当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0126014

漏洞标题:车海网某服务未授权访问44万用户hash泄露

相关厂商:cncert国家互联网应急中心

漏洞作者: 路人甲

提交时间:2015-07-11 20:30

修复时间:2015-08-29 17:52

公开时间:2015-08-29 17:52

漏洞类型:系统/服务运维配置不当

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-07-11: 细节已通知厂商并且等待厂商处理中
2015-07-15: 厂商已经确认,细节仅向厂商公开
2015-07-25: 细节向核心白帽子及相关领域专家公开
2015-08-04: 细节向普通白帽子公开
2015-08-14: 细节向实习白帽子公开
2015-08-29: 细节向公众公开

简要描述:

RT

详细说明:

124.232.156.141 redis未设置口令

QQ截图20150710213132.png


redis_version:2.8.8
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:cd783d97535ce235
redis_mode:standalone
os:Linux 2.6.32-220.el6.x86_64 x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.4.7
process_id:29985
run_id:70b67921914bf3c55bd954ff5e79d634f6c9d1a9
tcp_port:6379
uptime_in_seconds:4601107
uptime_in_days:53
hz:10
lru_clock:10472005
config_file:/data1/terma/soft/redis-2.8.8/redis.conf
# Clients
connected_clients:61
client_longest_output_list:351
client_biggest_input_buf:0
blocked_clients:0
# Memory
used_memory:1123333864
used_memory_human:1.05G
used_memory_rss:1301876736
used_memory_peak:1294390120
used_memory_peak_human:1.21G
used_memory_lua:33792
mem_fragmentation_ratio:1.16
mem_allocator:jemalloc-3.2.0
# Persistence
loading:0
rdb_changes_since_last_save:954666174
rdb_bgsave_in_progress:0
rdb_last_save_time:1431934258
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:-1
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
# Stats
total_connections_received:153786
total_commands_processed:2205822709
instantaneous_ops_per_sec:0
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:4276537
evicted_keys:0
keyspace_hits:168305437
keyspace_misses:5798728
pubsub_channels:3
pubsub_patterns:0
latest_fork_usec:0
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:15118.22
used_cpu_user:21074.41
used_cpu_sys_children:0.00
used_cpu_user_children:0.00
# Keyspace
db0:keys=441514,expires=181413,avg_ttl=56425055


漏洞证明:

QQ截图20150710213349.png

修复方案:

设置密码

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:13

确认时间:2015-07-15 17:50

厂商回复:

暂未能建立与网站管理单位的直接处置渠道,待认领.

最新状态:

暂无