当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0165908

漏洞标题:美的多处JAVA反序列化命令执行打包55台内网主机可漫游

相关厂商:midea.com

漏洞作者: 路人甲

提交时间:2015-12-30 09:40

修复时间:2016-02-12 18:49

公开时间:2016-02-12 18:49

漏洞类型:命令执行

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-30: 细节已通知厂商并且等待厂商处理中
2015-12-30: 厂商已经确认,细节仅向厂商公开
2016-01-09: 细节向核心白帽子及相关领域专家公开
2016-01-19: 细节向普通白帽子公开
2016-01-29: 细节向实习白帽子公开
2016-02-12: 细节向公众公开

简要描述:

打包了,不再光顾了

详细说明:

0x01
http://202.104.30.160/

40.png


0x02
http://202.104.30.214:80/

41.png


0x03
http://202.104.30.248:80

42.png


以最后一个做shell演示
直接写
http://202.104.30.248/uddiexplorer/she11.jsp?o=vLogin

44.png


43.png


扫下内网

http://172.16.16.23 >> �ƶ������������MAS����¼>>Apache-Coyote/1.1 >>Success
http://172.16.16.20 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.19 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.21 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.29 >> >>Microsoft-IIS/8.5 >>Success
http://172.16.16.38 >> >>Apache/2.4.3 (Unix) mod_jk/1.2.37 >>Success
http://172.16.16.22 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.49 >> >>null >>Success
http://172.16.16.43 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.63 >> >>Apache >>Success
http://172.16.16.52 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.66 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.76 >> �������������>>null >>Success
http://172.16.16.14 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.72 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.70 >> ����Ӫ��ϵͳIT֪ʶѧϰ��>>Microsoft-IIS/6.0 >>Success
http://172.16.16.84 >> >>Serv-U/11.1.0.7 >>Success
http://172.16.16.80 >> 产品登录界面>>IBM_HTTP_Server >>Success
http://172.16.16.61 >> >>Microsoft-IIS/7.5 >>Success
http://172.16.16.8 >> Cisco Content Security Management Appliance M1070 (172.16.16.8) - Welcome >>glass/1.0 Python/2.6.4 >>Success
http://172.16.16.128 >> 美的精品电器--精致生活,一触即发>>Apache/2.2.14 (Win32) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3.1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1 >>Success
http://172.16.16.134 >> (正式环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.81 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.79 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.119 >> >>null >>Success
http://172.16.16.120 >> �ޱ����ĵ�>>Apache/2.0.53 (Win32) >>Success
http://172.16.16.158 >> 美的地产>>Microsoft-IIS/6.0 >>Success
http://172.16.16.133 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.152 >> 美的集团EAM(机电)-测试环境>>Resin/3.0.22 >>Success
http://172.16.16.141 >> >>null >>Success
http://172.16.16.165 >> >>Apache/2.2.17 (Win32) mod_jk/1.2.26 >>Success
http://172.16.16.142 >> 中国营销总部销售管理平台>>null >>Success
http://172.16.16.166 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.178 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.175 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.176 >> (测试环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.154 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.185 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.172 >> IceWarp WebClient>>IceWarp/11.3.0.4 >>Success
http://172.16.16.131 >> 172.16.16.131 - />>Microsoft-IIS/6.0 >>Success
http://172.16.16.193 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.204 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.205 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.212 >> >>IBM_HTTP_Server >>Success
http://172.16.16.215 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.189 >> IIS7>>Microsoft-IIS/7.5 >>Success
http://172.16.16.184 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.214 >> 安得直通宝>>Apache-Coyote/1.1 >>Success
http://172.16.16.210 >> Midea's External Symantec Antivirus Deploy Web>>Microsoft-IIS/7.5 >>Success
http://172.16.16.229 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.207 >> 美的水家电事业分部条码平台>>Resin/3.0.15 >>Success
http://172.16.16.208 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.173 >> GMCC-全球压缩机领导品牌>>Microsoft-IIS/6.0 >>Success
http://172.16.16.240 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.251 >> WEB-IMS>>null >>Success


55台内网主机可漫游

漏洞证明:

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2015-12-30 16:06

厂商回复:

圆蛋快乐!

最新状态:

暂无