乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-11-27: 细节已通知厂商并且等待厂商处理中 2015-11-27: 厂商已经确认,细节仅向厂商公开 2015-12-07: 细节向核心白帽子及相关领域专家公开 2015-12-17: 细节向普通白帽子公开 2015-12-27: 细节向实习白帽子公开 2016-01-11: 细节向公众公开
rt
在统一身份认证处可利用[工号+888888]爆破:http://idstar.xmu.edu.cn/amserver/UI/Login
可获得大量可用账号以2010100130/888888为例可登录信息门户http://i.xmu.edu.cn
在http://inc2.xmu.edu.cn/handbook/public/24/看到vpn设置可直接利用上述账号登录内网漫游(只扫了些弱密码)摄像头admin/12345:
172.16.240.3172.16.240.6172.16.240.9172.16.240.12172.16.240.15172.16.240.18172.16.240.21172.16.240.24172.16.240.30172.16.240.33172.16.240.36172.16.240.39172.19.204.38172.19.240.66172.19.240.67172.19.240.69172.19.240.70172.19.240.71172.19.240.72172.19.240.73172.19.240.74172.19.240.75172.19.240.76172.19.240.77172.19.240.78172.19.240.81172.19.240.82172.19.240.83172.19.240.84172.19.240.86172.19.240.90172.19.240.91172.19.240.92172.19.240.93172.19.240.96172.19.240.97172.19.240.98172.19.240.99172.19.240.100172.19.240.102172.19.240.103172.19.240.104172.19.240.133172.19.240.137172.19.240.139172.19.240.145172.19.240.147172.19.240.149172.19.240.151172.19.240.153172.19.240.155172.19.240.157172.19.240.159172.19.240.161172.19.240.163172.19.240.165172.19.240.167
数据库服务器 密码:admin
172.16.221.10:8080
tomcat
[*]Cracking Start...[+] Found 172.17.247.8:8080 --> admin : admin[+] Found 172.17.247.9:8080 --> admin : admin[+] Found 172.17.247.12:8080 --> admin : admin[+] Found 172.17.247.17:8080 --> admin : admin[+] Found 172.17.247.18:8080 --> admin : admin[+] Found 172.17.247.19:8080 --> admin : admin[+] Found 172.17.247.20:8080 --> admin : admin[+] Found 172.17.247.24:8080 --> admin : admin[+] Found 172.17.247.25:8080 --> admin : admin[+] Found 172.17.247.26:8080 --> admin : admin[+] Found 172.17.247.27:8080 --> admin : admin[+] Found 172.17.247.28:8080 --> admin : admin[+] Found 172.17.247.41:8080 --> admin : admin[+] Found 172.17.247.42:8080 --> admin : admin[+] Found 172.17.247.46:8080 --> admin : admin[+] Found 172.17.247.47:8080 --> admin : admin[+] Found 172.17.247.49:8080 --> admin : admin[+] Found 172.17.247.50:8080 --> admin : admin[+] Found 172.17.247.52:8080 --> admin : admin[+] Found 172.17.247.53:8080 --> admin : admin[+] Found 172.17.247.54:8080 --> admin : admin[+] Found 172.17.247.56:8080 --> admin : admin[+] Found 172.17.247.57:8080 --> admin : admin[+] Found 172.17.247.58:8080 --> admin : admin[+] Found 172.17.247.72:8080 --> admin : admin[+] Found 172.17.247.73:8080 --> admin : admin[+] Found 172.17.247.74:8080 --> admin : admin[+] Found 172.17.247.75:8080 --> admin : admin[+] Found 172.17.247.76:8080 --> admin : admin[+] Found 172.17.247.82:8080 --> admin : admin[+] Found 172.17.247.92:8080 --> admin : admin[+] Found 172.17.247.93:8080 --> admin : admin[+] Found 172.17.247.103:8080 --> admin : admin[+] Found 172.17.247.104:8080 --> admin : admin[+] Found 172.17.247.105:8080 --> admin : admin[+] Found 172.17.247.107:8080 --> admin : admin[+] Found 172.17.247.109:8080 --> admin : admin[+] Found 172.17.247.110:8080 --> admin : admin[+] Found 172.17.247.111:8080 --> admin : admin
监控中心
172.19.241.18
加强管理
危害等级:高
漏洞Rank:20
确认时间:2015-11-27 14:11
通知有关单位整改
2016-01-10:感谢反馈。使用的是金智教育的统一身份认证系统,已与厂商一起完成以下操作: 已强制修改用户的弱密码。 已通知用户强密码要求。 已对登陆页面加上认证错误多次后永久性返回密码错误的功能。