Gaosheng technology, the largest cloud service provider in northeast China, has multiple website vulnerabilities. Arbitrary files include & Unauthorized Access & Getshell (sensitive host information/internal information across China)
My big northeast cloud service provider
You can add, delete, or tamper with the host information of the monitored company nationwide!
1. Arbitrary File traversal. This site has not been dug further
Http://wiki.gw500.com/xmlrpc
The reading method is as follows:
WooYun: leakage of sensitive information on a key server
Mask Region
*****TTP/1.1**********ength**********angua**********************; **********ginx/********** keep-********** 2015 *************e: tex******************************de
0
<**********bin:/sbi**********:/sbin:/sb**********r/adm:/sb**********ool/lpd:/s**********:/sbin:/**********wn:/sbin:/s**********:/sbin:/**********/spool/mail**********ews:/et**********spool/uucp:/**********tor:/root:/**********/usr/games:**********var/gopher:/**********/var/ftp:/s**********body:/:/s**********aemon:/:/s**********memory owner:/d**********RPC user:/:/**********spool/mqueue**********pool/mqueue********** Server:/var/l**********be used by OProfile:/**********ver:/var/lib**********arpwatch:/**********/ntp:/sbi**********sage bus:/:/********** daemon:/:**********lib/hsqldb:**********var/named:/**********d SSH:/var/empty********** User:/var/lib********** NFS User:/var/li********** daemon:/:/**********pd:/var/lib/avahi-**********er:/etc/X11/**********/gdm:/sbi**********r:/home/sabayo**********r:/var/lib/ng**********:/var/www:/**********r:/home/radius**********:/etc/openvpn**********r/tomcat6:/**********s Checker:/var/c**********me/yangyq**********uite:/var/run/qu**********tcache:/:/s**********/home/xiao**********/home/devel**********value>&l*****
2. Unauthorized ftp access
Ftp://mrtg.gw500.com/
3. getshell
Addresses: http://traffic.gw500.com
Problem: The weathermap plug-in cacti can get shell without authorization
Shell address: http://traffic.gw500.com/plugins/weathermap/configs/testshell.php
Password: 0
Use a kitchen knife for Link
I did not go through the database configuration. I directly entered the root account and the password was empty. I connected the database to many systems.
If you do not want to continue playing, shell may affect internal network security.
Solution:
Continue when you are free