当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0150037

漏洞标题:中国联通某关键认证服务器群存在命令执行漏洞

相关厂商:中国联通

漏洞作者: 染血の雪

提交时间:2015-10-28 11:25

修复时间:2015-12-14 15:28

公开时间:2015-12-14 15:28

漏洞类型:系统/服务补丁不及时

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-28: 细节已通知厂商并且等待厂商处理中
2015-10-30: 厂商已经确认,细节仅向厂商公开
2015-11-09: 细节向核心白帽子及相关领域专家公开
2015-11-19: 细节向普通白帽子公开
2015-11-29: 细节向实习白帽子公开
2015-12-14: 细节向公众公开

简要描述:

用某些人说的话讲:影响上亿用户

详细说明:

**.**.**.**下有多个s2-16执行点但都是同一个Struts就不一一列举了。

https://**.**.**.**/oauth2/genqr


经过多次执行发现返回的结果不一样,结果发现是一个有负载均衡分发的服务器群,内有至少20余太服务器,都存在同一漏洞。
该服务器群是中国联通网上营业厅的同一认证系统,被漏洞恶意利用可能产生巨大影响。

SQ(OTM[EE`6HX2@DCH)1LF0.png


部分主机列表:

Linux tongyirenzheng-app20_42_12 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-15 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-16 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-17 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-19 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-20 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-22 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-24 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-25 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-26 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux tongyirenzheng-app20-42-27 2.6.32-358.el6.x86_64 #1 SMP Tue Jan 29 11:47:41 EST 2013 x86_64 x86_64 x86_64 GNU/Linux
Linux BJ-XHM-P3-06-HS22-KX-L595 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux BJ-XHM-P3-06-HS22-KX-L647 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l3-m910-ingtw-01 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l3-m910-ingtw-02 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l3-m910-ingtw-04 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l4-m910-ingtw-06 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l4-m910-ingtw-07 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-upay-xhm-4f03-l4-m910-ingtw-08 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux
Linux bj-uac-xhm-4f03-p7-hs22-app-01 2.6.18-194.el5 #1 SMP Tue Mar 16 21:52:39 EDT 2010 x86_64 x86_64 x86_64 GNU/Linux


服务器基本是两种:

Red Hat Enterprise Linux Server release 5.5 (Tikanga)
Kernel \r on an \m
Unauthorized access is prohibited,All activities may be monitored.
Red Hat Enterprise Linux Server release 6.4 (Santiago)
Kernel \r on an \m

漏洞证明:

5B$JU]GX%IU$M]]~)D)7~F1.png


@DF]EVM7MH8(R2KFNU2FTL8.png


修复方案:

不应该发生的漏洞就不多说什么了,运维自己反思~

版权声明:转载请注明来源 染血の雪@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-10-30 15:27

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT向中国联通集团公司通报,由其后续协调网站管理部门处置.

最新状态:

暂无