当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-063901

漏洞标题:凤凰网配置失误导致监控邮箱信息及 企业通讯录泄露

相关厂商:凤凰网

漏洞作者: 孩子他爸

提交时间:2014-06-10 18:36

修复时间:2014-07-25 18:44

公开时间:2014-07-25 18:44

漏洞类型:系统/服务运维配置不当

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-06-10: 细节已通知厂商并且等待厂商处理中
2014-06-11: 厂商已经确认,细节仅向厂商公开
2014-06-21: 细节向核心白帽子及相关领域专家公开
2014-07-01: 细节向普通白帽子公开
2014-07-11: 细节向实习白帽子公开
2014-07-25: 细节向公众公开

简要描述:

详细说明:

漏洞证明:

rsync 220.181.67.131::
mail_class.php
<?php
/**
*
* 每天检查一下前一天异常的情况
*/
require(dirname(__FILE__) . '/log.php' );
require(dirname(__FILE__) . '/mail_class.php' );
date_default_timezone_set('Asia/Chongqing');
require(dirname(__FILE__). "/PHPMailer/class.phpmailer.php");
runlog();
ob_start();
$tmp = read_data_from_db();
?>
<table width="100%" border="1">
<caption>
今日画图异常统计
</caption>
<tr>
<th scope="col">类型</th>
<th scope="col">数量</th>
<th scope="col">详情</th>
</tr>
<?php
foreach($tmp as $k => $v){
?>
<tr>
<td><?php echo $v['type'];?></td>
<td><?php echo $v['num'];?></td>
<td><a href="http://172.30.204.36/pic_monitor/list.php?type=<?php echo $v['type'];?>">详情》》</a></td>
</tr>
<?php }?>
</table>
<?
$mail = new PHPMailer();
$mail->CharSet = 'utf-8';
$mail->IsSMTP(); // set mailer to use SMTP
$mail->SMTPKeepAlive = true;
$mail->SMTPAuth = true;
$mail->Username = 'ucenter_project';
$mail->Password = '1qazXSW@';
$mail->Host = "mail.ifeng.com"; // SMTP server
$mail->From = "[email protected]";
$mail->FromName = "财经画图监控(".date("Y-m-d H:i:s").")";
$to_arr = array(
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
'[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]',
// '[email protected]'
);
foreach($to_arr as $one){
$mail->AddAddress($one);
}
$mail->IsHTML(true); // set email format to HTML
$mail->Subject = "财经画图监控(".date("Y-m-d H:i:s").")";
$mail->Body = ob_get_contents();
ob_end_clean();
if(!$mail->Send())
{
errlog('fatal error', "Mailer Error: " . $mail->ErrorInfo);
exit;
}
runlog();
function read_data_from_db(){
$link = mysql_connect('10.11.2.77:3306', 'monitor', 'm0nit0r');
if (!$link) {
errlog('fatal error', 'Could not connect: ' . mysql_error());
}
mysql_select_db("monitor");
$sql = "select type,count(*) as num from monitor where check_time>". (time()-24*3600)." group by type";
$result = mysql_query($sql);
$res = array();
while ($row = mysql_fetch_assoc($result)) {
$res[] = $row;
}
mysql_free_result($result);
mysql_close($link);
return $res;
}

?>

修复方案:

版权声明:转载请注明来源 孩子他爸@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2014-06-11 10:40

厂商回复:

非常非常感谢您对凤凰网信息安全的关注。

最新状态:

暂无