当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0165536

漏洞标题:美的某站getshell可内网漫游53台机器

相关厂商:midea.com

漏洞作者: 路人甲

提交时间:2015-12-29 11:56

修复时间:2016-02-09 23:29

公开时间:2016-02-09 23:29

漏洞类型:命令执行

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-29: 细节已通知厂商并且等待厂商处理中
2015-12-29: 厂商已经确认,细节仅向厂商公开
2016-01-08: 细节向核心白帽子及相关领域专家公开
2016-01-18: 细节向普通白帽子公开
2016-01-28: 细节向实习白帽子公开
2016-02-09: 细节向公众公开

简要描述:

敢不敢不给中8,来个高可好?

详细说明:

http://202.104.30.94
存在JAVA反序列化命令执行漏洞

30.png


ROOT权限

31.png


直接写shell
http://202.104.30.94/she11.jsp?o=vLogin

32.png


内网探测下

http://172.16.16.38 >> >>Apache/2.4.3 (Unix) mod_jk/1.2.37 >>Success
http://172.16.16.8 >> Cisco Content Security Management Appliance M1070 (172.16.16.8) - Welcome >>glass/1.0 Python/2.6.4 >>Success
http://172.16.16.29 >> >>Microsoft-IIS/8.5 >>Success
http://172.16.16.23 >> �ƶ������������MAS����¼>>Apache-Coyote/1.1 >>Success
http://172.16.16.70 >> ����Ӫ��ϵͳIT֪ʶѧϰ��>>Microsoft-IIS/6.0 >>Success
http://172.16.16.72 >> >>Microsoft-IIS/5.0 >>Success
httpp//1722.16.1.120 >> ����ĵ���ʼʼ�ϵͳ>>giinx/1..11 >>Suceess
> http://172.16.16.66 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.63 >> >>Apache >>Success
http://172.16.16.49 >> >>null >>Success
http://172.16.16.43 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.52 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.80 >> 产品登录界面>>IBM_HTTP_Server >>Success
http://172.16.16.119 >> >>null >>Success
http://172.16.16.120 >> �ޱ����ĵ�>>Apache/2.0.53 (Win32) >>Success
http://172.16.16.84 >> >>Serv-U/11.1.0.7 >>Success
http://172.16.16.128 >> 美的精品电器--精致生活,一触即发>>Apache/2.2.14 (Win32) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3.1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1 >>Success
http://172.16.16.141 >> >>null >>Success
http://172.16.16.14 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.134 >> (正式环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.154 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.158 >> 美的地产>>Microsoft-IIS/6.0 >>Success
http://172.16.16.142 >> 中国营销总部销售管理平台>>null >>Success
http://172.16.16.61 >> >>Microsoft-IIS/7.5 >>Success
http://172.16.16.165 >> >>Apache/2.2.17 (Win32) mod_jk/1.2.26 >>Success
http://172.16.16.166 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.133 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.81 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.175 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.176 >> (测试环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.178 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.76 >> �������������>>null >>Success
http://172.16.16.172 >> IceWarp WebClient>>IceWarp/11.3.0.4 >>Success
http://172.16.16.184 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.79 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.193 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.131 >> 172.16.16.131 - />>Microsoft-IIS/6.0 >>Success
http://172.16.16.189 >> IIS7>>Microsoft-IIS/7.5 >>Success
http://172.16.16.185 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.173 >> GMCC-全球压缩机领导品牌>>Microsoft-IIS/6.0 >>Success
http://172.16.16.152 >> 美的集团EAM(机电)-测试环境>>Resin/3.0.22 >>Success
http://172.16.16.204 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.205 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.207 >> 美的水家电事业分部条码平台>>Resin/3.0.15 >>Success
http://172.16.16.212 >> >>IBM_HTTP_Server >>Success
http://172.16.16.208 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.214 >> 安得直通宝>>Apache-Coyote/1.1 >>Success
http://172.16.16.215 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.210 >> Midea's External Symantec Antivirus Deploy Web>>Microsoft-IIS/7.5 >>Success
http://172.16.16.229 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.241 >> >>null >>Success
http://172.16.16.251 >> WEB-IMS>>null >>Success
http://172.16.16.245 >> >>null >>Success


可内网漫游53台机器

漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:7

确认时间:2015-12-29 16:18

厂商回复:

中7也不算中8吧?

最新状态:

暂无