2014-03-31:细节已通知厂商并且等待厂商处理中
2014-04-01:厂商已经确认,细节仅向厂商公开
2014-04-11:细节向核心白帽子及相关领域专家公开
2014-04-21:细节向普通白帽子公开
2014-05-01:细节向实习白帽子公开
2014-05-15:细节向公众公开
已经SHELL
详细说明:RSYNC配置失误导致主站被入侵,
漏洞证明:
www_maxthon_20140324.sql
INSERT INTO `members` VALUES (1,'admin_gwgl','9cae13b21cbd63f81c260aab781d7e98',1,'1303894759'),(7,'hr','4b34ed23315eab10d631151aef01a1cf',3,'1306907985'),(8,'cg','8dc7b8c3e82b13455f3baf10753cb9a3',2,'1307521429'),(9,'sc','e3197eaebd2fa12a44ac67b97e6cd000',2,'1309158387'),(10,'sxf','fb58c61b5c9085c94b2918aa672e0486',1,'1309158387'),(11,'hanxuewei','d8000a69edd5c994befdaa4fcc42b28b',2,'1328063671'),(12,'tianzhongjia','4ea058f906a445140ae2ac0c3dc97a76',2,'1328063922'),(13,'maliyan','ebeefba483b88bc67dfc8e87b9316af3',4,'1331800765'),(14,'mengjian','76419c58730d9f35de7ac538c2fd6737',2,'1345533116'),(15,'lihuiwu','1bbd886460827015e5d605ed44252251',2,'1345533116'),(16,'mx4_admin','1bbd886460827015e5d605ed44252251',1,'1303894759'),(17,'cuikai','8ebf5258068fcdf41b05a0aa4d2ca3cf',2,'1357538251'),(18,'zhangning','31a9dc40a9b19272bd53a06756b6603c',2,'1357605982'),(19,'cuiwei','101bc02983933249f93b3018499dc9ad',2,'1357608211'),(20,'liangshuang','74651f3a84b996b5999b95bea62342c6',3,'1372136136'),(21,'test','098f6bcd4621d373cade4e832627b4f6',2,'1376629844'),(22,'sunjing','0be7e1c39b786883260dc7b82fe64c76',2,'1378798419'),(23,'zhoujianguang','e5f0d7818d1b09c11cc3d7d53d667a46',2,'1393397505');
后台地址admin/login.php
内网RSYNC数据库备份
rsync 10.0.8.71::10.0.8.171/
测试下载部分数据,经过验证确为13年备份数据,测试结束下载数据已经删除
版权声明:转载请注明来源 孩子他爸@乌云 漏洞回应 厂商回应:
危害等级:高
漏洞Rank:15
确认时间:2014-04-01 13:21
厂商回复:早期配置错误, 一段时间前就修了的.
最新状态:2014-04-01:早就修了的.
版权与免责声明:
凡注明稿件来源的内容均为转载稿或由网友用户注册发布,本网转载出于传递更多信息的目的;如转载稿涉及版权问题,请作者联系我们,同时对于用户评论等信息,本网并不意味着赞同其观点或证实其内容的真实性;