当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0123421

漏洞标题:微盟多处配置不当

相关厂商:weimob.com

漏洞作者: 爱上平顶山

提交时间:2015-06-29 14:07

修复时间:2015-07-01 10:06

公开时间:2015-07-01 10:06

漏洞类型:重要敏感信息泄露

危害等级:中

自评Rank:10

漏洞状态:厂商已经修复

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-06-29: 细节已通知厂商并且等待厂商处理中
2015-07-01: 厂商已经确认,细节仅向厂商公开
2015-07-01: 厂商已经修复漏洞并主动公开,细节向公众公开

简要描述:

...

详细说明:

1、 Django DEBUG = True
http://120.55.125.159/

0.jpg


mod_wsgi.listener_port	
'80'
mod_wsgi.listener_host
''
SERVER_SOFTWARE
'Apache/2.2.15 (CentOS)'
SCRIPT_NAME
u''
mod_ssl.var_lookup
''
mod_wsgi.handler_script
''
SERVER_SIGNATURE
'<address>Apache/2.2.15 (CentOS) Server at 120.55.125.159 Port 80</address>\n'
REQUEST_METHOD
'GET'
PATH_INFO
u'/'
SERVER_PROTOCOL
'HTTP/1.1'
QUERY_STRING
''
HTTP_USER_AGENT
'Mozilla/5.0 (Windows NT 6.3; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/37.0.2062.124 Safari/537.36'
HTTP_CONNECTION
'keep-alive'
SERVER_NAME
'120.55.125.159'
REMOTE_ADDR
'117.158.136.224'
mod_wsgi.request_handler
'wsgi-script'
wsgi.url_scheme
'http'
PATH_TRANSLATED
'/var/www/reviews/htdocs/reviewboard.wsgi/'
SERVER_PORT
'80'
wsgi.multiprocess
True
mod_wsgi.input_chunked
'0'
SERVER_ADDR
'120.55.125.159'
DOCUMENT_ROOT
'/var/www/reviews/htdocs'
mod_wsgi.process_group
''
SCRIPT_FILENAME
'/var/www/reviews/htdocs/reviewboard.wsgi'
SERVER_ADMIN
'root@localhost'
wsgi.input
<mod_wsgi.Input object at 0x7f7380d0ff30>
HTTP_HOST
'120.55.125.159'
mod_ssl.is_https
0
wsgi.multithread
False
mod_wsgi.callable_object
'application'
REQUEST_URI
'/'
HTTP_ACCEPT
'text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8'
HTTP_RA_SID
'B75F3AFF-20140623-075736-780565-d69c4b'
wsgi.version
(1, 1)
GATEWAY_INTERFACE
'CGI/1.1'
wsgi.run_once
False
HTTP_RA_VER
'2.10.4'
wsgi.errors
<mod_wsgi.Log object at 0x7f7380d0fef0>
REMOTE_PORT
'32400'
HTTP_ACCEPT_LANGUAGE
'zh-CN,zh;q=0.8,en;q=0.6,ru;q=0.4,es;q=0.2,ja;q=0.2'
mod_wsgi.version
(3, 2)
mod_wsgi.application_group
'10.174.36.77|'
mod_wsgi.script_reloading
'1'
wsgi.file_wrapper
''
HTTP_ACCEPT_ENCODING
'gzip,deflate,sdch'


2、微盟开发者文档系统YII框架有问题
http://120.26.13.31:8889/index.php

1.jpg


3、V点系统 手机号不做验证 可以跟任意手机号发验证码
http://qa.weimob.com:7777/index.php?c=login&m=forgetpassword
ok
4、
120.26.14.148 redis 未授权访问
120.55.125.159 11211 未授权访问
120.26.13.31 11211 未授权访问
ok

漏洞证明:

···

修复方案:

···

版权声明:转载请注明来源 爱上平顶山@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2015-07-01 10:06

厂商回复:

感谢你对系统提出宝贵意见,已经修复

最新状态:

2015-07-01:感谢你对系统提出宝贵意见,已经修复


漏洞评价:

评论

  1. 2015-07-01 14:56 | xiaoL ( 普通白帽子 | Rank:361 漏洞数:67 | PKAV技术宅社区!Blog:http://www.xlixli....)

    看上去感觉好像是一体化的扫描器弄出来的。