当前位置:WooYun >> 漏洞信息

漏洞概要 关注数(24) 关注此漏洞

缺陷编号:
漏洞标题:
aol.com configuration file disclosure
相关厂商:
漏洞作者:
提交时间:
2015-12-10 12:35
修复时间:
2016-01-23 15:16
公开时间:
2016-01-23 15:16
漏洞类型:
敏感信息泄露
危害等级:
自评Rank:
6
漏洞状态:
厂商已经确认
漏洞来源:
http://www.wooyun.org,如有疑问或需要帮助请联系 [email protected]
Tags标签:
分享漏洞:
4人收藏 收藏
分享漏洞:

>

漏洞详情

披露状态:

2015-12-10: 细节已通知厂商并且等待厂商处理中
2015-12-11: 厂商已经确认,细节仅向厂商公开
2015-12-21: 细节向核心白帽子及相关领域专家公开
2015-12-31: 细节向普通白帽子公开
2016-01-10: 细节向实习白帽子公开
2016-01-23: 细节向公众公开

简要描述:

aol.com configuration file disclosure, mysql user password leaked

详细说明:

aol.com configuration file disclosure

http://videosection.video.aol.com/application/configs/application.ini

漏洞证明:

[production]
phpSettings.display_startup_errors = "0"
phpSettings.display_errors = "0"
includePaths.library = APPLICATION_PATH"/../library"
bootstrap.path = APPLICATION_PATH"/Bootstrap.php"
bootstrap.class = "Bootstrap"
appnamespace = "Application"
resources.frontController.controllerDirectory = APPLICATION_PATH"/controllers"
resources.frontController.params.displayExceptions = "0"
resources.db.adapter = "pdo_mysql"
resources.db.params.dbname = "aolvs"
resources.db.params.host = "fmvhubdb-l01.video.aol.com"
resources.db.params.username = "aolvs_rw"
resources.db.params.password = "knewDBA4u"
resources.db.params.isdefaulttableadapter = true
constants.DEBUG_MODE = false
constants.SERVER_PATH = "http://videosection.video.aol.com/"
constants.CACHE_PATH = APPLICATION_PATH"/../cache"
;constants.THUMBS_PATH = APPLICATION_PATH"/../thumbnails"
;constants.STATIC_PATH = APPLICATION_PATH"/../static"
constants.THUMBS_PATH = "/fmvhubNAS/thumbnails"
constants.STATIC_PATH = "/fmvhubNAS/static"
...

修复方案:

No direct HTTP access to this .ini file

版权声明:转载请注明来源 路人甲@乌云


>

漏洞回应

厂商回应:

危害等级:高

漏洞Rank:20

确认时间:2015-12-11 00:04

厂商回复:

最新状态:

暂无