漏洞详情
披露状态:
2010-08-02: 细节已通知厂商并且等待厂商处理中
2010-08-02: 厂商已经确认,细节仅向厂商公开
2010-08-12: 细节向核心白帽子及相关领域专家公开
2010-08-22: 细节向普通白帽子公开
2010-09-01: 细节向实习白帽子公开
2010-09-06: 细节向公众公开
简要描述:
搜狗网站泄露信息
详细说明:
登录页面
http://fenlei.sogou.com/newhot/admin/login.jsp
另外,该类机器的java进程貌似死掉,直接保留源码
http://fenlei.sogou.com/admin/
漏洞证明:
截取部分源码
<%@ page language="java" contentType="text/html; charset=utf-8" pageEncoding="utf-8"%> <% response.setHeader("Pragma","No-cache"); response.setHeader("Cache-Control","no-cache"); response.setDateHeader("Expires", 0); %> <%@ page import="com.sogou.nav.hot.bean.SetUvItem"%> <%@ page import="com.sogou.nav.hot.dao.SetUvDAO"%> <%@ page import="com.sogou.nav.hot.HotConfig"%> <%@ page import="java.util.List"%> <%@ page import="com.sogou.nav.hot.util.HttpUtil" %> <%response.setCharacterEncoding("utf-8"); %> <% String myconfig = this.getInitParameter("propertyFile"); HotConfig.init(myconfig); SetUvDAO dao = new SetUvDAO(); String action = HttpUtil.getParam("action",request,null); if(action != null && "del".equals(action)){ String webid = HttpUtil.getParam("id",request,null); if(webid != null){ try{ int websiteid = Integer.parseInt(webid); dao.deleteUv(websiteid); }catch(Exception e){ e.printStackTrace(); } } } List items = dao.getAllSetUvItems(); %>
修复方案:
对外网关闭管理入口,检查java进行是否正常。

被折叠的 条评论
为什么被折叠?



