破壳企业应急安全(防御方向)课程 应急响应 勒索病毒 挖矿木马 DDOS 日志分析

大麦网分站某系统备份文件下载(影响部分敏感数据)

编号217249
Urlhttp://www.wooyun.org/bug.php?action=view&id=217249
漏洞状态厂商已经修复
漏洞标题大麦网分站某系统备份文件下载(影响部分敏感数据)
漏洞类型敏感信息泄露
厂商大麦网
白帽子路人甲
提交日期2016-06-07 20:19:00
公开日期2016-07-18 15:07:00
修复时间2016-07-18 15:07:00
确认时间2016-06-07 00:00:00
Confirm Spend0
漏洞标签敏感信息泄露
关注数0
收藏数0
白帽评级
白帽自评rank10
厂商评级
厂商评rank15
漏洞简介
2个G的文件,解压后28.1个G.我也是醉了。。
漏洞细节

http://tjat.damai.cn/phpstat.tar.gz

111.png


把tar.gz解压成tar变成了18个g

111.png


根据日期推测管理员四月份打的包
tar在解压就变成28.1G了

111.png


虽然我不会审计,打算还算能看懂点
phpstat\phpstat\include.inc\config.inc.php

mask 区域
1.://**.**.**
***** "ad*****
***** "ph*****
**********
*****^果想显示错误,^*****
*****39;.'); #根^*****
*****;/home'); #log*****
**********
*****^^改一下数^*****
*****'mysql'*****
**********
*****9;localhost' );*****
**********
*****039;3306' ); #*****
**********
*****, 'root'*****
**********
*****9;[email protected]#$%^!QAZ*****
**********
*****pstat_analytics_'*****


111.png


随便点开一个看了下 应该是支付日志吧。 (vip,ip,uipcode,username,userid,tuiid,website,time,timestmp,loadtimes,timeslong,pageurl,pagetitle,pagesite,pagecolumn,fromsite,pagefrom,pagefromad,fromtype,pagefromgroup,keyword,keywordtypes,inkeyword,inkeywordtypes,mediumkeyword,keywordmatchtypes,cscreensize,marknum,pagepic,pagetypes,isfirst)

mask 区域
*****alId=160418272042&ext1=&payResult=10&ext2=&orderAm=','','pay.damai.cn','/','','','','market_type_free_search','','大麦网官网','haosou','','','','','1920*900','48504','','','0'),('101.81.171.54','_ck16041810032917419202638366803','_ck16041810032917419202638366803','','7021323','1','10000036',1460947761,1460908800,0,'0','/paymentcenter.do?bid=20100520&uid=46943576&tid=7021323&enabled=1%2C7%2C8%2C9%2C10&pid=0&cur=CNY&email=&cid=872&hits=0&def=1&comId=&skin=0&royaltyType=0&takePay=0&epay=0&cardConfig=0&sign=3017eb84724eec98dc7b19b4b02ed310&language=zh-cn','选择支付方式','pay.damai.cn','/','paycenter.damai.cn','/gateway.aspx','','market_type_direct_input','','','','','','','','1800*800','48353','','','1'),('120.34.209.170','_ck16041421313616338511995386280','_ck16041421313616338511995386280','','7021324','1','10000036',1460947761,1460908800,0,'0','/paymentcenter.do?bid=20100520&uid=46875091&tid=7021324&enabled=1%2C7%2C8%2C9%2C12%2C10&pid=0&cur=CNY&email=qwer_meng%40qq.com&cid=872&hits=0&def=1&comId=&skin=0&royaltyType=0&takePay=0&epay=0&cardConfig=0&sign=6297de232ba88da62096bc4a027fc24e&language=zh-cn','选择支付方式','pay.damai.cn','/','paycenter.damai.cn','/gateway.aspx','','market_type_direct_input','','','','','','','','2500*1200','48358','','','1'),('113.0.88.98','_ck16041520452712366284720717677','_ck16041520452712366284720717677','','7021326','1','10000036',1460947762,1460908800,0,'0','/paymentcenter.do?bid=20100520&uid=46914798&tid=7021326&enabled=1%2C7%2C8%2C9%2C10&pid=0&cur=CNY&email=&cid=872&hits=0&def=1&comId=&skin=0&royaltyType=0&takePay=0&epay=0&cardConfig=0&sign=2a2d457b654be593784857581b11ad85&language=zh-cn','选择支付方式','pay.damai.cn','/','paycenter.damai.cn','/gateway.aspx','','market_type_direct_input','','','','','','','','1900*800','48358','','','1'),('175.25.25.141','_ck16041810233818694605804407422','_ck16041810233818694605804407422','\"[email protected]\"','7021327','1','10000036',1460947763,1460908800,*****


POC

111.png

修复方案

删了吧

状态信息 2016-06-07: 细节已通知厂商并且等待厂商处理中
2016-06-07: 厂商已经确认,细节仅向厂商公开
2016-06-17: 细节向核心白帽子及相关领域专家公开
2016-06-27: 细节向普通白帽子公开
2016-07-07: 细节向实习白帽子公开
2016-07-18: 厂商已经修复漏洞并主动公开,细节向公众公开
厂商回复感谢路人甲。
回应信息危害等级:高漏洞Rank:15 确认时间:2016-06-07 23:27