当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-060739

漏洞标题:赛迪网Cacti弱口令

相关厂商:赛迪网

漏洞作者: 鸟云厂商

提交时间:2014-05-14 19:54

修复时间:2014-05-19 19:55

公开时间:2014-05-19 19:55

漏洞类型:后台弱口令

危害等级:中

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-05-14: 细节已通知厂商并且等待厂商处理中
2014-05-19: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

赛迪网Cacti弱口令

详细说明:

http://115.182.21.54/
账户名密码admin/admin

Apache Environment
Variable Value
HTTP_HOST 115.182.21.54
HTTP_CONNECTION keep-alive
HTTP_ACCEPT text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
HTTP_USER_AGENT Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/29.0.1547.66 Safari/537.36 LBBROWSER
HTTP_REFERER http://115.182.21.54/utilities.php
HTTP_ACCEPT_ENCODING gzip,deflate,sdch
HTTP_ACCEPT_LANGUAGE zh-CN,zh;q=0.8
HTTP_COOKIE Cacti=cc59ae3aa587fcb59462884f789a7fac; Hm_lvt_3d143f0a07b6487f65609d8411e5464f=1400067930; Hm_lpvt_3d143f0a07b6487f65609d8411e5464f=1400067985
PATH /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin:/root/bin
LD_LIBRARY_PATH /usr/local/apache/lib
SERVER_SIGNATURE no value
SERVER_SOFTWARE Apache/2.4.6 (Unix)
SERVER_NAME 115.182.21.54
SERVER_ADDR 115.182.21.54
SERVER_PORT 80
REMOTE_ADDR 36.248.194.119
DOCUMENT_ROOT /usr/local/apache/htdocs/cacti
REQUEST_SCHEME http
CONTEXT_PREFIX no value
CONTEXT_DOCUMENT_ROOT /usr/local/apache/htdocs/cacti
SERVER_ADMIN tanglp@ccidnet.com
SCRIPT_FILENAME /usr/local/apache/htdocs/cacti/utilities.php
REMOTE_PORT 1579
GATEWAY_INTERFACE CGI/1.1
SERVER_PROTOCOL HTTP/1.1
REQUEST_METHOD GET
QUERY_STRING action=view_tech
REQUEST_URI /utilities.php?action=view_tech
SCRIPT_NAME /utilities.php

漏洞证明:

222.jpg

修复方案:

版权声明:转载请注明来源 鸟云厂商@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2014-05-19 19:55

厂商回复:

最新状态:

暂无