

漏洞标题:巨人网络某站svn信息泄露导致数据库信息泄露及部分cgi代码泄露

相关厂商:巨人网络

漏洞作者: 7dscan

提交时间:2015-08-04 16:07

修复时间:2015-09-19 21:10

公开时间:2015-09-19 21:10

漏洞类型:应用配置错误

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-04: 细节已通知厂商并且等待厂商处理中
2015-08-05: 厂商已经确认,细节仅向厂商公开
2015-08-15: 细节向核心白帽子及相关领域专家公开
2015-08-25: 细节向普通白帽子公开
2015-09-04: 细节向实习白帽子公开
2015-09-19: 细节向公众公开

简要描述:

巨人网络某站svn配置不当,信息泄露导致数据库信息泄露及部分cgi代码泄露

详细说明:

https://report.ztgame.com/.svn/entries 全部svn都开放

8
dir
1149
svn://10.10.102.179:443
svn://10.10.102.179:443
2012-11-26T11:10:57.887682Z
1149
xinjian
svn:special svn:externals svn:needs-lock
60056b49-ea59-4e7d-85f2-21d1f0434aab
exe
dir
write_session.php
file
2012-11-14T07:40:21.000000Z
8f1d1bf381ad35c5312f8c7ef683b7de
2012-11-14T07:39:33.470033Z
11
peng
tiaojian.php
file
2012-11-14T07:40:21.000000Z
40c518957ccd7270695f25ceb1ac9073
2012-11-14T07:39:33.470033Z
11
peng
scripts
dir
crontab
dir
temp.php
file
2012-11-14T07:40:21.000000Z
b4f5790443a4f2c9e093618d1ac86095
2012-11-14T07:39:33.470033Z
11
peng
login.php
file
2012-11-23T03:41:19.000000Z
0d972edc3e9c561582b9ebd90b960aeb
2012-11-23T03:41:18.336142Z
1037
peng
logout.php
file
2012-11-14T07:40:21.000000Z
48410106e001889bc2a0a58fb7e458f9
2012-11-14T07:39:33.470033Z
11
peng
list.php
file
2012-11-14T07:40:21.000000Z
220c8434d441fb99d224623349883c65
2012-11-14T07:39:33.470033Z
11
peng
hequ
dir
tiaojian1.php
file
2012-11-14T07:40:21.000000Z
f33c652917d035d03c7db81e75099a92
2012-11-14T07:39:33.470033Z
11
peng
test.php
file
2012-11-14T07:40:21.000000Z
97ab8bd2b04b4c07179fa62e5cef0f45
2012-11-14T07:39:33.470033Z
11
peng
images
dir
server
dir
log.php
file
2012-11-14T07:40:21.000000Z
2f2f8a527ef7bd6be307fd2d41ad6bec
2012-11-14T07:39:33.470033Z
11
peng
temp.html
file
2012-11-14T07:40:21.000000Z
e06972ffec21d73544bc7c3dfd9047b6
2012-11-14T07:39:33.470033Z
11
peng
game
dir
main.php
file
2012-11-14T07:40:21.000000Z
893e01d43a3240d81dc1c2f10419a24c
2012-11-14T07:39:33.470033Z
11
peng
web
dir
do_login.php
file
2012-11-15T04:07:31.000000Z
374ab9d93ae9ca97087287e9b279eadf
2012-11-15T04:07:30.791756Z
82
peng
liushi.php
file
2012-11-14T07:40:21.000000Z
471f823b10fba03274a9271777efa59b
2012-11-14T07:39:33.470033Z
11
peng
pub
dir
admin
dir
css
dir
sso.php
file
2012-11-14T07:40:21.000000Z
0538beab915c3ac6542d4baf2741b7b6
2012-11-14T07:39:33.470033Z
11
peng
main1.php
file
2012-11-14T07:40:21.000000Z
a9f242067ef2e46a602eac2d3fd67de7
2012-11-14T07:39:33.470033Z
11
peng
main2.php
file
2012-11-14T07:40:21.000000Z
4715d2e4c96e232034e20a2463635620
2012-11-14T07:39:33.470033Z
11
peng
index.php
file
2012-11-20T02:12:08.000000Z
d32779ea8800dd3d30c0fe5531921b7c
2012-11-20T02:12:07.369931Z
431
xinjian
stop2.php
file
2012-11-14T07:40:21.000000Z
bf4ab60f19d95cdc6f85f26cc1ff4a7c
2012-11-14T07:39:33.470033Z
11
peng
stop3.php
file
2012-11-14T07:40:21.000000Z
fa406b15a3f60093a078c17732246cff
2012-11-14T07:39:33.470033Z
11
peng
pengzhiwen.php
file
2012-11-14T07:40:21.000000Z
d3e81678553e90ead60184308cb24ff4
2012-11-14T07:39:33.470033Z
11
peng
ccs_web
dir
class
dir
webgame
dir
cli
dir
inc
dir
复件 login.php
file
2012-11-14T07:40:21.000000Z
071d8892b7d35fc0bbaabedfda76b534
2012-11-14T07:39:33.470033Z
11
peng
game.zip
file
2012-11-14T07:40:21.000000Z
73c126ca429308f6af98ed19b7b4cf65
2012-11-14T07:39:33.470033Z
11
peng
has-props
upload.php
file
2012-11-14T07:40:21.000000Z
4c47243f7b8c465839378515a62d5108
2012-11-14T07:39:33.470033Z
11
peng
stat
dir
stop.php
file
2012-11-14T07:40:21.000000Z
3c0442d1afd47f5a64a559de83cf832a
2012-11-14T07:39:33.470033Z
11
peng
login.html
file
2012-11-15T04:07:31.000000Z
d59f304ffcfc9e35e4bf10db06589f84
2012-11-15T04:07:30.791756Z
82
peng
crontab.php
file
2012-11-14T07:40:21.000000Z
e9b470c7b932d3da5d0ed95224c2106a
2012-11-14T07:39:33.470033Z
11
peng

漏洞证明:

https://report.ztgame.com/crontab.php

Array ( [LIST] => Array ( [0] => servername [1] => host [2] => username [3] => password ) [0] => Array ( [0] => allserver [1] => ip [2] => root [3] => h9k76GW4x9 ) [1] => Array ( [0] => allserver [1] => 10.10.102.179 [2] => U33X3pKH7Bczt34 [3] => WpndJOLS6PdlOA1caE7B ) [103] => Array ( [0] => allserver [1] => 10.10.102.103 [2] => report_user [3] => 123456 ) ) No such file or directory


各种数据库信息直接出来了。。。
https://report.ztgame.com/game.zip
还有个打包文件。。。

E3D$K1~JVC@W]9O{W$$G5GW.png

修复方案:

关闭,删除备份文件。

版权声明:转载请注明来源 7dscan@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2015-08-05 21:09

厂商回复:

已知悉,感谢

最新状态:

暂无