漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2011-02110
漏洞标题:同花顺任意文件上传漏洞
相关厂商:核新同花顺网络信息股份有限公司
漏洞作者: tombook
提交时间:2011-05-12 17:11
修复时间:2011-06-11 18:00
公开时间:2011-06-11 18:00
漏洞类型:文件上传导致任意代码执行
危害等级:高
自评Rank:20
漏洞状态:未联系到厂商或者厂商积极忽略
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2011-05-12: 积极联系厂商并且等待厂商认领中,细节不对外公开
2011-06-11: 厂商已经主动忽略漏洞,细节向公众公开
简要描述:
攻击者可以上传任意WEB后门,对内网进行渗透测试。获取该公司所有用户信息及其内网任意数据库。
详细说明:
可以上传PHP后门。
http://210.xx.244.xx:88/infoxxxhttps://wooyun-img.oss-cn-beijing.aliyuncs.com/upload/2011.php
漏洞证明:
Alerter
Apache2.2_newzxpt
COM+ Event System
Computer Browser
DefWatch
Distributed File System
Distributed Link Tracking Client
Distributed Transaction Coordinator
Event Log
IPSEC Policy Agent
License Logging Service
Logical Disk Manager
Messenger
MySQL
NetTime
Network Connections
Norton AntiVirus Client
pcAnywhere Host Service
Plug and Play
Protected Storage
Remote Access Connection Manager
Remote Procedure Call (RPC)
Remote Registry Service
Removable Storage
RunAs Service
Security Accounts Manager
Server
SSC Monitor
System Event Notification
Task Scheduler
TCP/IP NetBIOS Helper Service
Telephony
Telnet
VNC Server
Windows Management Instrumentation
Windows Management Instrumentation Driver Extensions
Workstation
IPCONFIG /ALL
Connection-specific DNS Suffix . :
Description . . . . . . . . . . . : 3Com 3C920 Integrated Fast Ethernet Controller (3C905C-TX Compatible)
Physical Address. . . . . . . . . : 00-E0-81-29-08-48
修复方案:
进行代码审计,该wap发布平台存在多处安全漏洞。
版权声明:转载请注明来源 tombook@乌云
漏洞回应
厂商回应:
未能联系到厂商或者厂商积极拒绝
漏洞Rank:8 (WooYun评价)