当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0108098

漏洞标题:某基金会站点getshell同服均可执行

相关厂商:基金会

漏洞作者: 路人甲

提交时间:2015-04-17 12:18

修复时间:2015-04-22 12:20

公开时间:2015-04-22 12:20

漏洞类型:命令执行

危害等级:中

自评Rank:10

漏洞状态:已交由第三方合作机构(广东省信息安全测评中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-17: 细节已通知厂商并且等待厂商处理中
2015-04-22: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

某基金会站点getshell同服均可执行

详细说明:

网站:广东省红绿灯交通基金官网
http://hy.hldf.org.cn/common/registerAction!regRedir.action
站点存在Struts2命令执行可getshell

1.png


旁站权限均可执行

漏洞证明:

[NetPayClient]
PGID=999999999999999
pubkeyS=393939393939393939393939393939000000000030303031B4FEFC274BEBC3F0BAB180679B916EA13A04C6637A06177EFB1C68505F01E2813FFA4DD07FBBE1FEF02934704BCBF126D18EAAC135EA74263C59094A2281FECF281904C59E469C57C8D82864A473D6AB9849402E067F96DF92709EA776CC049845C208E90E1500BFD3A52C952C59ABA2CAC62EC16ADF2E3B5A30AABA661CFFC70000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010001013A5A77825E50CC
pubkey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


smsServer = svr2.xtsj001.com
smsPort = 9918
smsUser = fangku
smsPassword = 443835
qxt.url=http://219.238.160.81/interface/interface.asp
qxt.username=super8
qxt.password=123456555
httpproxy.host=fw.super8.com.cn
httpproxy.port=8080
httpproxy.username=crs.test
httpproxy.password=abc.123
秘钥密码:pJ86Vb
商户号:Z0035
密钥别名:Z0035

修复方案:

补丁+配置

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-04-22 12:20

厂商回复:

漏洞Rank:8 (WooYun评价)

最新状态:

暂无