当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0204410

漏洞标题:广电总局某系统Getshell(影响内网安全)

相关厂商:广电总局卫星直播中心

漏洞作者: 路人甲

提交时间:2016-05-02 20:39

修复时间:2016-05-09 09:00

公开时间:2016-05-09 09:00

漏洞类型:命令执行

危害等级:高

自评Rank:12

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-05-02: 细节已通知厂商并且等待厂商处理中
2016-05-09: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

广电总局某系统getshell(影响内网安全)

详细说明:

http://123.127.110.171:8001/sireports/login.do?method=indexpage
广电总局统计分析系统

shouye.png


存在Java反序列化漏洞,直接getshell(shell文件测试完毕已经删除)

shell.png


三个内网ip段,内网应用应该挺多的

eth0      Link encap:Ethernet  HWaddr 6C:AE:8B:26:EA:4A  
inet addr:192.168.10.165 Bcast:192.168.10.255 Mask:255.255.255.0
inet6 addr: fe80::6eae:8bff:fe26:ea4a/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:252442835 errors:0 dropped:0 overruns:0 frame:0
TX packets:211675215 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:39294753370 (36.5 GiB) TX bytes:15866812206 (14.7 GiB)
Memory:c5a60000-c5a80000
eth1 Link encap:Ethernet HWaddr 6C:AE:8B:26:EA:4B
inet addr:192.168.20.165 Bcast:192.168.20.255 Mask:255.255.255.0
inet6 addr: fe80::6eae:8bff:fe26:ea4b/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:20195714 errors:0 dropped:0 overruns:0 frame:0
TX packets:29784302 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:2918105053 (2.7 GiB) TX bytes:14216003044 (13.2 GiB)
Memory:c5a40000-c5a60000
eth2 Link encap:Ethernet HWaddr 6C:AE:8B:26:EA:4C
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
Memory:c5a20000-c5a40000
eth3 Link encap:Ethernet HWaddr 6C:AE:8B:26:EA:4D
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
Memory:c5a00000-c5a20000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:6129600 errors:0 dropped:0 overruns:0 frame:0
TX packets:6129600 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:652613932 (622.3 MiB) TX bytes:652613932 (622.3 MiB)
tun1 Link encap:UNSPEC HWaddr 00-00-00-00-00-00-00-00-00-00-00-00-00-00-00-00
inet addr:172.16.0.6 P-t-P:172.16.0.5 Mask:255.255.255.255
UP POINTOPOINT RUNNING NOARP MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:100
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
usb0 Link encap:Ethernet HWaddr 6E:AE:8B:26:EA:49
inet6 addr: fe80::6cae:8bff:fe26:ea49/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:44734944 errors:0 dropped:0 overruns:0 frame:0
TX packets:6 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1261212036 (1.1 GiB) TX bytes:468 (468.0 b)


内网中的部分应用地址

#服务号及其对应要发送目的ip(只针对影院发起上传数据的情况)
serviceNoWithIp=01=192.168.0.101:8080
serviceNoWithIp=02=192.168.0.102
serviceNoWithIp=03=192.168.0.103:8080
serviceNoWithIp=04=192.168.0.104:8080
serviceNoWithIp=88=192.168.0.104:8080
serviceNoWithIp=55=127.0.0.1:8082
serviceNoWithIp=69=192.168.101.60
serviceNoWithIp=79=192.168.101.61:8082
serviceNoWithIp=20=202.10.77.18:2907
serviceNoWithIp=21=192.168.102.60:2907

漏洞证明:

找到一个网站,很头疼的是没有找到配置文件,或者其他更多端口对应的web应用,这时候就需要脑洞开一下了
配置文件可以从root文件夹下的.bash_history文件中寻找,里面一般都存在管理员进行编辑文件的路径什么的,很可能有意外收获

jdbc:oracle:thin:@192.168.10.205:1521:etldb
dadiusr/dadiusr
jdbc:mysql://192.168.10.165:3306/CCMS?useUnicode=true&characterEncoding=GBK
ccms2/ccms2
jdbc:oracle:thin:@192.168.10.205:1521/etldb
papp/papp


找到了一个后台登录
http://123.127.110.171:8001/sireports/login.do?method=login
密码全是111111

cc0001
test
jili01
admin1


后台.png


后台没有什么重要内容,因为不是管理员权限,admin密码没有解密成功
不过还是能影响巨大内网中的安全的

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2016-05-09 09:00

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无