当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2015-0163843

漏洞标题:加双筷子某服务器未授权访问

相关厂商:jiashuangkuaizi.com

漏洞作者: orange

提交时间:2015-12-28 17:19

修复时间:2016-02-09 23:29

公开时间:2016-02-09 23:29

漏洞类型:未授权访问/权限绕过

危害等级:中

自评Rank:10

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2015-12-28: 细节已通知厂商并且等待厂商处理中
2015-12-28: 厂商已经确认,细节仅向厂商公开
2016-01-07: 细节向核心白帽子及相关领域专家公开
2016-01-17: 细节向普通白帽子公开
2016-01-27: 细节向实习白帽子公开
2016-02-09: 细节向公众公开

简要描述:

RT

详细说明:

##缺陷ip

123.56.117.57


ping beta.m.jiashuangkuaizi.com
PING beta.m.jiashuangkuaizi.com (123.56.117.57): 56 data bytes
64 bytes from 123.56.117.57: icmp_seq=0 ttl=52 time=16.462 ms
64 bytes from 123.56.117.57: icmp_seq=1 ttl=52 time=20.668 ms
64 bytes from 123.56.117.57: icmp_seq=2 ttl=52 time=35.597 ms

漏洞证明:

# Server
redis_version:2.8.17
redis_git_sha1:00000000
redis_git_dirty:0
redis_build_id:cabe6d16c1ce843b
redis_mode:standalone
os:Linux 2.6.32-431.23.3.el6.x86_64 x86_64
arch_bits:64
multiplexing_api:epoll
gcc_version:4.4.7
process_id:17260
run_id:a401d31174055dc4bc5fd41b7a6baf30ee4914e9
tcp_port:6379
uptime_in_seconds:66379
uptime_in_days:0
hz:10
lru_clock:8003090
config_file:
# Clients
connected_clients:2
client_longest_output_list:0
client_biggest_input_buf:0
blocked_clients:0
# Memory
used_memory:966000
used_memory_human:943.36K
used_memory_rss:2039808
used_memory_peak:1002216
used_memory_peak_human:978.73K
used_memory_lua:33792
mem_fragmentation_ratio:2.11
mem_allocator:jemalloc-3.6.0
# Persistence
loading:0
rdb_changes_since_last_save:10
rdb_bgsave_in_progress:0
rdb_last_save_time:1450841160
rdb_last_bgsave_status:ok
rdb_last_bgsave_time_sec:0
rdb_current_bgsave_time_sec:-1
aof_enabled:0
aof_rewrite_in_progress:0
aof_rewrite_scheduled:0
aof_last_rewrite_time_sec:-1
aof_current_rewrite_time_sec:-1
aof_last_bgrewrite_status:ok
aof_last_write_status:ok
# Stats
total_connections_received:35
total_commands_processed:214
instantaneous_ops_per_sec:0
rejected_connections:0
sync_full:0
sync_partial_ok:0
sync_partial_err:0
expired_keys:2
evicted_keys:0
keyspace_hits:68
keyspace_misses:30
pubsub_channels:0
pubsub_patterns:0
latest_fork_usec:239
# Replication
role:master
connected_slaves:0
master_repl_offset:0
repl_backlog_active:0
repl_backlog_size:1048576
repl_backlog_first_byte_offset:0
repl_backlog_histlen:0
# CPU
used_cpu_sys:21.94
used_cpu_user:15.91
used_cpu_sys_children:0.00
used_cpu_user_children:0.00
# Keyspace
db0:keys=14,expires=13,avg_ttl=4333205

修复方案:

加密码

版权声明:转载请注明来源 orange@乌云


漏洞回应

厂商回应:

危害等级:低

漏洞Rank:3

确认时间:2015-12-28 17:20

厂商回复:

测试机器。

最新状态:

暂无


漏洞评价:

评价