2015-03-04: 细节已通知厂商并且等待厂商处理中 2015-03-09: 厂商已经确认,细节仅向厂商公开 2015-03-19: 细节向核心白帽子及相关领域专家公开 2015-03-29: 细节向普通白帽子公开 2015-04-08: 细节向实习白帽子公开 2015-04-18: 细节向公众公开
湖北公路客运集团OA系统log信息泄露
http://58.48.178.98:9090/seeyon//logs/login.log
*****oidphone,192.168.22.39,74**********.153.100,B65AE60A06B**********e,192.168.22.39,DD799C7**********e,192.168.22.39,033E93F**********192.168.22.39,A22D079**********8.178.162,100401BEA2**********0.172.202,39C975E6CF6**********.178.162,2D17CE6CBAF**********8.178.162,7DE6796D0F**********e,192.168.22.39,23A45E8**********2.168.22.39,9092F5CDC**********09.66.15,19D84BE7C4F**********192.168.22.39,4B5DB4BB**********211.197.0,7B4196412C**********168.22.243,BD37A6357**********40.172.202,E238696F5D**********,192.168.22.39,E7B2BDB3**********8.178.162,9E62139EAC4**********68.22.79,25FFB1B81A6**********40.172.202,85B26789F7**********48.178.162,07BEADCA7**********83.129.163,A97EA35A6C**********3.244.34,6091705D22E**********48.178.98,E93BE01F81**********.178.98,7F9F44E0C6D8**********0.172.202,3C2265C44D8**********68.22.40,1BAD2DC1047**********3.244.34,743B48E2678**********.129.163,5D106869685**********01.68.163,D8C39D647A9**********101.92.221,6261C389E**********.173.244.34,743B48E**********8.178.162,62101CF88F**********3.244.34,6C171183F66**********.178.98,0860FDA9AA80**********8.22.209,8B775516AF9**********83.129.163,0FCC28413**********8.178.162,AC41D4EADE**********8.254.215,E5485A787F1**********.178.162,E4A04BDA93A**********80.121.144,A664FBC94B**********138.254.215,A390770DA**********101.68.100,3D719F6AEB**********173.244.34,339E94566**********8.178.162,F4BB7658E4**********0.172.202,3D3DCFED8E**********3.129.163,0B82D4150C**********8.178.162,E9DF930E307**********.178.162,65907FE01A63**********.226.26,145F9D58BF73**********40.172.202,1FC84E2DB**********83.129.163,09CDED4EC2**********2.138.169,0C854885BA**********48.178.162,D0C9137D6**********3.129.163,AD152C0C98**********.17.6.26,A47869F744A**********80.121.144,8E033E7D3B**********42.137.173,2850333373**********3.129.163,80B2C10CFC9**********8.178.162,4DD96F09B0**********172.226.26,407F388AE**********48.178.162,ADE5F4151**********.172.226.26,407F388A**********01.92.103,048D546AA0**********83.129.163,CC7E5ABAA2**********83.129.163,EEB19D058**********83.129.163,4C257F63D**********1.183.129.163,CC7E5A**********83.129.163,6B11B9F12B**********1.183.129.163,6B11B9**********73.244.34,46DED7D40BE**********138.254.215,6F2BE4385**********113.207.7,EDCFAB7742**********183.129.163,4C257F63**********8.254.215,83750E8A763**********8.178.162,2407DC1C22**********2.149.220,927107FF707**********83.129.163,2A77F3A04**********48.178.162,6E6674F23**********.178.98,8A22342F8F2E**********3.129.163,0362639A09**********,192.168.22.39,164115F0**********40.172.202,51A2768D6**********83.129.163,06ACF5748**********75.200.138,8699D9805**********3.129.163,090015724DD**********83.129.163,46E1DE5C3**********.178.162,52A2312832F**********48.178.162,07D6D7300**********48.178.162,A1D391BD0**********175.200.138,8699D980**********.178.162,F0852391F81**********48.178.162,4C8A5F08C4**********57.209.74,1F9AAA6FD5**********.140.172.202,80B1746D**********83.129.163,0362639A0**********80.121.144,19E6F069B1**********96.241.121,9CA1A90F4**********58.48.178.162,4C8A5F**********0.172.202,B2288F15948**********40.172.202,FFC52985DC**********7.209.66,476055B5B93**********.168.22.29,7EAF485A3**********.57.209.74,1F9AAA6FD**********.96.241.121,9CA1A90F**********40.172.202,21CAF590D**********140.172.202,6DA663DA1**********80.123.168,F9705DC92**********48.178.98,324AD651B1**********0.172.202,4556E9EACDC**********57.209.74,1B35F04E191**********140.172.202,21CAF590**********2.226.26,B50A65F5417**********e,192.168.22.39,DF375DD**********180.123.168,F05BE95C9**********180.123.168,F9705DC9**********3.129.163,DBEB4F03BA6**********97.242.166,40C24B8BE**********2.200.119,3027297F30B**********3.129.163,EC390F1732**********.178.162,54A54EBD331**********140.172.202,6AC93B42C**********7.90.195,31A611071A4**********83.129.163,0948E1C45**********3.129.163,B113529BCFA**********2.147.84,274F393FB60**********173.244.34,8C6B38AFA**********3.129.163,AA5BD85F91D**********.42.136.3,F7BDDC0A77**********7.209.74,BA892B8D1E3**********8.178.98,D4616F0B7E0**********8.178.162,808239C9A29**********.140.172.202,2FFC0F6F**********75.200.138,5F4532AB9**********8.178.98,C6067495EF1**********68.22.149,8F995D9876A**********168.22.150,278F44FF5**********49.66.65,5B308C1D542**********8.178.162,3156FCD6CE**********180.125.60,E412AA4B18**********.168.22.150,278F44FF**********3.129.163,68541F81F0**********168.22.231,E9323E2AB**********.57.209.66,323866047**********77.90.195,0F866A1A16**********83.129.163,B50EF0C7C**********.48.178.162,6C5A067BF**********72.226.26,DECB1444F0**********57.209.66,E9F3A1C83A**********83.129.163,D9A0481A4**********.168.22.10,7519FB67A**********.17.6.26,115DFAD7B8**********.173.244.34,8C6B38AF**********3.244.34,A3452680CC8**********9.173.244.34,81A11605**********.178.162,0FD9FEA0C4C**********.173.244.34,A345268**********42.154.113,36632E7126**********83.129.163,EB023F456**********,192.168.22.39,017DB29A**********173.244.34,5A60D2E1A**********.226.26,65664CA2642F**********83.129.163,68541F81F**********8.178.98,19A8378660F**********7.242.166,579289409D**********83.129.163,62996AF2BF**********57.209.66,B948140540D**********137.203,57CCB867979E**********73.244.34,E5FA45B3278**********3.129.163,BE6E4BE7951**********.140.172.202,4D1ADA2B**********9.173.244.34,E5FA45B**********73.244.34,B37D70B3BC2**********68.22.149,9A1A17AAC4E**********168.22.38,8F853074DC**********9.66.65,8532AAEDE9A5**********68.22.143,EF9B8F4549**********.140.172.202,6DA663DA**********48.178.98,9C5B1CD135**********168.22.215,123580F5C2**********8.178.162,EAF5E77298**********68.22.174,83791A53A1**********8.178.98,65970C9B28B**********.48.178.98,74ED6FC5D**********9.66,34F8DDFF09D0E223F6*****
漏洞原理详见 WooYun: 致远A8协同管理系统"后门"一样的Log泄露JSESSIONID可登陆用户
更新第3方软件
危害等级:高
漏洞Rank:11
确认时间:2015-03-09 12:31
CNVD确认所述情况,已经转由CNCERT下发给分中心,由其后续协调网站管理单位处置。
暂无