破壳企业应急安全(防御方向)课程 应急响应 勒索病毒 挖矿木马 DDOS 日志分析

金山KingGate防火墙存在默认配置不当可被控制

编号135809
Urlhttp://www.wooyun.org/bug.php?action=view&id=135809
漏洞状态漏洞已经通知厂商但是厂商忽略漏洞
漏洞标题金山KingGate防火墙存在默认配置不当可被控制
漏洞类型默认配置不当
厂商金山软件集团
白帽子路人甲
提交日期2015-08-21 18:42:00
公开日期2015-11-24 18:44:00
修复时间(not set)
确认时间0000-00-00 00:00:00
Confirm Spend-1
漏洞标签默认配置不当
关注数0
收藏数0
白帽评级
白帽自评rank10
厂商评级
厂商评rank0
漏洞简介
rt
漏洞细节

由于KingGate防火墙使用zebra路由软件的,这是一款由Cisco自主开发的闭源路由器软件,默认开启2601端口,而且默认密码是zebra
案例:

金山新版
https://www.qh119.gov.cn/src/system/login.php?login_retry=true
https://115.239.246.102/src/system/login.php?login_retry=true
https://111.1.82.143/src/system/login.php?login_retry=true
https://220.173.107.90/src/system/login.php?login_retry=true
https://59.46.73.106/src/system/login.php?login_retry=true
https://www.xn--3dsz23cqb341isz0akob.com/src/system/login.php?login_retry=true
https://202.103.238.229/src/system/login.php?login_retry=true
金山旧版本
https://116.77.32.13:8443/src/system/login.php
https://116.77.32.3:8443/src/system/login.php
https://116.77.32.4:8443/src/system/login.php
https://222.179.180.74:8443/src/system/login.php
https://116.77.32.11:8443/src/system/login.php
https://210.21.231.102/src/system/login.php
https://116.77.32.12:8443/src/system/login.php
https://116.77.32.10:8443/src/system/login.php
https://116.77.32.2:8443/src/system/login.php
https://120.196.138.212:8443/src/system/login.php
https://218.93.17.154:8443/src/system/login.php
https://218.25.140.137:8443/src/system/login.php
https://124.93.200.105:8443/src/system/login.php
https://218.26.248.71/src/system/login.php
https://211.142.19.11/src/system/login.php
https://202.97.152.130/src/system/login.php
https://www.lt.lskjd.gov.cn/src/system/login.php
https://124.93.200.109:8443/src/system/login.php
https://218.26.24.146:8443/src/system/login.php
https://211.142.24.77:8443/src/system/login.php
https://124.93.200.108:8443/src/system/login.php
https://124.93.200.100:8443/src/system/login.php
https://110.249.216.198/src/system/login.php
https://hbsrfb.gov.cn/src/system/login.php
http://116.95.130.3/src/system/login.php
https://222.74.54.234:8443/src/system/login.php
https://222.74.54.234/src/system/login.php
https://116.95.130.3:8443/src/system/login.php
https://218.21.230.154:8443/src/system/login.php
https://218.26.1.75:8443/src/system/login.php
http://60.210.101.238/src/system/login.php
https://211.142.29.10/src/system/login.php
https://218.26.164.26/src/system/login.php
https://www.yucoffee.com/src/system/login.php
https://en.diyuan.cc/src/system/login.php
https://restartclub.com/src/system/login.php
https://58.22.6.39:8443/src/system/login.php
https://218.26.4.186/src/system/login.php
https://182.151.197.195/src/system/login.php
https://220.193.65.237/src/system/login.php
https://220.193.65.236/src/system/login.php
https://220.193.65.238/src/system/login.php
https://183.6.133.179/src/system/login.php
https://220.166.83.98/src/system/login.php
https://220.193.65.238:8443/src/system/login.php
https://222.169.100.142/src/system/login.php
https://182.151.197.195:8443/src/system/login.php
https://218.56.144.171/src/system/login.php
https://27.195.159.2/src/system/login.php
https://218.56.144.172/src/system/login.php
https://www.taaic.gov.cn/src/system/login.php
https://220.193.65.234:8443/src/system/login.php
https://www.gzzygts.com/src/system/login.php
https://www.zyhsj.com/src/system/login.php
https://58.22.6.40:8443/src/system/login.php
https://218.26.168.72/src/system/login.php
https://www.yczyzz.cn/src/system/login.php
https://218.26.96.71:8443/src/system/login.php
https://218.61.70.246:8443/src/system/login.php
https://222.33.40.27:8443/src/system/login.php
https://183.238.241.46:8443/src/system/login.php
https://61.138.108.74:8443/src/system/login.php
https://61.161.214.62/src/system/login.php
https://125.32.94.203:8443/src/system/login.php

POC

aaaaaaaaaaaaaaaa111111111111111111111.jpg


aaaaaaaaaaaaaa22222222222222222222.jpg


aaaaaaaaaaaa333333333333333333333.jpg


aaaaaaaaaaaaa44444444444444444.jpg

修复方案

可否修改密码?

状态信息 2015-08-21: 细节已通知厂商并且等待厂商处理中
2015-08-26: 厂商主动忽略漏洞,细节向第三方安全合作伙伴开放
2015-10-20: 细节向核心白帽子及相关领域专家公开
2015-10-30: 细节向普通白帽子公开
2015-11-09: 细节向实习白帽子公开
2015-11-24: 细节向公众公开
厂商回复None漏洞Rank:15 (WooYun评价)
回应信息危害等级:无影响厂商忽略忽略时间:2015-11-24 18:44
Showing 1-2 of 2 items.
评论内容评论人点赞数评论时间

@crazykb 暴露身份了

Vinc02015-08-28 09:17:00

2601端口貌似没有什么有价值的信息。05端口是关闭的。

crazykb02015-08-26 19:54:00