A sub-station of Youku has a command execution vulnerability that can be SHELL and can penetrate through the Intranet.
Target: http://channel.3g.youku.com/ykmks/login.doWhoami: rootWebPath: /opt/www/ykmks/webapps/ykmksOS.Name: LinuxOS.Version: 2.6.18-194.el5Java.Home: /opt/jdk/jreJava.Version: 1.6.0_13OS.arch: amd64User.Name: rootUser.Home: /rootUser.Dir: /opt/www/ykmks/webapps/ykmksJava.Class.Path: /opt/tomcat/bin/bootstrap.jarJava.IO.Tmpdir: /opt/tomcat/temp
eth0 Link encap:Ethernet HWaddr 00:24:E8:68:5A:0D inet addr:10.103.13.19 Bcast:10.103.13.255 Mask:255.255.255.0 inet6 addr: fe80::224:e8ff:fe68:5a0d/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:2099277294 errors:0 dropped:0 overruns:0 frame:0 TX packets:3582311950 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:396065005482 (368.8 GiB) TX bytes:401171199965 (373.6 GiB) Interrupt:169 Memory:f8000000-f8012800 eth1 Link encap:Ethernet HWaddr 00:24:E8:68:5A:0F inet addr:211.151.146.78 Bcast:211.151.146.255 Mask:255.255.255.0 inet6 addr: fe80::224:e8ff:fe68:5a0f/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:10399875776 errors:0 dropped:67 overruns:0 frame:0 TX packets:1560453631 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:881364135680 (820.8 GiB) TX bytes:338251510443 (315.0 GiB) Interrupt:169 Memory:f4000000-f4012800 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:14585539843 errors:0 dropped:0 overruns:0 frame:0 TX packets:14585539843 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:1918210199086 (1.7 TiB) TX bytes:1918210199086 (1.7 TiB)sit0 Link encap:IPv6-in-IPv4 NOARP MTU:1480 Metric:1 RX packets:0 errors:0 dropped:0 overruns:0 frame:0 TX packets:0 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:0 (0.0 b) TX bytes:0 (0.0 b)a01.memcachced.3g.b28.youku (10.103.13.21) at 00:1D:09:64:77:78 [ether] on eth0a02.memcachced.3g.b28.youku (10.103.13.22) at 00:1D:09:64:77:E6 [ether] on eth0? (211.151.146.1) at 00:00:0C:07:AC:01 [ether] on eth1? (10.103.13.254) at 00:00:5E:00:01:0D [ether] on eth0nameserver 10.103.10.5nameserver 10.103.10.6
Solution:Update third-party components