神器而已之优酷某站配置不当泄露阿里云oss登录凭证

编号182742
Urlhttp://www.wooyun.org/bug.php?action=view&id=182742
漏洞状态厂商已经确认
漏洞标题神器而已之优酷某站配置不当泄露阿里云oss登录凭证
漏洞类型敏感信息泄露
厂商优酷
白帽子路人甲
提交日期2016-03-09 21:26:00
公开日期2016-04-24 10:30:00
修复时间(not set)
确认时间2016-03-10 00:00:00
Confirm Spend1
漏洞标签敏感信息泄漏 敏感信息泄露
关注数0
收藏数0
白帽评级
白帽自评rank5
厂商评级
厂商评rank15
漏洞简介
rt
漏洞细节

泄露地址:
http://119.167.145.109/.bash_history

pwd
ll
ls -lar
/usr/local/bin/python /tudou_source/OSS/osscmd config --host=oss-cn-shanghai.aliyuncs.com --id="p91qbY7LM99Xdgdo" --key="x20aF4U8z5nyohZ91O9OUWjGIkfLsb"
ls
ls -lar
cd ..
ll
ls
ls -la
cat .osscredentials
exit
pwd
wget http://10.106.8.91/cgi-bin/src_oss_download.py?filename=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
ll
cat src_oss_download.py\?filename\=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
rm src_oss_download.py\?filename\=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
ll
exit
/usr/local/bin/python /tudou_source/OSS/osscmd config --host=oss-cn-shanghai.aliyuncs.com --id="p91qbY7LM99Xdgdo" --key="x20aF4U8z5nyohZ91O9OUWjGIkfLsb"
pwd
history
cd ..
more .bash_history
/usr/local/bin/python /tudou_source/OSS/osscmd sign oss://yk-source/000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A39
1F-5A83CD2BDD518A.mp4
/usr/local/bin/python /tudou_source/OSS/osscmd sign oss://yk-source/000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
exit


利用其中的id和osskey成功登录oss主机
为什么厂商是优酷呢.
1.这是我用神器扫出来的
2.tudou_source表明这是土豆的,然而土豆又和优酷合并了

2016-03-09 21:06:32屏幕截图.png


POC

pwd
ll
ls -lar
/usr/local/bin/python /tudou_source/OSS/osscmd config --host=oss-cn-shanghai.aliyuncs.com --id="p91qbY7LM99Xdgdo" --key="x20aF4U8z5nyohZ91O9OUWjGIkfLsb"
ls
ls -lar
cd ..
ll
ls
ls -la
cat .osscredentials
exit
pwd
wget http://10.106.8.91/cgi-bin/src_oss_download.py?filename=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
ll
cat src_oss_download.py\?filename\=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
rm src_oss_download.py\?filename\=000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
ll
exit
/usr/local/bin/python /tudou_source/OSS/osscmd config --host=oss-cn-shanghai.aliyuncs.com --id="p91qbY7LM99Xdgdo" --key="x20aF4U8z5nyohZ91O9OUWjGIkfLsb"
pwd
history
cd ..
more .bash_history
/usr/local/bin/python /tudou_source/OSS/osscmd sign oss://yk-source/000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A39
1F-5A83CD2BDD518A.mp4
/usr/local/bin/python /tudou_source/OSS/osscmd sign oss://yk-source/000002010056CE741B-5A83CD2BDD518A673D0A27D43A0A391F-5A83CD2BDD518A.mp4
exit


2016-03-09 21:06:32屏幕截图.png

修复方案

我也不是很清楚.....
这是我第一次接触oss这个东西....

状态信息 2016-03-09: 细节已通知厂商并且等待厂商处理中
2016-03-10: 厂商已经确认,细节仅向厂商公开
2016-03-20: 细节向核心白帽子及相关领域专家公开
2016-03-30: 细节向普通白帽子公开
2016-04-09: 细节向实习白帽子公开
2016-04-24: 细节向公众公开
厂商回复感谢提醒!漏洞修复中!
回应信息危害等级:高漏洞Rank:15 确认时间:2016-03-10 10:30