当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0139139

漏洞标题:欧朋某站redis未授权访问

相关厂商:欧朋浏览器

漏洞作者: 路人甲

提交时间:2015-09-15 12:36

修复时间:2015-10-30 12:58

公开时间:2015-10-30 12:58

漏洞类型:系统/服务运维配置不当

危害等级:低

自评Rank:3

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-09-15: 细节已通知厂商并且等待厂商处理中
2015-09-15: 厂商已经确认,细节仅向厂商公开
2015-09-25: 细节向核心白帽子及相关领域专家公开
2015-10-05: 细节向普通白帽子公开
2015-10-15: 细节向实习白帽子公开
2015-10-30: 细节向公众公开

简要描述:

感谢你的礼物

详细说明:

1.png


2.png


59.151.95.247:6379> info
# Server
redis_version:2.8.9
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:a16959dddb832cc8
redis_mode:standalone
os:Linux 3.2.0-4-amd64 x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.7.2
process_id:2027
run_id:c189108802aa74eb3f85b5f056b76809d2c04889
tcp_port:6379
uptime_in_seconds:21487156
uptime_in_days:248
hz:10
lru_clock:15335148
config_file:/etc/redis/6379.conf
# Clients
connected_clients:9
client_longest_output_list:0
client_biggest_input_buf:65
blocked_clients:0
# Memory
used_memory:982712
used_memory_human:959.68K
used_memory_rss:1462272
used_memory_peak:1072184
used_memory_peak_human:1.02M
used_memory_lua:33792
mem_fragmentation_ratio:1.49
mem_allocator:jemalloc-3.2.0
# Persistence
loading:0
rdb_changes_since_last_save:7
rdb_bgsave_in_progress:0
rdb_last_save_time:1441397860
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
# Stats
total_connections_received:823
total_commands_processed:25239094
instantaneous_ops_per_sec:0
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:2110224
evicted_keys:0
keyspace_hits:18748445
keyspace_misses:4379067
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:316
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:16250.48
used_cpu_user:7414.62
used_cpu_sys_children:0.05
used_cpu_user_children:0.01
# Keyspace
db0:keys=1,expires=1,avg_ttl=12982


redis未授权访问可导致任意文件写入
打包一处列目录
http://feedback.bj.oupeng.com/

3.png


4.png

漏洞证明:

...

修复方案:

运维

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2015-09-15 12:58

厂商回复:

你好,你是之前给我们报过漏洞的吗??请留下你的联系方式:

最新状态:

暂无