当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0133489

漏洞标题:暴风某站redis未授权可任意上传文件

相关厂商:暴风影音

漏洞作者: 1937nick

提交时间:2015-08-12 10:23

修复时间:2015-09-26 11:30

公开时间:2015-09-26 11:30

漏洞类型:网络未授权访问

危害等级:中

自评Rank:8

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-08-12: 细节已通知厂商并且等待厂商处理中
2015-08-12: 厂商已经确认,细节仅向厂商公开
2015-08-22: 细节向核心白帽子及相关领域专家公开
2015-09-01: 细节向普通白帽子公开
2015-09-11: 细节向实习白帽子公开
2015-09-26: 细节向公众公开

简要描述:

rank

详细说明:

地址:http://114.112.82.120:8082/index.php

1.png


网站目录已经得知了
然后就可以上传马了

2.png


不知道为什么会不解析 http://114.112.82.120:8082/c.php
本来想漫游一下内网的 现在都泡汤。

root@kali:/srv/redis-2.8.19# src/redis-cli -h 114.112.82.120
114.112.82.120:6379> info
# Server
redis_version:2.6.14
redis_git_sha1:00000000
redis_git_dirty:0
redis_mode:standalone
os:Linux 2.6.18-274.el5 x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.1.2
process_id:471
run_id:089b0be0318f65d05daf9b101171c8a2680669e7
tcp_port:6379
uptime_in_seconds:25394685
uptime_in_days:293
hz:10
lru_clock:1323876
# Clients
connected_clients:1
client_longest_output_list:0
client_biggest_input_buf:0
blocked_clients:0
# Memory
used_memory:1167247632
used_memory_human:1.09G
used_memory_rss:1195913216
used_memory_peak:1180578616
used_memory_peak_human:1.10G
used_memory_lua:31744
mem_fragmentation_ratio:1.02
mem_allocator:jemalloc-3.2.0
# Persistence
loading:0
rdb_changes_since_last_save:0
rdb_bgsave_in_progress:0
rdb_last_save_time:1439301735
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:14
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
# Stats
total_connections_received:704
total_commands_processed:9067939
instantaneous_ops_per_sec:0
rejected_connections:0
expired_keys:0
evicted_keys:0
keyspace_hits:4716006
keyspace_misses:2871824
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:25296
# Replication
role:master
connected_slaves:0
# CPU
used_cpu_sys:201.55
used_cpu_user:203.62
used_cpu_sys_children:124.93
used_cpu_user_children:734.80
# Keyspace
db0:keys=1007466,expires=0
db5:keys=2582,expires=0
114.112.82.120:6379> ing
(error) ERR unknown command 'ing'
114.112.82.120:6379> error
(error) ERR unknown command 'error'
114.112.82.120:6379> ifconfig
(error) ERR unknown command 'ifconfig'
114.112.82.120:6379> shell
(error) ERR unknown command 'shell'
(0.71s)
114.112.82.120:6379>

漏洞证明:

修复方案:

找运维

版权声明:转载请注明来源 1937nick@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2015-08-12 11:28

厂商回复:

感谢您提交的漏洞,我们会尽快修复。

最新状态:

暂无


漏洞评价:

评论