当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0160236

漏洞标题:美的供应链管理系统(正式环境)存在命令执行已getshell可内网漫游53台机器

相关厂商:midea.com

漏洞作者: 路人甲

提交时间:2015-12-11 10:55

修复时间:2016-01-23 15:16

公开时间:2016-01-23 15:16

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-11: 细节已通知厂商并且等待厂商处理中
2015-12-11: 厂商已经确认,细节仅向厂商公开
2015-12-21: 细节向核心白帽子及相关领域专家公开
2015-12-31: 细节向普通白帽子公开
2016-01-10: 细节向实习白帽子公开
2016-01-23: 细节向公众公开

简要描述:

内网机器好多哦

详细说明:

http://202.104.30.80:8000/
http://202.104.30.80/

1.jpg


存在JAVA反序列化漏洞
拿到shell
http://202.104.30.80:8000/uddiexplorer/css.jsp
涉及多个系统

2.jpg


探测下内网
http://202.104.30.80:8000/uddiexplorer/out.jsp

2.jpg


http://172.16.16.38 >> >>Apache/2.4.3 (Unix) mod_jk/1.2.37 >>Success
http://172.16.16.29 >> >>Microsoft-IIS/8.5 >>Success
http://172.16.16.70 >> ����Ӫ��ϵͳIT֪ʶѧϰ��>>Microsoft-IIS/6.0 >>Success
http://172.16.16.72 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.49 >> >>null >>Success
http://172.16.16.63 >> >>Apache >>Success
http://172.16.16.23 >> �ƶ������������MAS����¼>>Apache-Coyote/1.1 >>Success
http://172.16.16.8 >> Cisco Content Security Management Appliance M1070 (172.16.16.8) - Welcome >>glass/1.0 Python/2.6.4 >>Success
http://172.16.16.80 >> 产品登录界面>>IBM_HTTP_Server >>Success
http://172.16.16.84 >> >>Serv-U/11.1.0.7 >>Success
http://172.16.16.20 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.19 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.52 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.66 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.61 >> >>Microsoft-IIS/7.5 >>Success
http://172.16.16.119 >> >>null >>Success
http://172.16.16.120 >> �ޱ����ĵ�>>Apache/2.0.53 (Win32) >>Success
http://172.16.16.128 >> 美的精品电器--精致生活,一触即发>>Apache/2.2.14 (Win32) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3.1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1 >>Success
http://172.16.16.43 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.133 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.141 >> >>null >>Success
http://172.16.16.134 >> (正式环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.158 >> 美的地产>>Microsoft-IIS/6.0 >>Success
http://172.16.16.142 >> 中国营销总部销售管理平台>>null >>Success
http://172.16.16.154 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.152 >> 美的集团EAM(机电)-测试环境>>Resin/3.0.22 >>Success
http://172.16.16.165 >> >>Apache/2.2.17 (Win32) mod_jk/1.2.26 >>Success
http://172.16.16.166 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.76 >> �������������>>null >>Success
http://172.16.16.14 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.175 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.176 >> (测试环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.178 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.172 >> IceWarp WebClient>>IceWarp/11.3.0.4 >>Success
http://172.16.16.173 >> GMCC-全球压缩机领导品牌>>Microsoft-IIS/6.0 >>Success
http://172.16.16.185 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.81 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.184 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.79 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.189 >> IIS7>>Microsoft-IIS/7.5 >>Success
http://172.16.16.193 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.204 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.205 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.207 >> 美的水家电事业分部条码平台>>Resin/3.0.15 >>Success
http://172.16.16.208 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.214 >> 安得直通宝>>Apache-Coyote/1.1 >>Success
http://172.16.16.215 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.212 >> >>IBM_HTTP_Server >>Success
http://172.16.16.245 >> >>null >>Success
http://172.16.16.210 >> Midea's External Symantec Antivirus Deploy Web>>Microsoft-IIS/7.5 >>Success
http://172.16.16.241 >> >>null >>Success
http://172.16.16.251 >> WEB-IMS>>null >>Success
http://172.16.16.229 >> >>Microsoft-IIS/6.0 >>Success


3.jpg


4.jpg


5.jpg


6.jpg


不深入 点到为止

漏洞证明:

探测下内网
http://202.104.30.80:8000/uddiexplorer/out.jsp

2.jpg

修复方案:

升级版本

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-12-11 11:23

厂商回复:

等了这么久刷rank的终于来了,JAVA反序列化漏洞大礼包。

最新状态:

暂无