漏洞概要 关注数(24) 关注此漏洞
缺陷编号:wooyun-2014-052887
漏洞标题:很久之前的shell仍未清理之畅游游戏
相关厂商:搜狐畅游
漏洞作者: 啦绯哥
提交时间:2014-03-05 20:53
修复时间:2014-04-19 20:53
公开时间:2014-04-19 20:53
漏洞类型:成功的入侵事件
危害等级:高
自评Rank:15
漏洞状态:厂商已经确认
漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签: 无
漏洞详情
披露状态:
2014-03-05: 细节已通知厂商并且等待厂商处理中
2014-03-05: 厂商已经确认,细节仅向厂商公开
2014-03-15: 细节向核心白帽子及相关领域专家公开
2014-03-25: 细节向普通白帽子公开
2014-04-04: 细节向实习白帽子公开
2014-04-19: 细节向公众公开
简要描述:
rt
详细说明:
shell地址
http://xlfc.changyou.com/template/shop/images/more_news_title_bar_bgs.jsp
漏洞证明:
[/usr/local/tomcat80/webapps_xlfc/ROOT/]$ ifconfig
eth0 Link encap:Ethernet HWaddr 78:2B:CB:32:1B:77
inet addr:10.16.224.47 Bcast:10.16.224.255 Mask:255.255.255.0
inet6 addr: fe80::7a2b:cbff:fe32:1b77/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:628200661 errors:0 dropped:0 overruns:0 frame:0
TX packets:639257121 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:238920909397 (222.5 GiB) TX bytes:102805100385 (95.7 GiB)
Interrupt:66 Memory:da000000-da012100
eth1 Link encap:Ethernet HWaddr 78:2B:CB:32:1B:78
inet addr:219.232.224.47 Bcast:219.232.224.127 Mask:255.255.255.128
inet6 addr: fe80::7a2b:cbff:fe32:1b78/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:1097784927 errors:0 dropped:0 overruns:0 frame:0
TX packets:1353445506 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:160636307804 (149.6 GiB) TX bytes:1611992932966 (1.4 TiB)
Interrupt:74 Memory:dc000000-dc012100
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:2918224465 errors:0 dropped:0 overruns:0 frame:0
TX packets:2918224465 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:4748555085028 (4.3 TiB) TX bytes:4748555085028 (4.3 TiB)
修复方案:
清理后门
版权声明:转载请注明来源 啦绯哥@乌云
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:5
确认时间:2014-03-05 21:07
厂商回复:
正在修复,多谢提醒!
最新状态:
暂无