漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
2013-11-11: 细节已通知厂商并且等待厂商处理中
2013-11-15: 厂商已经确认,细节仅向厂商公开
2013-11-25: 细节向核心白帽子及相关领域专家公开
2013-12-05: 细节向普通白帽子公开
2013-12-15: 细节向实习白帽子公开
2013-12-26: 细节向公众公开
简要描述:
详细说明:
http://211.139.95.67:8080/login.action
/usr/local/tomcat/webapps/GS_SHOW_ORACLE
java.home: /usr/local/java/jre
java.version: 1.6.0
os.name: Linux
os.arch: ppc64
os.version: 2.6.18-238.el5
user.name: root
user.home: /root
user.dir: /usr/local/tomcat/bin
java.class.version: 50.0
java.class.path: /usr/local/tomcat/bin/bootstrap.jar
java.library.path: /usr/local/java/jre/lib/ppc64/default:/usr/local/java/jre/lib/ppc64:/usr/lib
file.separator: /
path.separator: :
java.vendor: IBM Corporation
java.vendor.url: http://www.ibm.com/
java.vm.specification.version: 1.0
java.vm.specification.vendor: Sun Microsystems Inc.
java.vm.specification.name: Java Virtual Machine Specification
java.vm.version: 2.4
java.vm.vendor: IBM Corporation
java.vm.name: IBM J9 VM
java.specification.version: 1.6
java.specification.vender:
java.specification.name: Java Platform API Specification
java.io.tmpdir: /usr/local/tomcat/temp
漏洞证明:
http://211.139.95.67:8080/login.action
/usr/local/tomcat/webapps/GS_SHOW_ORACLE
java.home: /usr/local/java/jre
java.version: 1.6.0
os.name: Linux
os.arch: ppc64
os.version: 2.6.18-238.el5
user.name: root
user.home: /root
user.dir: /usr/local/tomcat/bin
java.class.version: 50.0
java.class.path: /usr/local/tomcat/bin/bootstrap.jar
java.library.path: /usr/local/java/jre/lib/ppc64/default:/usr/local/java/jre/lib/ppc64:/usr/lib
file.separator: /
path.separator: :
java.vendor: IBM Corporation
java.vendor.url: http://www.ibm.com/
java.vm.specification.version: 1.0
java.vm.specification.vendor: Sun Microsystems Inc.
java.vm.specification.name: Java Virtual Machine Specification
java.vm.version: 2.4
java.vm.vendor: IBM Corporation
java.vm.name: IBM J9 VM
java.specification.version: 1.6
java.specification.vender:
java.specification.name: Java Platform API Specification
java.io.tmpdir: /usr/local/tomcat/temp
修复方案:
权限很大哦,还是个sun的小机,比较高端哦。
赶快修复呀。时间都这么久了。
版权声明:转载请注明来源 大海捞针@乌云
>
漏洞回应
厂商回应:
危害等级:中
漏洞Rank:6
确认时间:2013-11-15 22:41
厂商回复:
CNVD确认并复现所述情况,已经转由CNCERT直接通报给中国移动集团公司,由其后续派发工单处置。
最新状态:
暂无
