当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0135809

漏洞标题:金山KingGate防火墙存在默认配置不当可被控制

相关厂商:金山软件集团

漏洞作者: 路人甲

提交时间:2015-08-21 18:42

修复时间:2015-11-24 18:44

公开时间:2015-11-24 18:44

漏洞类型:默认配置不当

危害等级:高

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-21: 细节已通知厂商并且等待厂商处理中
2015-08-26: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放
2015-10-20: 细节向核心白帽子及相关领域专家公开
2015-10-30: 细节向普通白帽子公开
2015-11-09: 细节向实习白帽子公开
2015-11-24: 细节向公众公开

简要描述:

rt

详细说明:

由于KingGate防火墙使用zebra路由软件的,这是一款由Cisco自主开发的闭源路由器软件,默认开启2601端口,而且默认密码是zebra
案例:

金山新版
https://www.qh119.gov.cn/src/system/login.php?login_retry=true
https://115.239.246.102/src/system/login.php?login_retry=true
https://111.1.82.143/src/system/login.php?login_retry=true
https://220.173.107.90/src/system/login.php?login_retry=true
https://59.46.73.106/src/system/login.php?login_retry=true
https://www.xn--3dsz23cqb341isz0akob.com/src/system/login.php?login_retry=true
https://202.103.238.229/src/system/login.php?login_retry=true
金山旧版本
https://116.77.32.13:8443/src/system/login.php
https://116.77.32.3:8443/src/system/login.php
https://116.77.32.4:8443/src/system/login.php
https://222.179.180.74:8443/src/system/login.php
https://116.77.32.11:8443/src/system/login.php
https://210.21.231.102/src/system/login.php
https://116.77.32.12:8443/src/system/login.php
https://116.77.32.10:8443/src/system/login.php
https://116.77.32.2:8443/src/system/login.php
https://120.196.138.212:8443/src/system/login.php
https://218.93.17.154:8443/src/system/login.php
https://218.25.140.137:8443/src/system/login.php
https://124.93.200.105:8443/src/system/login.php
https://218.26.248.71/src/system/login.php
https://211.142.19.11/src/system/login.php
https://202.97.152.130/src/system/login.php
https://www.lt.lskjd.gov.cn/src/system/login.php
https://124.93.200.109:8443/src/system/login.php
https://218.26.24.146:8443/src/system/login.php
https://211.142.24.77:8443/src/system/login.php
https://124.93.200.108:8443/src/system/login.php
https://124.93.200.100:8443/src/system/login.php
https://110.249.216.198/src/system/login.php
https://hbsrfb.gov.cn/src/system/login.php
http://116.95.130.3/src/system/login.php
https://222.74.54.234:8443/src/system/login.php
https://222.74.54.234/src/system/login.php
https://116.95.130.3:8443/src/system/login.php
https://218.21.230.154:8443/src/system/login.php
https://218.26.1.75:8443/src/system/login.php
http://60.210.101.238/src/system/login.php
https://211.142.29.10/src/system/login.php
https://218.26.164.26/src/system/login.php
https://www.yucoffee.com/src/system/login.php
https://en.diyuan.cc/src/system/login.php
https://restartclub.com/src/system/login.php
https://58.22.6.39:8443/src/system/login.php
https://218.26.4.186/src/system/login.php
https://182.151.197.195/src/system/login.php
https://220.193.65.237/src/system/login.php
https://220.193.65.236/src/system/login.php
https://220.193.65.238/src/system/login.php
https://183.6.133.179/src/system/login.php
https://220.166.83.98/src/system/login.php
https://220.193.65.238:8443/src/system/login.php
https://222.169.100.142/src/system/login.php
https://182.151.197.195:8443/src/system/login.php
https://218.56.144.171/src/system/login.php
https://27.195.159.2/src/system/login.php
https://218.56.144.172/src/system/login.php
https://www.taaic.gov.cn/src/system/login.php
https://220.193.65.234:8443/src/system/login.php
https://www.gzzygts.com/src/system/login.php
https://www.zyhsj.com/src/system/login.php
https://58.22.6.40:8443/src/system/login.php
https://218.26.168.72/src/system/login.php
https://www.yczyzz.cn/src/system/login.php
https://218.26.96.71:8443/src/system/login.php
https://218.61.70.246:8443/src/system/login.php
https://222.33.40.27:8443/src/system/login.php
https://183.238.241.46:8443/src/system/login.php
https://61.138.108.74:8443/src/system/login.php
https://61.161.214.62/src/system/login.php
https://125.32.94.203:8443/src/system/login.php

漏洞证明:

aaaaaaaaaaaaaaaa111111111111111111111.jpg


aaaaaaaaaaaaaa22222222222222222222.jpg


aaaaaaaaaaaa333333333333333333333.jpg


aaaaaaaaaaaaa44444444444444444.jpg

修复方案:

可否修改密码?

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-11-24 18:44

厂商回复:

漏洞Rank:15 (WooYun评价)

最新状态:

暂无