当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-050406

漏洞标题:某网络银行支付平台存在重大安全问题

相关厂商:cycb.com

漏洞作者: abaddon

提交时间:2014-02-07 17:09

修复时间:2014-03-24 17:10

公开时间:2014-03-24 17:10

漏洞类型:系统/服务运维配置不当

危害等级:高

自评Rank:20

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-02-07: 细节已通知厂商并且等待厂商处理中
2014-02-12: 厂商已经确认,细节仅向厂商公开
2014-02-22: 细节向核心白帽子及相关领域专家公开
2014-03-04: 细节向普通白帽子公开
2014-03-14: 细节向实习白帽子公开
2014-03-24: 细节向公众公开

简要描述:

防火墙配置错误 黑客可利用其查看防火墙配置并以此作为跳板探测内部网络
同时也泄漏了所有网络设备的访问密钥等很多敏感信息。网上银行服务器群安全防护形同虚设
同时也威胁到与之联网的其他商业银行 人民银行 政府系统企业内外安全

详细说明:

防火墙配置错误 黑客可利用其配置漏洞查看防火墙配置并以此作为跳板探测内部网络
同时也泄漏了所有网络设备的pre-shared-key访问密钥等很多敏感信息。网上银行服务器群安全防护形同虚设
同时也潜在威胁到与之联网的其他商业银行 甚至人民银行 政府系统企业内外安全
默认密码admin

cyyh.jpg


漏洞证明:

<h3c>
<h3c>display cur
<h3c>display current-configuration
#
sysname h3c
#
ike local-name cyyh
#
firewall packet-filter enable
firewall packet-filter default permit
#
nat dns-map 这里是地址 tcp
#
firewall statistic system enable
#
ip http shutdown
#
pki entity abc
common-name abc
organization-unit abc
#
pki domain abc
ca identifier h3c
certificate request url http://3.1.1.1
certificate request from ra
certificate request entity abc
crl check disable
#
radius scheme system
server-type extended
#
domain system
#
local-user admin
password simple admin
service-type telnet
level 3
service-type ftp
local-user admincy
password simple 删除
service-type telnet
level 3
#
ike proposal 1
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
sa duration 43200
#
ike proposal 5
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
sa duration 7200
#
ike proposal 10
authentication-method rsa-signature
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
#
ike proposal 20
encryption-algorithm 3des-cbc
dh group2
authentication-algorithm md5
#
ike dpd defaultdpd
#
ike peer abc
remote-address 202.99.52.18
local-address 221.202.188.146
nat traversal
certificate domain abc
dpd defaultdpd
#
ike peer bjcb
exchange-mode aggressive
pre-shared-key 删除
remote-address 119.253.56.40
local-address 221.202.188.146
#
ike peer qszx
pre-shared-key 删除
remote-name QSZX
remote-address 211.99.8.228
local-address 221.202.188.146
nat traversal
#
ike peer zfb_peer
pre-shared-key 45free43&f#X#t@
remote-name zfb
remote-address 110.75.135.233
local-address 221.202.188.146
nat traversal
dpd defaultdpd
#
ipsec proposal bjcb
esp authentication-algorithm sha1
esp encryption-algorithm 3des
#
ipsec proposal prop1
esp authentication-algorithm sha1
esp encryption-algorithm 3des
#
ipsec proposal qszx
esp encryption-algorithm 3des
#
ipsec proposal zfb_prop
esp encryption-algorithm 3des
#
ipsec policy zfb_pol 1 isakmp
security acl 3000
pfs dh-group2
ike-peer zfb_peer
proposal zfb_prop
sa duration time-based 5400
#
ipsec policy zfb_pol 2 isakmp
security acl 3010
ike-peer abc
proposal prop1
sa duration time-based 86400
#
ipsec policy zfb_pol 3 isakmp
security acl 3020
pfs dh-group2
ike-peer qszx
proposal qszx
sa duration time-based 86400
#
ipsec policy zfb_pol 4 isakmp
security acl 3600
pfs dh-group2
ike-peer bjcb
proposal bjcb
sa duration time-based 7200
#
acl number 3000
rule 0 permit ip source 172.27.20.50 0.0.0.1 destination 172.27.16.0 0.0.0.255
acl number 3010
rule 0 permit ip source 11.11.0.0 0.0.0.255 destination 19.1.1.0 0.0.0.255
acl number 3020
rule 0 permit ip source 10.4.5.0 0.0.0.15 destination 10.102.80.0 0.0.15.255
rule 1 permit ip source 10.4.5.0 0.0.0.15 destination 10.102.96.0 0.0.31.255
rule 2 permit ip source 10.4.5.0 0.0.0.15 destination 10.0.90.0 0.0.0.255
rule 3 permit ip source 10.4.5.0 0.0.0.15 destination 10.3.2.64 0.0.0.15
rule 4 permit ip source 10.4.5.0 0.0.0.15 destination 10.4.2.64 0.0.0.15
acl number 3100
rule 0 deny ip source 11.11.0.0 0.0.0.255 destination 19.1.1.0 0.0.0.255
rule 2 deny ip source 172.27.20.51 0 destination 172.27.16.0 0.0.0.255
rule 3 deny ip source 10.4.5.0 0.0.0.15 destination 10.102.80.0 0.0.15.255
rule 4 deny ip source 10.4.5.0 0.0.0.15 destination 10.102.96.0 0.0.31.255
删除若干行
acl number 3400
rule 0 permit ip source 54.0.1.11 0
acl number 3500
rule 0 permit ip
acl number 3600
rule 10 permit ip source 53.0.8.11 0 destination 192.168.0.125 0
rule 20 deny ip
#
interface Aux0
async mode flow
#
interface Ethernet0/0
ip address 172.16.33.254 255.255.255.0
#
interface Ethernet0/1
ip address 221.202.188.146 255.255.255.0
nat outbound 3400
nat outbound 3100
nat server protocol tcp global current-interface www inside 11.0.0.1 www
nat server protocol tcp global current-interface 8088 inside 54.0.1.11 8088
nat server protocol tcp global current-interface smtp inside 54.0.1.11 smtp
ipsec policy zfb_pol
#
interface Ethernet0/2
ip address 11.0.0.254 255.255.255.0
ip address 11.11.0.254 255.255.255.0 sub
nat outbound 3300
nat outbound 3200
nat server protocol tcp global 221.202.188.146 www inside 11.0.0.1 www
#
interface NULL0
#
interface LoopBack0
ip address 95.1.1.1 255.255.255.0
#
firewall zone local
set priority 100
#
firewall zone trust
add interface Ethernet0/0
add interface Ethernet0/2
set priority 85
#
firewall zone untrust
add interface Ethernet0/1
set priority 5
#
firewall zone DMZ
set priority 50
#
firewall interzone local trust
#
firewall interzone local untrust
#
firewall interzone local DMZ
#
firewall interzone trust untrust
#
firewall interzone trust DMZ
#
firewall interzone DMZ untrust
#
FTP server enable
#
ip route-static 0.0.0.0 0.0.0.0 221.202.188.129 preference 60
删除若干行
preference 60
ip route-static 192.168.2.0 255.255.255.0 11.0.0.251 preference 60
#
ntp-service authentication enable
ntp-service source-interface Ethernet0/1
ntp-service unicast-server 210.72.145.44
#
user-interface con 0
user-interface aux 0
user-interface vty 0 4
user privilege level 3
set authentication password simple admin
idle-timeout 1000 0
#
return
<h3c>
<h3c>
<h3c>
<h3c>
<h3c>

修复方案:

速度修复防火墙配置

版权声明:转载请注明来源 abaddon@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:11

确认时间:2014-02-12 16:42

厂商回复:

CNVD确认并复现所述情况,已经转由CNCERT下发给CNCERT辽宁分中心,由其后续联系网站管理单位处置。

最新状态:

暂无