当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0110296

漏洞标题:聘宝Mongodb+Redis配置不当信息泄露集合<五>

相关厂商:pinbot.me

漏洞作者: 爱上平顶山

提交时间:2015-04-28 10:57

修复时间:2015-06-13 10:34

公开时间:2015-06-13 10:34

漏洞类型:重要敏感信息泄露

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-04-28: 细节已通知厂商并且等待厂商处理中
2015-04-29: 厂商已经确认,细节仅向厂商公开
2015-05-09: 细节向核心白帽子及相关领域专家公开
2015-05-19: 细节向普通白帽子公开
2015-05-29: 细节向实习白帽子公开
2015-06-13: 细节向公众公开

简要描述:

...

详细说明:

聘宝
1、Mongodb

http://112.124.23.240:28017/
http://115.28.222.146:28017/
dev hopper201313


0.jpg


1.jpg


2、redis

root@kail:~/redis-2.8.19/src# ./redis-cli -h 121.40.106.215
121.40.106.215:6379> info
# Server
redis_version:2.8.19
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:1ff65346083e56ee
redis_mode:standalone
os:Linux 3.13.0-32-generic x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.8.2
process_id:1
run_id:8f7d473b215b652632d089ecdf9c2edbfd68494a
tcp_port:6379
uptime_in_seconds:6891560
uptime_in_days:79
hz:10
lru_clock:3866773
config_file:/etc/redis/redis.conf
# Clients
connected_clients:19
client_longest_output_list:0
client_biggest_input_buf:0
blocked_clients:0
# Memory
used_memory:1264104
used_memory_human:1.21M
used_memory_rss:9080832
used_memory_peak:1794160
used_memory_peak_human:1.71M
used_memory_lua:35840
mem_fragmentation_ratio:7.18
mem_allocator:jemalloc-3.6.0
# Persistence
loading:0
rdb_changes_since_last_save:0
rdb_bgsave_in_progress:0
rdb_last_save_time:1429928660
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
# Stats
total_connections_received:4710
total_commands_processed:1510285
instantaneous_ops_per_sec:0
total_net_input_bytes:763576720
total_net_output_bytes:2741477552
instantaneous_input_kbps:0.00
instantaneous_output_kbps:0.00
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:141834
evicted_keys:0
keyspace_hits:1139624
keyspace_misses:132713
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:265
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:6367.73
used_cpu_user:3874.02
used_cpu_sys_children:17.20
used_cpu_user_children:8.99
# Keyspace
db0:keys=248,expires=248,avg_ttl=661193005
db1:keys=4,expires=0,avg_ttl=0
db6:keys=1,expires=0,avg_ttl=0
db7:keys=4,expires=0,avg_ttl=0
121.40.106.215:6379>


0.jpg


ok

漏洞证明:

···

修复方案:

···

版权声明:转载请注明来源 爱上平顶山@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-04-29 10:32

厂商回复:

感谢爱上平顶山的检测,我们这边已经实施修复方案了,

最新状态:

暂无