当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0182947

漏洞标题:美的官方内网小漫游

相关厂商:midea.com

漏洞作者: diguoji

提交时间:2016-03-10 15:22

修复时间:2016-04-24 15:59

公开时间:2016-04-24 15:59

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-03-10: 细节已通知厂商并且等待厂商处理中
2016-03-10: 厂商已经确认,细节仅向厂商公开
2016-03-20: 细节向核心白帽子及相关领域专家公开
2016-03-30: 细节向普通白帽子公开
2016-04-09: 细节向实习白帽子公开
2016-04-24: 细节向公众公开

简要描述:

wb

详细说明:

命令执行 外网还有不少自己修补下吧
厂商自己删除吧
shell地址 http://58.252.101.21/shouce.jsp
内网代理脚本 http://58.252.101.21/tunnel.jsp
config.xml找到目录

2.找shell目录.png


上个shell看下

3.命令执行22shell.png


reGeorg+proxychainx http service内网简单漫游测试下

4.123123.png


简单证明下就行了 没太大动静

漏洞证明:

http://172.16.16.29 >> >>Microsoft-IIS/8.5 >>Success
http://172.16.16.23 >> �ƶ������������MAS����¼>>Apache-Coyote/1.1 >>Success
http://172.16.16.19 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.20 >> ���ĵ����ʼ�ϵͳ>>nginx/1.4.1 >>Success
http://172.16.16.38 >> >>Apache/2.4.3 (Unix) mod_jk/1.2.37 >>Success
http://172.16.16.43 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.8 >> Cisco Content Security Management Appliance M1070 (172.16.16.8) - Welcome >>glass/1.0 Python/2.6.4 >>Success
http://172.16.16.70 >> ����Ӫ��ϵͳIT֪ʶѧϰ��>>Microsoft-IIS/6.0 >>Success
http://172.16.16.63 >> >>Apache >>Success
http://172.16.16.66 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.49 >> >>null >>Success
http://172.16.16.72 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.80 >> 产品登录界面>>IBM_HTTP_Server >>Success
http://172.16.16.61 >> >>Microsoft-IIS/7.5 >>Success
http://172.16.16.52 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.119 >> >>null >>Success
http://172.16.16.120 >> �ޱ����ĵ�>>Apache/2.0.53 (Win32) >>Success
http://172.16.16.79 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.81 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.14 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.76 >> �������������>>null >>Success
http://172.16.16.128 >> 美的精品电器--精致生活,一触即发>>Apache/2.2.14 (Win32) DAV/2 mod_ssl/2.2.14 OpenSSL/0.9.8l mod_autoindex_color PHP/5.3.1 mod_apreq2-20090110/2.7.1 mod_perl/2.0.4 Perl/v5.10.1 >>Success
http://172.16.16.141 >> >>null >>Success
http://172.16.16.133 >> >>Microsoft-IIS/5.0 >>Success
http://172.16.16.134 >> (正式环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.142 >> 中国营销总部销售管理平台>>null >>Success
http://172.16.16.152 >> 美的集团EAM(机电)-测试环境>>Resin/3.0.22 >>Success
http://172.16.16.154 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.131 >> 172.16.16.131 - />>Microsoft-IIS/6.0 >>Success
http://172.16.16.165 >> >>Apache/2.2.17 (Win32) mod_jk/1.2.26 >>Success
http://172.16.16.166 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.175 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.176 >> (测试环境)威灵控股供应链管理平台>>null >>Success
http://172.16.16.178 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.158 >> 美的地产>>Microsoft-IIS/6.0 >>Success
http://172.16.16.205 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.210 >> Midea's External Symantec Antivirus Deploy Web>>Microsoft-IIS/7.5 >>Success
http://172.16.16.204 >> >>Apache/2.2.17 (Win32) >>Success
http://172.16.16.193 >> JX01�ƶ����������>>Apache-Coyote/1.1 >>Success
http://172.16.16.215 >> Apache Tomcat>>Apache-Coyote/1.1 >>Success
http://172.16.16.212 >> >>IBM_HTTP_Server >>Success
http://172.16.16.214 >> 安得直通宝>>Apache-Coyote/1.1 >>Success
http://172.16.16.185 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.241 >> >>null >>Success
http://172.16.16.184 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.245 >> >>null >>Success
http://172.16.16.208 >> >>Microsoft-IIS/6.0 >>Success
http://172.16.16.251 >> WEB-IMS>>null >>Success
http://172.16.16.207 >> 美的水家电事业分部条码平台>>Resin/3.0.15 >>Success
http://172.16.16.229 >> >>Microsoft-IIS/6.0 >>Success

修复方案:

版权声明:转载请注明来源 diguoji@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:8

确认时间:2016-03-10 15:59

厂商回复:

diguoji@乌云,3q

最新状态:

暂无


漏洞评价:

评价