16wifi某第三方系统从爆破用户到四台终端命令执行/涉及主干等多个项目源码

漏洞概要

缺陷编号:WooYun-2016-0221168

漏洞标题:16wifi某第三方系统从爆破用户到四台终端命令执行/涉及主干等多个项目源码

相关厂商:16wifi.com

漏洞作者:路人甲

提交时间:2016-06-20 15:10

公开时间:2016-06-23 20:26

漏洞类型:命令执行

危害等级:高

自评Rank:20

漏洞状态:厂商已经修复

Tags标签:

漏洞详情

披露状态:

2016-06-20: 细节已通知厂商并且等待厂商处理中
2016-06-23: 厂商已经确认,细节仅向厂商公开
2016-06-23: 厂商已经修复漏洞并主动公开,细节向公众公开

简要描述:

rt

详细说明:

我用lideqiang登录的这个权限比较高

命令执行4个节点

http://*.*.*.*:9080/computer/(master)/script

http://*.*.*.*:9080/computer/11/script

剩下的两台不在演示涉及大量源码

主干

很多敏感信息 不在一一证明cat /etc/passwdroot:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinuucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTP User:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinvcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologinrpc:x:32:32:Rpcbind Daemon:/var/cache/rpcbind:/sbin/nologinabrt:x:173:173::/etc/abrt:/sbin/nologinrpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologinnfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologinhaldaemon:x:68:68:HAL daemon:/:/sbin/nologinntp:x:38:38::/etc/ntp:/sbin/nologinsaslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologinpostfix:x:89:89::/var/spool/postfix:/sbin/nologinsshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologintcpdump:x:72:72::/:/sbin/nologinoprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologinmysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bashnginx:x:498:498:nginx user:/var/cache/nginx:/sbin/nologinzabbix:x:500:500::/home/zabbix:/bin/bashmailnull:x:47:47::/var/spool/mqueue:/sbin/nologinsmmsp:x:51:51::/var/spool/mqueue:/sbin/nologinimage:x:501:501::/opt/clientpicture.16wifi.com/16wifi/client/index/img/:/bin/bashjenkins:x:497:497:Jenkins Continuous Integration Server:/var/lib/jenkins:/bin/falsenexus:x:502:502::/var/lib/nexus:/bin/bash貌似可以直入内网

漏洞证明:

root:x:0:0:root:/root:/bin/bashbin:x:1:1:bin:/bin:/sbin/nologindaemon:x:2:2:daemon:/sbin:/sbin/nologinadm:x:3:4:adm:/var/adm:/sbin/nologinlp:x:4:7:lp:/var/spool/lpd:/sbin/nologinsync:x:5:0:sync:/sbin:/bin/syncshutdown:x:6:0:shutdown:/sbin:/sbin/shutdownhalt:x:7:0:halt:/sbin:/sbin/haltmail:x:8:12:mail:/var/spool/mail:/sbin/nologinuucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologinoperator:x:11:0:operator:/root:/sbin/nologingames:x:12:100:games:/usr/games:/sbin/nologingopher:x:13:30:gopher:/var/gopher:/sbin/nologinftp:x:14:50:FTPUser:/var/ftp:/sbin/nologinnobody:x:99:99:Nobody:/:/sbin/nologindbus:x:81:81:System message bus:/:/sbin/nologinvcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologinrpc:x:32:32:Rpcbind Daemon:/var/cache/rpcbind:/sbin/nologinabrt:x:173:173::/etc/abrt:/sbin/nologinrpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologinnfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologinhaldaemon:x:68:68:HAL daemon:/:/sbin/nologinntp:x:38:38::/etc/ntp:/sbin/nologinsaslauth:x:499:76:"Saslauthd user":/var/empty/saslauth:/sbin/nologinpostfix:x:89:89::/var/spool/postfix:/sbin/nologinsshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologintcpdump:x:72:72::/:/sbin/nologinoprofile:x:16:16:Special user account to be used by OProfile:/home/oprofile:/sbin/nologinmysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bashnginx:x:498:498:nginx user:/var/cache/nginx:/sbin/nologinzabbix:x:500:500::/home/zabbix:/bin/bashmailnull:x:47:47::/var/spool/mqueue:/sbin/nologinsmmsp:x:51:51::/var/spool/mqueue:/sbin/nologinimage:x:501:501::/opt/clientpicture.16wifi.com/16wifi/client/index/img/:/bin/bashjenkins:x:497:497:Jenkins Continuous Integration Server:/var/lib/jenkins:/bin/falsenexus:x:502:502::/var/lib/nexus:/bin/bash

修复方案:

弱口令

漏洞回应

厂商回应:

危害等级:低

漏洞Rank:5

确认时间:2016-06-2316:44

厂商回复:

测试业务审核不严

最新状态:

2016-06-23:关闭服务器,停掉机房,关闭全部业务

评价

  1. 2010-01-01 00:00 陆由乙 白帽子 | Rank:251 漏洞数:23)

    厂商回复的..........