当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0190359

漏洞标题:香飘飘多个系统漏洞(获取到DB/DC/MAIL/FILE 等大量配置信息/可内网探测)

相关厂商:香飘飘

漏洞作者: 路人甲

提交时间:2016-03-29 13:37

修复时间:2016-05-13 13:40

公开时间:2016-05-13 13:40

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:未联系到厂商或者厂商积极忽略

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-03-29: 积极联系厂商并且等待厂商认领中,细节不对外公开
2016-05-13: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

详细说明:

http://exp.zjxpp.com:8186/basisPlatform/loginAction!login.jspa

http://hr.zjxpp.com:8186/basisPlatform/

存在st2命令执行,但是静默以jspa的方式运行,脚本是Vm,这就很尴尬了....尝试上传无果。在

http://exp.zjxpp.com:8186/examples/jsp

目录中上传成功,但是不是不解析就是不兼容。这就非常尴尬了。

http://exp.zjxpp.com:8186/examples/jsp/abc.jsp

拿到一个文件管理的shell,还是老外的东西靠谱。翻了下配置文件,发现了oracle数据库配置,企业邮箱配置,域控DC,
就到这吧,最近写python要炸,红老师也不适当放宽下政策~!!!

漏洞证明:

111111.png

2222.png

ipconfig1.png

ipconfig2.png

tcp        0      0 0.0.0.0:65252           0.0.0.0:*               LISTEN      off (0.00/0/0)
tcp 0 0 0.0.0.0:9575 0.0.0.0:* LISTEN off (0.00/0/0)
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN off (0.00/0/0)
tcp 0 0 0.0.0.0:22 0.0.0.0:* LISTEN off (0.00/0/0)
tcp 0 0 127.0.0.1:631 0.0.0.0:* LISTEN off (0.00/0/0)
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN off (0.00/0/0)
tcp 252 0 10.0.3.23:40891 192.168.0.12:3300 ESTABLISHED off (0.00/0/0)
tcp 0 0 10.0.3.23:956 10.0.3.25:2049 ESTABLISHED off (0.00/0/0)
tcp 84 0 10.0.3.23:41002 192.168.0.12:3300 ESTABLISHED off (0.00/0/0)
tcp 0 0 10.0.3.23:22 192.168.0.79:9681 ESTABLISHED keepalive (540.12/0/0)
tcp 0 0 :::47710 :::* LISTEN off (0.00/0/0)
tcp 0 0 127.0.0.1:8705 :::* LISTEN off (0.00/0/0)
tcp 0 0 127.0.0.1:8005 :::* LISTEN off (0.00/0/0)
tcp 0 0 127.0.0.1:8805 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8709 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8809 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8009 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::64812 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8301 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::111 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8307 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::8308 :::* LISTEN off (0.00/0/0)
tcp 0 0 :::22 :::* LISTEN off (0.00/0/0)
tcp 0 0 ::1:631 :::* LISTEN off (0.00/0/0)
tcp 0 0 ::1:25 :::* LISTEN off (0.00/0/0)
tcp 0 0 10.0.3.23:16789 10.0.3.25:1521 TIME_WAIT timewait (21.84/0/0)
tcp 0 0 10.0.3.23:31883 10.0.3.70:49605 ESTABLISHED off (0.00/0/0)
tcp 0 0 10.0.3.23:8301 10.0.4.1:51351 TIME_WAIT timewait (47.82/0/0)
tcp 0 0 10.0.3.23:16889 10.0.3.25:1521 TIME_WAIT timewait (54.28/0/0)
tcp 0 0 10.0.3.23:16763 10.0.3.25:1521 TIME_WAIT timewait (13.33/0/0)
tcp 0 0 10.0.3.23:8307 112.232.21.238:28593 ESTABLISHED off (0.00/0/0)
tcp 0 0 10.0.3.23:16859 10.0.3.25:1521 TIME_WAIT timewait (44.05/0/0)
tcp 0 0 10.0.3.23:16892 10.0.3.25:1521 TIME_WAIT timewait (57.01/0/0)
tcp 0 0 10.0.3.23:16845 10.0.3.25:1521 TIME_WAIT timewait (41.63/0/0)
tcp 0 0 10.0.3.23:16783 10.0.3.25:1521 TIME_WAIT timewait (21.14/0/0)
tcp 0 0 10.0.3.23:16757 10.0.3.25:1521 TIME_WAIT timewait (11.62/0/0)
tcp 0 0 10.0.3.23:16811 10.0.3.25:1521 TIME_WAIT timewait (31.41/0/0)
tcp 0 0 10.0.3.23:65105 10.0.3.25:1521 ESTABLISHED off (0.00/0/0)
tcp 0 0 10.0.3.23:16851 10.0.3.25:1521 TIME_WAIT timewait (42.31/0/0)
tcp 0 0 10.0.3.23:8307 10.0.4.1:40629 TIME_WAIT timewait (59.72/0/0)
tcp 0 0 10.0.3.23:8301 10.0.4.1:51003 TIME_WAI

cookie.domain=zjxpp.com
jdbc.driverClassName=oracle.jdbc.driver.OracleDriver
jdbc.url=jdbc:oracle:thin:exp/[email protected]:1521:expora
jdbc.username=exp
jdbc.password=exp123
appUrl = http://exp.zjxpp.com:8186/basisPlatform
imgUrl = http://exp.zjxpp.com:8186/basisPlatform/statics
wfeUrl =http://10.0.3.21:8102/expWorkFlow
hrUrl = http://hr.zjxpp.com:8186/hrPlatform
#ad
ldap.validate = false
ldap.ldapHost =ldap://10.0.3.26:389
ldap.ldapHost2 =ldap://10.0.3.26:636
ldap.base =DC=xpp,DC=com
ldap.userDn =cn=Administrator,cn=Users,DC=xpp,DC=com
ldap.password =xpp@20134
ldap.domain [email protected]
#email
allUser.smtpServer=smtp.exmail.qq.com
[email protected]
[email protected]
allUser.emailpassword=xpp@2015!
allUser.displayName=chinaxpp
#bo4
bo4.use = bo_viewer
bo4.pwd = Sap123456
bo4.dev = xppboprd:6400
bo4.enterp = secEnterprise
bo4.reip = http://bo.zjxpp.com:8176/BOE/OpenDocument/opendoc/openDocument.jsp
#QQ E-mail key
access_token = a027de5103e39101e886dd5411fc1d01
#sap
sap.jdbc.poolName = xpp
sap.jdbc.maximumConnectionCount = 100
sap.jdbc.clientName = 800
sap.jdbc.user = abaprfc
sap.jdbc.password = xpp2@12
sap.jdbc.language = 1
sap.jdbc.hostName = 192.168.0.12
sap.jdbc.sysnr = 00
sap.jdbc.group = Public
sap.jdbc.repositoryName = osapRepository
sap.jdbc.byGroup = 0
sap.portal.host = http://ides.kintiger.com:8000
sap.portal.service = /sap/bc/gui/sap/its/webgui
sap.portal.client = 800
# file
news.filePath =/upload_file/news
news.AllfilePath=http://exp.zjxpp.com:8186/upload_file/news/
wfe.xml.filePath = /upload_file/basis/xml
wfe.upload.filePath = /upload_file/basis/slave
irepot.upload.filePath= /upload_file/basis/ireport
template.excel.filePath = /upload_file/basis/excel
open.office.home = /opt/openoffice4
pdf2swf.home = pdf2swf
read.online.path = /upload_file/readonline
office.contract.path = /upload_file/hr/attments/photos

多处信息配置文件

http://exp.zjxpp.com:8186/examples/jsp/abc.jsp?

shell

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

未能联系到厂商或者厂商积极拒绝

漏洞Rank:15 (WooYun评价)