当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0154887

漏洞标题:饿了么某站redis未授权访问

相关厂商:饿了么

漏洞作者: 路人甲

提交时间:2015-11-21 23:53

修复时间:2015-11-24 11:23

公开时间:2015-11-24 11:23

漏洞类型:未授权访问/权限绕过

危害等级:中

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-21: 细节已通知厂商并且等待厂商处理中
2015-11-24: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

RT

详细说明:

漏洞如图:
https://aone.rajax.me

1.png


# Server
redis_version:3.0.4
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:5b63f0e22b69e668
redis_mode:standalone
os:Linux 2.6.32-573.el6.x86_64 x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.4.7
process_id:7278
run_id:bdf5247648fae1c99903e9f331d9a6a8d986f1a2
tcp_port:6379
uptime_in_seconds:1574849
uptime_in_days:18
hz:10
lru_clock:5275733
config_file:/usr/local/redis-3.0.4/conf/redis.conf
# Clients
connected_clients:29
client_longest_output_list:0
client_biggest_input_buf:2
blocked_clients:1
# Memory
used_memory:1438264
used_memory_human:1.37M
used_memory_rss:7290880
used_memory_peak:433401320
used_memory_peak_human:413.32M
used_memory_lua:36864
mem_fragmentation_ratio:5.07
mem_allocator:jemalloc-3.6.0
# Persistence
loading:0
rdb_changes_since_last_save:0
rdb_bgsave_in_progress:0
rdb_last_save_time:1448017092
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
# Stats
total_connections_received:78
total_commands_processed:6974311
instantaneous_ops_per_sec:0
total_net_input_bytes:3397872660
total_net_output_bytes:3192693929
instantaneous_input_kbps:0.03
instantaneous_output_kbps:0.00
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:0
evicted_keys:0
keyspace_hits:0
keyspace_misses:0
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:663
migrate_cached_sockets:0
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:461.21
used_cpu_user:314.08
used_cpu_sys_children:13.10
used_cpu_user_children:89.09
# Cluster
cluster_enabled:0
# Keyspace
db0:keys=1,expires=0,avg_ttl=0


2.png

漏洞证明:

2.png

修复方案:

和运维聊聊

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-11-24 11:23

厂商回复:

该漏洞已于饿了么安全应急响应中心(ESRC)提交,属于重复上报,故做忽略处理。谢谢对饿了么的支持和关注!

最新状态:

暂无