当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0159920

漏洞标题:aol.com configuration file disclosure

相关厂商:aol.com

漏洞作者: 路人甲

提交时间:2015-12-10 12:35

修复时间:2016-01-23 15:16

公开时间:2016-01-23 15:16

漏洞类型:敏感信息泄露

危害等级:中

自评Rank:6

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-11: 厂商已经确认,细节仅向厂商公开
2015-12-21: 细节向核心白帽子及相关领域专家公开
2015-12-31: 细节向普通白帽子公开
2016-01-10: 细节向实习白帽子公开
2016-01-23: 细节向公众公开

简要描述:

aol.com configuration file disclosure, mysql user password leaked

详细说明:

aol.com configuration file disclosure

http://videosection.video.aol.com/application/configs/application.ini

漏洞证明:

[production]
phpSettings.display_startup_errors = "0"
phpSettings.display_errors = "0"
includePaths.library = APPLICATION_PATH"/../library"
bootstrap.path = APPLICATION_PATH"/Bootstrap.php"
bootstrap.class = "Bootstrap"
appnamespace = "Application"
resources.frontController.controllerDirectory = APPLICATION_PATH"/controllers"
resources.frontController.params.displayExceptions = "0"
resources.db.adapter = "pdo_mysql"
resources.db.params.dbname = "aolvs"
resources.db.params.host = "fmvhubdb-l01.video.aol.com"
resources.db.params.username = "aolvs_rw"
resources.db.params.password = "knewDBA4u"
resources.db.params.isdefaulttableadapter = true
constants.DEBUG_MODE = false
constants.SERVER_PATH = "http://videosection.video.aol.com/"
constants.CACHE_PATH = APPLICATION_PATH"/../cache"
;constants.THUMBS_PATH = APPLICATION_PATH"/../thumbnails"
;constants.STATIC_PATH = APPLICATION_PATH"/../static"
constants.THUMBS_PATH = "/fmvhubNAS/thumbnails"
constants.STATIC_PATH = "/fmvhubNAS/static"
...

修复方案:

No direct HTTP access to this .ini file

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-12-11 00:04

厂商回复:

最新状态:

暂无